Podcast
Questions and Answers
How can an adversary use information available in public records to target you?
How can an adversary use information available in public records to target you?
Combine it with info from other data sources to learn how to best bait you with a scam
Which of the following is an example of a strong password?
Which of the following is an example of a strong password?
- d+Uf_4RimUz (correct)
- qwerty
- password
- 123456
Where are you permitted to use classified data?
Where are you permitted to use classified data?
Only in areas with security appropriate to the classification level
What conditions are necessary to be granted access to SCI?
What conditions are necessary to be granted access to SCI?
Which of the following is NOT a best practice for traveling overseas with a mobile device?
Which of the following is NOT a best practice for traveling overseas with a mobile device?
Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?
Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?
Which of the following is prohibited for Tom while working on a report that contains employee names and sensitive information?
Which of the following is prohibited for Tom while working on a report that contains employee names and sensitive information?
Which of the following uses of removable media is appropriate?
Which of the following uses of removable media is appropriate?
Which of the following is NOT a best practice for protecting data on a mobile device?
Which of the following is NOT a best practice for protecting data on a mobile device?
Which of the following is a best practice to protect your identity?
Which of the following is a best practice to protect your identity?
Which of the following is permitted within a SCIF?
Which of the following is permitted within a SCIF?
Which of the following is a best practice when browsing the internet?
Which of the following is a best practice when browsing the internet?
Which of the following is a risk associated with removable media?
Which of the following is a risk associated with removable media?
Which of these is NOT a potential indicator that your device may be under a malicious code attack?
Which of these is NOT a potential indicator that your device may be under a malicious code attack?
What is the best course of action if you receive a suspicious text message about a package delivery?
What is the best course of action if you receive a suspicious text message about a package delivery?
What does the CAC contain?
What does the CAC contain?
How can you prevent viruses and malicious code?
How can you prevent viruses and malicious code?
Which type of data could reasonably be expected to cause serious damage to national security?
Which type of data could reasonably be expected to cause serious damage to national security?
Which of the following is true of telework?
Which of the following is true of telework?
Which of the following is an example of behavior that you should report?
Which of the following is an example of behavior that you should report?
Which of the following is least likely to pose a risk to share on a social networking site?
Which of the following is least likely to pose a risk to share on a social networking site?
Does Sylvia's use of a government-approved mobile device for calls during her commute pose a security concern?
Does Sylvia's use of a government-approved mobile device for calls during her commute pose a security concern?
How can you mitigate the potential risk associated with a compressed URL?
How can you mitigate the potential risk associated with a compressed URL?
How can you protect your home computer?
How can you protect your home computer?
Which best describes an insider threat? Someone who uses __________ access, ______________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.
Which best describes an insider threat? Someone who uses __________ access, ______________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.
Flashcards
Strong Passwords
Strong Passwords
Complex passwords like d+Uf_4RimUz, designed to resist unauthorized access.
Classified Data Handling
Classified Data Handling
Securely handling classified information in designated areas according to its sensitivity level.
Sensitive Compartmented Information (SCI)
Sensitive Compartmented Information (SCI)
Highly sensitive information requiring special access, authorization, and training.
CPCON 2
CPCON 2
A cyber protection condition limiting focus to crucial tasks during security concerns.
Signup and view all the flashcards
Telework Sensitive Data
Telework Sensitive Data
Prohibited use of home computers for sensitive documents, especially personal data.
Signup and view all the flashcards
Removable Media Encryption
Removable Media Encryption
Encrypting data stored on removable media to prevent unauthorized access.
Signup and view all the flashcards
Mobile Device Auto-Locking
Mobile Device Auto-Locking
Disabling automatic screen locking on mobile devices is NOT a safe practice to protect data.
Signup and view all the flashcards
Credit Report Monitoring
Credit Report Monitoring
Ordering an annual credit report helps maintain identity protection.
Signup and view all the flashcards
Government-owned PEDs in SCIFs
Government-owned PEDs in SCIFs
Government-owned portable electronic devices are permitted in secure facilities.
Signup and view all the flashcards
Safe Internet Browsing
Safe Internet Browsing
Accepting cookies only from reputable websites while browsing.
Signup and view all the flashcards
Unauthorized Media Risks
Unauthorized Media Risks
Removable media can harbor unauthorized access and malware.
Signup and view all the flashcards
System Update Notifications
System Update Notifications
Publicly announced system updates are NOT indicators of malicious attacks.
Signup and view all the flashcards
Suspicious Online Messages
Suspicious Online Messages
Be wary of unsolicited messages, shortened links, and unverified sources.
Signup and view all the flashcards
CAC Functionalities
CAC Functionalities
Common Access Card (CAC) contains certification for identification, encryption, and digital signatures
Signup and view all the flashcards
External File Scanning
External File Scanning
Always scan external files before uploading them to prevent viruses or malicious code.
Signup and view all the flashcards
Data Classification - Secret
Data Classification - Secret
Secretly classified data has the potential to cause significant harm to national security when disclosed.
Signup and view all the flashcards
Prior Authorization for Telework
Prior Authorization for Telework
Before teleworking, you need permission from your organization.
Signup and view all the flashcards
Reporting Unauthorized Data
Reporting Unauthorized Data
It's crucial to report unauthorized removal of sensitive information
Signup and view all the flashcards
Social Media Security Risks
Social Media Security Risks
Sharing innocuous information is generally low-risk on social media.
Signup and view all the flashcards
Public Transport Security Risks
Public Transport Security Risks
Using public transport for sensitive calls may create eavesdropping risks.
Signup and view all the flashcards
Compressed URL Safety
Compressed URL Safety
Use previews to verify destination links and mitigate risks associated with compressed URLs.
Signup and view all the flashcards
Home Computer Password Protection
Home Computer Password Protection
Activating password protection enhances security on home computers.
Signup and view all the flashcards
Insider Threats
Insider Threats
Insider threats involve misuse of authorized access to breach security, knowingly or unknowingly.
Signup and view all the flashcardsStudy Notes
Cybersecurity Awareness and Best Practices
- Public records can be combined with data from other sources by adversaries to target individuals for scams.
- Strong passwords are complex; an example is d+Uf_4RimUz.
- Classified data should only be handled in security areas appropriate for its classification level.
- Access to Sensitive Compartmented Information (SCI) requires special access authorization and indoctrination into the SCI program.
- Avoid traveling with mobile devices when possible as a cybersecurity best practice.
Cyber Protection Conditions and Data Handling
- Cyberspace Protection Condition (CPCON) 2 limits priority focus to critical and essential functions.
- Using a home computer for printing sensitive reports while teleworking is prohibited, especially when it contains personal employee details.
- Appropriate use of removable media includes encrypting data stored on it.
Mobile Device Security and Internet Safety
- Disabling auto screen locking on mobile devices is not a recommended practice for protecting data.
- Best practices for identity protection include ordering a credit report annually.
- A Government-owned Portable Electronic Device (PED) is permitted in a Sensitive Compartmented Information Facility (SCIF).
- When browsing the internet, only accept cookies from reputable websites.
Risks and Indicators of Cyber Attacks
- Removable media poses various risks, which include unauthorized access or malware.
- Notifications of system updates that have been publicized are not indicators of malicious attacks.
- Receiving unsolicited messages, such as package delivery delays from unknown sources with shortened links, should be approached with caution; the best action is to delete such messages.
Common Security Practices
- Common Access Card (CAC) includes certificates for identification, encryption, and digital signatures.
- To prevent viruses and malicious code, always scan external files before uploading them to your devices.
- Data classified as Secret could cause serious damage to national security if disclosed.
Telework and Reporting Security Issues
- Teleworking requires prior permission from your organization.
- Reporting is essential for behaviors like taking home sensitive information without authorization.
- Sharing innocuous information, such as your pet's name, is less likely to pose security risks on social media.
Transportation Security Considerations
- Using public transport for work-related calls poses security concerns due to eavesdropping and shoulder surfing.
- To safely manage risks associated with compressed URLs, utilize the preview function to verify destination links.
Home Computer Protection
- Activate password protection on home computers to enhance security.
- Insider threats involve individuals misusing their authorized access, whether knowingly or unknowingly, to compromise national security.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.