DoD Insider Threat Awareness Flashcards
22 Questions
101 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Authorized access to DoD information and resources may be granted based on a person's _______________. (Select all that apply)

  • Volunteer activities (correct)
  • Employment (correct)
  • Contractual relationship with DoD (correct)

The transfer of classified or proprietary information to a system not approved for the classification level is a _______________.

spill

What is the appropriate action if a team member discusses her financial difficulties?

Report the concerning behavior to your security officer

Which of the following is a reportable behavioral indicator?

<p>Significant change in work habit (C)</p> Signup and view all the answers

If you are contacted by a member of the media about information you are not authorized to share, which details should you take down? (Select all that apply)

<p>Date and time of contact (A), Their name and their organization name (B), How they contacted you (C)</p> Signup and view all the answers

Which of these may be targeted by foreign entities? (Select all that apply)

<p>Industrial secrets (A), Government officials (B), Employees (C)</p> Signup and view all the answers

_______________ is a conversation technique used to discreetly gather information without raising suspicion.

<p>elicitation</p> Signup and view all the answers

Technological advances impact the insider threat by _______________. (Select all that apply)

<p>Presenting new security challenges (A), Allowing large amounts of data to be accessed (B)</p> Signup and view all the answers

Which of the following is a technology-related indicator? (Select all that apply)

<p>Accessing systems at unusual hours without authorization (A), Keeping unauthorized backups (B)</p> Signup and view all the answers

Which of the following countermeasures can help reduce technology-associated insider threats? (Select all that apply)

<p>Watch for behavioral indicators (A), Inventory your technology holdings (B)</p> Signup and view all the answers

Insiders may include which of these groups of people? (Select all that apply)

<p>Contractors (A), Former Employees (B), Employees (C), Active duty Military (D)</p> Signup and view all the answers

The definition of Targeted Violence includes which of these components? (Select all that apply)

<p>For a specific reason (A), Any form of violence (B), Directed at an individual or group (C)</p> Signup and view all the answers

Which of the following are reportable behavioral indicators? (Select all that apply)

<p>Considerable change in financial circumstances (A), Addictive behaviors (B), Substance abuse (C)</p> Signup and view all the answers

Contractors must report which of these? (Select all that apply)

<p>All of the above (A)</p> Signup and view all the answers

The acronym EAP stands for _______________.

<p>Employee Assistance Program</p> Signup and view all the answers

To whom should you report if you are contacted by a member of the media about information you are not authorized to share?

<p>Your security office</p> Signup and view all the answers

Contractors must report which of these to the insider threat program? (Select all that apply)

<p>Efforts to obtain unauthorized access to classified or proprietary information (A), Any contact by cleared employees with known or suspected intelligence officers (B), Any contact that suggests the employee may be the target of attempted exploitation by intelligence services (C), Efforts to compromise a cleared employee (D)</p> Signup and view all the answers

Who might be interested in non-public information that an insider can provide? (Select all that apply)

<p>Competitors (A), Non-state actors (B), Terrorist organizations (C), Foreign governments (D)</p> Signup and view all the answers

Technological advances ______________________________. (Select all that apply)

<p>Increase risk of information loss (A), Allow insiders to access more data (B)</p> Signup and view all the answers

Which of the following is a technology-related indicator? (Select all that apply)

<p>Improper use of privileged access (A), Bypassing technology-associated protocols (B), Hoarding files and data (C)</p> Signup and view all the answers

Hostile entities may use social media to _______________? (Select all that apply)

<p>All of the above (A)</p> Signup and view all the answers

Which of these activities must be reported? (Select all that apply)

<p>Unauthorized disclosure of classified material (A), Inappropriate copying of classified material (B), Bypassing security rules or protocols (C)</p> Signup and view all the answers

Study Notes

Authorized Access

  • Access to DoD information can be granted through volunteer activities, contractual relationships, or employment.

Information Spill

  • A "spill" refers to the transfer of classified or proprietary information to unauthorized systems or individuals.

Reporting Concerns

  • Report any concerning behaviors, such as discussions of financial difficulties, to your security officer.

Behavioral Indicators

  • A significant change in work habits is a reportable indicator of potential insider threats.

Media Interactions

  • If contacted by media, document their name, organization, method of contact, and the date and time of contact.

Foreign Targeting

  • Foreign entities may target a variety of people, including employees, contractors, and military personnel.

Elicitation Technique

  • Elicitation is a discreet conversation technique used to gather information without raising suspicion.

Technological Impact

  • Technological advances allow large amounts of data to be accessed and introduce new security challenges regarding insider threats.
  • Indicators of potential insider threats include accessing systems at unusual hours and keeping unauthorized backups.

Countermeasures for Insider Threats

  • Effective countermeasures include conducting an inventory of technology holdings and monitoring for behavioral signals.

Insider Definition

  • Insiders can include employees, former employees, contractors, and active duty military personnel.

Targeted Violence Definition

  • Targeted violence is any form of violence directed at an individual or group for a specific reason.

Reportable Behavioral Indicators

  • Addictive behaviors, substance abuse, and significant changes in financial circumstances should be reported.

Contractors Reporting Obligations

  • Contractors are required to report various insider threat indicators and activities.

Employee Assistance Program

  • EAP stands for Employee Assistance Program, providing support for employees.

Media Report Responsibility

  • Report any unauthorized media contacts to your security office to ensure proper handling of sensitive information.

Insider Threat Reporting for Contractors

  • Contractors must report unauthorized access attempts, contacts with intelligence officers, and indications of exploitation attempts.

Interest in Non-Public Information

  • Competitors, non-state actors, terrorist organizations, and foreign governments may seek non-public information from insiders.

Risks of Technological Advances

  • Technological advancements increase the risk of information loss and allow insiders greater access to data.
  • Hoarding files, bypassing security protocols, and improper use of privileged access serve as key indicators of risks.

Social Media Use by Hostile Entities

  • Hostile entities may leverage social media for various subversive purposes.

Mandatory Reporting Activities

  • Report unauthorized disclosures, inappropriate copying of classified materials, and any bypassing of security rules or protocols.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on insider threat awareness specific to the Department of Defense. These flashcards cover essential terms and concepts related to authorized access and information transfer within the DoD. Perfect for individuals looking to better understand security protocols.

More Like This

Use Quizgecko on...
Browser
Browser