Insider Threat Awareness Flashcards
12 Questions
112 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

An insider is defined as any person with authorized access to any United States government resource.

True (A)

Which of the following are insider threats? (Select all that apply)

  • Fort Hood shootings (correct)
  • Greg Chung - Economic Espionage (correct)
  • Wiki Leaks (correct)

Which of the following should be considered as reportable indicators of possible insider threats? (Select all that apply)

  • Unexplained or undue affluence (correct)
  • Disgruntled employee (correct)
  • Displaying questionable loyalty to U.S. government (correct)

During the spot and assessment phase of recruitment, the foreign intelligence service will often explore potential exploitable weaknesses that may be used as leverage.

<p>True (A)</p> Signup and view all the answers

Exploitable weaknesses by a foreign intelligence service when considering a source for recruitment may include (Select all that apply)

<p>Financial problems (A), Adultery (B), Drugs or alcohol (C), Gambling (D)</p> Signup and view all the answers

Unauthorized downloads or copying of files, especially for employees who have given notice of employment termination, is an indicator of a possible insider threat.

<p>True (A)</p> Signup and view all the answers

Insider threat policy is only applicable to classified information; sensitive, proprietary, or need-to-know information is not currently protected by the insider threat program policy.

<p>False (B)</p> Signup and view all the answers

Contact with an individual who is known to be, or is suspected of being, associated with foreign intelligence, security, or terrorism, should always be considered a reportable indicator of a possible recruitment.

<p>True (A)</p> Signup and view all the answers

Insiders work alone; they never recruit because it increases the chances of them being caught.

<p>False (B)</p> Signup and view all the answers

Attempting to gain access to an unclassified automated information system without authorization may be considered an information collection indicator.

<p>True (A)</p> Signup and view all the answers

Which of the following could be considered a possible indicator of an insider threat? (Select all that apply)

<p>Unauthorized access attempts (A), Financial difficulties (B), Changes in behavior (C)</p> Signup and view all the answers

An insider threat is anyone with authorized access to the information or things an organization values most, who uses that access to inflict harm to the organization or national security.

<p>True (A)</p> Signup and view all the answers

Flashcards

Insider Threat Definition

A person with authorized access to valuable information or resources who intentionally causes harm.

Insider

Anyone with authorized access to US government resources.

Reportable Indicators

Signs suggesting potential insider threat activity.

Insider Threat Policy

Applies to all types of sensitive information, not just classified.

Signup and view all the flashcards

Recruitment Indicators (Foreign Intel)

Suspicious contacts that need reporting.

Signup and view all the flashcards

Exploitable Weaknesses

Vulnerabilities foreign intelligence services look for in potential recruits.

Signup and view all the flashcards

Unauthorized Downloads

Copying files without authorization, especially by departing employees, can indicate a threat.

Signup and view all the flashcards

Foreign Intelligence Recruitment

Foreign intelligence services try to recruit people who have access to sensitive information.

Signup and view all the flashcards

Insider Recruitment

Insiders can recruit others, increasing the risk of exposure.

Signup and view all the flashcards

Information Collection Indicator

Unauthorized access attempts to unclassified systems.

Signup and view all the flashcards

Fort Hood Shootings

Example of an insider threat.

Signup and view all the flashcards

Unexplained Affluence

Unjustified increases in wealth of an individual that is considered reportable.

Signup and view all the flashcards

Study Notes

Insider Threat Overview

  • An insider is anyone with authorized access to U.S. government resources, including personnel, facilities, information, equipment, networks, or systems.
  • An insider threat includes events like the Fort Hood shootings, economic espionage by individuals like Greg Chung, and leaks such as WikiLeaks.

Reportable Indicators of Insider Threats

  • Indicators include:
    • Unexplained or undue affluence
    • Questionable loyalty to the U.S. government
    • Disgruntled employees
  • Contact with individuals suspected of associations with foreign intelligence, security, or terrorism should also be reported.

Foreign Intelligence Recruitment Tactics

  • Foreign intelligence services often explore exploitable weaknesses during recruitment phases, such as:
    • Adultery
    • Financial problems
    • Gambling issues
    • Substance abuse (drugs or alcohol)

Insider Threat Policies

  • Insider threat policies apply not only to classified information but also to sensitive, proprietary, or need-to-know information.
  • Unauthorized downloading or copying of files, especially from employees who have resigned, signals a potential insider threat.

Insider Behavior

  • Insiders do not always work alone; they can recruit others, which may heighten risks of detection.
  • Attempting unauthorized access to unclassified automated information systems is a key information collection indicator.
  • An insider threat can have severe consequences for organizations and national security, impacting their integrity and safety.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on insider threats with these flashcards. The quiz covers definitions, examples, and important concepts related to insider threats faced by organizations. Increase your awareness and understanding of the risks associated with authorized access to sensitive resources.

More Like This

Use Quizgecko on...
Browser
Browser