Podcast
Questions and Answers
An insider is defined as any person with authorized access to any United States government resource.
An insider is defined as any person with authorized access to any United States government resource.
True
Which of the following are insider threats? (Select all that apply)
Which of the following are insider threats? (Select all that apply)
Which of the following should be considered as reportable indicators of possible insider threats? (Select all that apply)
Which of the following should be considered as reportable indicators of possible insider threats? (Select all that apply)
During the spot and assessment phase of recruitment, the foreign intelligence service will often explore potential exploitable weaknesses that may be used as leverage.
During the spot and assessment phase of recruitment, the foreign intelligence service will often explore potential exploitable weaknesses that may be used as leverage.
Signup and view all the answers
Exploitable weaknesses by a foreign intelligence service when considering a source for recruitment may include (Select all that apply)
Exploitable weaknesses by a foreign intelligence service when considering a source for recruitment may include (Select all that apply)
Signup and view all the answers
Unauthorized downloads or copying of files, especially for employees who have given notice of employment termination, is an indicator of a possible insider threat.
Unauthorized downloads or copying of files, especially for employees who have given notice of employment termination, is an indicator of a possible insider threat.
Signup and view all the answers
Insider threat policy is only applicable to classified information; sensitive, proprietary, or need-to-know information is not currently protected by the insider threat program policy.
Insider threat policy is only applicable to classified information; sensitive, proprietary, or need-to-know information is not currently protected by the insider threat program policy.
Signup and view all the answers
Contact with an individual who is known to be, or is suspected of being, associated with foreign intelligence, security, or terrorism, should always be considered a reportable indicator of a possible recruitment.
Contact with an individual who is known to be, or is suspected of being, associated with foreign intelligence, security, or terrorism, should always be considered a reportable indicator of a possible recruitment.
Signup and view all the answers
Insiders work alone; they never recruit because it increases the chances of them being caught.
Insiders work alone; they never recruit because it increases the chances of them being caught.
Signup and view all the answers
Attempting to gain access to an unclassified automated information system without authorization may be considered an information collection indicator.
Attempting to gain access to an unclassified automated information system without authorization may be considered an information collection indicator.
Signup and view all the answers
Which of the following could be considered a possible indicator of an insider threat? (Select all that apply)
Which of the following could be considered a possible indicator of an insider threat? (Select all that apply)
Signup and view all the answers
An insider threat is anyone with authorized access to the information or things an organization values most, who uses that access to inflict harm to the organization or national security.
An insider threat is anyone with authorized access to the information or things an organization values most, who uses that access to inflict harm to the organization or national security.
Signup and view all the answers
Study Notes
Insider Threat Overview
- An insider is anyone with authorized access to U.S. government resources, including personnel, facilities, information, equipment, networks, or systems.
- An insider threat includes events like the Fort Hood shootings, economic espionage by individuals like Greg Chung, and leaks such as WikiLeaks.
Reportable Indicators of Insider Threats
- Indicators include:
- Unexplained or undue affluence
- Questionable loyalty to the U.S. government
- Disgruntled employees
- Contact with individuals suspected of associations with foreign intelligence, security, or terrorism should also be reported.
Foreign Intelligence Recruitment Tactics
- Foreign intelligence services often explore exploitable weaknesses during recruitment phases, such as:
- Adultery
- Financial problems
- Gambling issues
- Substance abuse (drugs or alcohol)
Insider Threat Policies
- Insider threat policies apply not only to classified information but also to sensitive, proprietary, or need-to-know information.
- Unauthorized downloading or copying of files, especially from employees who have resigned, signals a potential insider threat.
Insider Behavior
- Insiders do not always work alone; they can recruit others, which may heighten risks of detection.
- Attempting unauthorized access to unclassified automated information systems is a key information collection indicator.
- An insider threat can have severe consequences for organizations and national security, impacting their integrity and safety.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on insider threats with these flashcards. The quiz covers definitions, examples, and important concepts related to insider threats faced by organizations. Increase your awareness and understanding of the risks associated with authorized access to sensitive resources.