Insider Threat Awareness Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What are the three phases of recruitment?

Spot and Assess, Development, and Recruitment

Social media is one platform used by adversaries to recruit potential witting or unwitting insiders.

True (A)

Indicators of an Insider Threat may include unexplained sudden wealth and unexplained sudden and short-term foreign travel.

True (A)

What is an insider threat?

<p>Anyone with authorized access to the information or things an organization values most, and who uses that access - either wittingly or unwittingly - to inflict harm to the organization or national security.</p> Signup and view all the answers

How would you report a coworker demonstrating potential indicators of an insider threat?

<p>Contact the Joint Staff Security Office</p> Signup and view all the answers

Consequences of not reporting foreign contacts, travel or business dealings may result in: ______.

<p>Loss of employment or security clearance, UCMJ/Article 92 (mil), disciplinary action (civ), criminal charges.</p> Signup and view all the answers

DoD and Federal employees may be subject to both civil and criminal penalties for failure to report.

<p>True (A)</p> Signup and view all the answers

What are some techniques used for removing classified information from the workplace?

<p>Email, USB data sticks, making photocopies of documents, physically removing files.</p> Signup and view all the answers

Insiders may physically remove files, steal or leak information electronically, or use elicitation as a technique.

<p>True (A)</p> Signup and view all the answers

Why is it important to identify potential insider threats?

<p>Insiders have freedom of movement within and access to classified information that has the potential to cause great harm to national security.</p> Signup and view all the answers

Flashcards

Spot and Assess Phase

Identifying and evaluating potential insider candidates.

Development Phase

Building a relationship with a potential insider to increase influence.

Recruitment Phase

Convincing the insider to take action to compromise sensitive information.

Insider Threat

An individual with authorized access who misuses it, intentionally or unintentionally, causing harm.

Signup and view all the flashcards

Reporting Suspicious Activity

Report it to the Joint Staff Security Office.

Signup and view all the flashcards

Consequences of Not Reporting

Termination, UCMJ violation, civil actions, or criminal charges.

Signup and view all the flashcards

Methods of Information Removal

Email, USB drives, photocopies, and physical removal of files.

Signup and view all the flashcards

Insider Extraction Techniques

Physically removing files, electronic theft, leaking, or elicitation.

Signup and view all the flashcards

Importance of Identifying Threats

Unrestricted access to classified information poses a significant risk.

Signup and view all the flashcards

Study Notes

Insider Threat Recruitment Phases

  • Recruitment consists of three phases: Spot and Assess, Development, and Recruitment.

Social Media as a Recruitment Tool

  • Social media platforms are utilized by adversaries to recruit potential insiders, whether knowingly or unknowingly.

Indicators of Insider Threats

  • Signs of insider threats include unexplained wealth and unexpected short-term foreign travel.

Definition of Insider Threat

  • An insider threat involves any individual with authorized access to sensitive organizational information or assets who may inflict harm, intentionally or unintentionally.

Reporting Insider Threat Indicators

  • If a coworker shows potential threat indicators, the appropriate action is to report to the Joint Staff Security Office.

Consequences of Not Reporting

  • Failing to report foreign contacts, travel, or business dealings can lead to serious repercussions, including:
    • Termination of employment or security clearance
    • Violation under UCMJ/Article 92 (military)
    • Civil disciplinary actions
    • Potential criminal charges

Penalties for Failure to Report

  • DoD and Federal employees face civil and criminal penalties for not reporting. Cleared defense contractors risk losing employment and security clearance, and may also face criminal charges.

Techniques for Classified Information Removal

  • Classified information may be removed from the workplace through various methods, including:
    • Email correspondence
    • USB flash drives
    • Making photocopies
    • Physically taking files out of the workplace

Insider Information Extraction Techniques

  • Insiders may engage in various techniques such as physically removing files, electronically stealing or leaking information, or using elicitation to discreetly gather about individuals and operations.

Importance of Identifying Insider Threats

  • Recognizing potential insider threats is crucial as they have unrestricted access to classified information, posing significant risks to national security.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Insider Threat Quiz: House Cleaning Staff
3 questions
Insider Threat Awareness Flashcards
12 questions
Use Quizgecko on...
Browser
Browser