106 Security Flashcards

1
Q

Identify the directives that govern personnel security

A
EO 12968
EO 10450
DoD 5200.2-R
SCI Security Manual
DON ISP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Classification Categories

A

Top Secret - Orange “exceptionally grave damage”
Secret- Red “serious damage”
Confidential- Blue “damage”
Unclassified- Green “or, relating to, or being official matter not requiring the application of security safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

“Need To Know”

A

a determination that an individual requires access to specific classified info in the performance of lawful and authorized government functions and duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of Investigation depending on clearance level

A

Top Secret- SSBI. Valid for 5 years
Secret- NACLC. Valid for 5 years
Confidential- NACLC. Valid for 5 years
SCI- SSBI. Valid for 5 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SAER

A

Security Access Eligibility Report- get adjudication process started

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identify who has overall authority of, and controls access to, a SCIF

A

The Commanding Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SF-700

A

Stores combos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SF-701

A

End of Day Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SF-702

A

Open/Close log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SF-703

A

TS Cover Sheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SF-153

A

COMSEC Material Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SF-312

A

Classified Information Nondisclosure Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When should safe combos be changed

A
  • combo is compromised
  • transfer of personnel
  • change of command/EKMS manager
  • At least once every 2 years
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an FDO and state their responsibilities

A

Foreign Disclosure Officer- military info is a national security asset which must be conserved and protected and which may be shared with foreign representatives only when there is a clearly defined advantage to the US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Purpose of DCS

A

Defense Courier Service - organized under DoD directive 5200.33, shall establish, staff, maintain, and operate an international network of couriers and courier stations for the expeditious, cost-effective and secure transmission of qualified classified documents and material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Responsibilities of the TSCO

A

Top Secret Control Officer- CO designates in writing. Responsible for maintaining a system of accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

THREATCON Levels

A

THREATCON Level 1 - Low, basic network posture
THREATCON Level 2- Medium, increased alertness
THREATCON Level 3 - High, known threat
THREATCON Level 4 - Extreme, full alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

FPCON Levels

A

FPCON Normal - no current terrorist activity
FPCON ALPHA- small and general terrorist activity that is not predictable
FPCON BRAVO- somewhat predictable terrorist threat
FPCON CHARLIE- instance occurs or when intel reports that there is terrorist activity imminent
FPCON DELTA- a terrorist attack is taking place or has just occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is RAM

A

Random Antiterrorism Measures- to maximize the effectiveness and determine value, RAM should be implemented without a set pattern, either in terms of the measures selected, time, place, or other variables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an EAP

A

Emergency Action Plan- every command that holds classified COMSEC or CCI material must prepare and maintain a current, written emergency plan for safeguarding such material in the event of an emergency

21
Q

Purpose of Emergency Destruction Procedures

A

Commands located outside of CONUS and deployable commands, planning must consider both natural disasters and hostile actions and must also include EDPs

22
Q

Who can give the order to initiate Emergency Destruction

A

Commanding Officer

23
Q

How and n what order is material destroyed during Emergency Destruction

A
  • Superseded keying material
  • Primary keying material
  • Reserve on Board keying material
  • Highest classification first
  • all approved methods of destruction should be used
24
Q

Define SCI

A

Sensitive Compartmented Information- methods of handling certain types of classified information that relate to specific national-security topics or programs whose existence may not be publically acknowledged, or the sensitive nature which requires special handling

25
Items prohibited in a SCIF
Cell phones, cameras, removable media, flash media
26
Security Violation
any failure to comply with the regulations for the protection and security of classified material
27
Practice dangerous to security
practices which have the potential to jeopardize the security of COMSEC Material, should they continue
28
Vault recertification and recurring inspections
SCI security officials will conduct self-inspections at least annually
29
Access List
Provides an approved list of personnel that have been granted access and the need-to-know
30
Visitors log
Are to keep a paper trail of who has accessed the spaces that are not on the access list
31
TPI
keep positive control and safeguard classified material
32
DoD escort policy
If you are an escort, you are required to stay with that individual or group you are escorting until they leave
33
Sanitizing an area
You have to announce un-cleared person, then wait until all the computer screens, paperwork, and all other classified material is put away
34
COMSEC
Communications Security- protective measures taken to deny unauthorized persons information derived from telecommunications of the US Govt concerning national security, and to ensure the authority of such telecommunications
35
INFOSEC
Information Security- protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
36
COMPUSEC
Computer Security- measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by a computer
37
PSP
Physical Security-the availability and adequacy of physical security protection capabilities at the individual buildings and other locations when COMSEC material is held
38
ATFP
Anti-terrorism Force Protection- Defensive measures used to reduce the vulnerability of individuals and property to terrorist acts
39
Purpose of the ICD system
Intelligence Community Directives are the principal means by which the DNI provides guidance, policy, and direction to the Intelligence Community
40
SSO Navy
The Director, Security and Corporate Services is SSO Navy and is designated as the CSA
41
Duties and responsibilities of the SSO
-appointed in writing, principle advisor on the SCI security program in the command and responsible to the CO for management and admin of the program
42
Who can be CSM
Command Security Manager- may be assigned full-time, part-time, or as a collateral duty and must be a military Officer or a civilian employee GS 11 or above, with sufficient authority and staff to manage the program for the command
43
Duties and responsibilities of CSM
Responsible for admin of the command's information and personnel security programs
44
Purpose of JPAS
Joint Personnel Adjudication System- DoD system that uses the web to connect security personnel around the world with a database managed by DoD Agency Central Adjudication Facilities
45
DONCAF
Department of the Navy Central Adjudication Facility- A NCIS org, responsible for determining who within the DoN is eligible to hold a security clearance, to have access to SCI, or to be assigned to sensitive duties
46
How long can a CO administratively suspend access before DONCAF revokes a clearance
90 days
47
Levels of INFOCON
INFOCON 5- no apparent hostile activity against computer networks INFOCON 4- increased risk of attack INFOCON 3-when a risk has been identified INFOCON 2- when an attack has taken place but the CND system is not at its highest alertness INFOCON 1- when attacks are taking place and the CND system is at max alertness
48
Why the USN only uses ".mil" email addresses on government systems
DoD has exclusive use of the .mil domain. Provides increased security