All Areas II Flashcards
(105 cards)
This enables individuals to be able to authenticate themselves on security websites and securely log into computer systems
Common Access Card (CAC)
Older style of lock; may be used for classified storage in certain cases
Mechanical combination lock
Lock that complies with UL Standard 768-Group 1
Combination padlock
Lock that complies with FF-L-2740 series lock specification
Electromechanical combination lock
Lock that has limited resistance to forced entry
Low security padlock
A facility used by the intelligence community
SCIF
The governing authority to approve security containers
GSA
Areas designed and authorized for the open storage of classified information. These facilities are usually build to commercial construction standards and do not afford the extra security inherent with a vault.
Secure rooms
Constructed to meet strict forcible entry standards, including reinforced concrete on all walls, ceiling, and floor, plus a hardened steel door
Vaults
The terrorist threat level indicating anti-U.S. terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation. There is a substantial DoD presence, and the operating environment favors the terrorist.
High terrorist threat level
The terrorist threat level indicating no terrorist group is detected or the terrorist group in non-threatening
Low terrorist threat level
The terrorist threat level indicating anti-U.S. terrorists are present and attack personnel as their preferred method of operation, or a group uses large casualty-producing attacks as their preferred method but has limited operational activity. The operat
Significant terrorist threat level
The terrorist threat level indicating terrorists are present but there are no indications of anti-U.S. activity. The operating environment favors the host nation or the U.S.
Moderate terrorist threat level
Physical security plan
At a minimum, these should include special and general guard orders, access and material control, protective barrier lighting systems, locks, and Intrusion Detection Systems (IDS)
Much of U.S. classified information originates within this environment
Industrial
Security compliance is overseen by this organization if a contractor works at his/her own facility
Defense Security Service
A contractor must adhere to the security rules of the __________ commander when working at a government installation
Installation
The program that covers protection of classified information
by government contractors
NISP
FSO responsibilities
- Ensure compliance with the NISP
- Follow NISPOM guidelines
- Provide training for cleared individuals
If you are a government contractor working on a contractor-owned system at a contractor facility, you must follow the security provisions of this reference
Chapter 8 of the NISPOM
True or False: A SAP can retain security cognizance if necessary.
True
A government employee with the authority to enter into, administer, and/or terminate contracts and make related determinations and findings
Contracting Officer
This government employee is a subject matter expert who has regular contact with the contractor
COTR
The document that outlines in detail what will be required to complete a contract
Statement of Work (SOW)