SECURITY/OPERATIONS SECURITY/PHYSICAL SECURITY 106/111/202/213 Flashcards Preview

EIWS > SECURITY/OPERATIONS SECURITY/PHYSICAL SECURITY 106/111/202/213 > Flashcards

Flashcards in SECURITY/OPERATIONS SECURITY/PHYSICAL SECURITY 106/111/202/213 Deck (45):
1

Define OPSEC

Operations security the process of protecting sensitive but unclassified information

2

1st step OPSEC process

Identify critical information

3

2nd step OPSEC process

analyze the threat

4

3rd step OPSEC process

analyze the vulnerabilities

5

4th step OPSEC process

assess the risks

6

5th step OPSEC process

apply countermeasures

7

Define WRA

Web risk assessment

8

EEFI

Essential elements of friendly information

9

Define Critical information (CI)

sensitive but unclassified information

10

NOST

Naval OPSEC Support Team

11

IOSS

Inter-agency OPSEC Support Staff

12

JCMA

Joint COMSEC monitoring activity

13

TOP SECRET

Orange expected to cause exceptionally grave damage to the national security

14

SECRET

Red expected to cause serious damage to the national security

15

CONFINDENTIAL

Blue expected to cause damage to the national security

16

UNCLASSIFIED

Green

17

What is need to know

prospective recipient requires access to
specific classified information in order to perform or assist in
the performance of a lawful and authorized government function

18

Investigation TOP SECRET

favorably completed SSBI, SSBI-PR or PPR every 5 years

19

Investigation SECRET

favorably completed NACLC or ANACI every 10 to 15 years

20

Investigation CONFIDENTIAL

favorably completed NACLC or ANACI every 10 to 15 years

21

Investigation SCI

favorably completed SSBI, SSBI-PR or PPR every 5 years

22

SAER

Security Access Eligibility Report - Report on all status changes and incidents which might affect an individuals continued DCID eligibility for access to SCI

23

What should be reported to the SSO

Arrests and convictions, Adverse involvement with law enforcement agencies, Unfavorable credit, Alcohol misuse, Illegal involvement with drugs, Mental health difficulties, Outside employment, Security Violations

24

SF 700

Security Container Information

25

SF 701

Activity Security Checklist

26

SF 702

Security Container Check Sheet

27

SF 703

Top Secret Coversheet

28

SF 312

Classified Non-disclosure agreement

29

SF 153

COMSEC material report

30

When should safe combos be changed

When first installed, when compromised, when someone detaches, when deemed necessary by the SSO. Use form SF 700

31

What is DCS

Defense Courier Services transports SCI material via a secure DOD transport system.

32

What is the purpose of EAP

Emergency Action Plan established policies, outlines responsibilities and general procedures for personnel for the safeguarding, evacuation and/or destruction of SCI and other classified material during emergency situations

33

SCI

Sensitive Compartmental Information

34

Security violations

compromise of classified information to persons not authorized to receive it or a serious failure to comply with the provisions of security regulations which is likely to result in compromise. A security violations requires investigation.

35

Practices Dangerous to Security

failure to comply with the provisions of security regulations which causes a potential compromise of classified information

36

Responsibilities of DONCAF

Department of the Navy, Central Adjudication Facility
NCIS organization, is responsible for determining who within the Department of the Navy is eligible to hold a security clearance

37

How long can a CO suspend access

Up to 90 days

38

Procedures for sanitizing a SCIF

Classified material stored away, lock computer monitors, announce uncleared personnel, escort 100% of the time

39

What’s the navy’s PED policy

No personal electronic devices are allowed within classified spaces

40

What is access

The ability and opportunity to obtain knowledge of classified information

41

Responsibility of persons discovering a compromise

Report immediately

42

What is compromise

A security violation that has resulted in confirmed or suspected exposure of classified information or material to an unauthorized person

43

Procedures for creating classified working papers

Appropriately marked coversheets front and back with date of creation with the notation Working Papers and a general topic.

44

What’s the purpose of an SF 86

Used to determine eligibility for security clearance

45

Procedure for destroying burn bags

Marked with highest classification, marked with personnel authorizing destruction, and j-dial. Approved shredder, pulper, mulcher or incinerator