Topic 6 Flashcards

(36 cards)

1
Q

This involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure.

A

Document and Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any recorded information regardless of its physical form or characteristics.

A

Document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It includes all information concerning documents, cryptographic devices, developed projects and materials following on the categories of Top Secret, Secret, confidential and restricted.

A

Classified Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refers to the assigning of information or material, one of the four security categories after determination has been made that information requires the security protection as provided.

A

Classify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Act of removing the security classification from classified information or matter.

A

Declassify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refers to the act of changing the assigned classification from classified information or matter.

A

Reclassify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Refers to the act of assigning the information or matter to the higher classification assigned to it than that previously.

A

Upgrading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It refers to the grant of access to the classified matter only to properly cleared person when such classified information is required in the performance of their official duties.

A

Compartmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This takes place through the loss of security which results from unauthorized persons obtaining knowledge or classified matters.

A

Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of destroying a document which is no longer significant in the organization.

A

Purging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These are information that in some special way relates to the status or activities of the possessor and over which the possess asserts ownership.

A

Proprietary Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It consist of any formula, pattern, device or compilation of information which is used in one’s business.

A

Trade Secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is a process or device for continuous use in the protection of the business.

A

Trade Secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is a grant made by the govt. to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of 17 years.

A

Patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is a word, phrase, symbol or design, or a combination of words, phrases, symbols or designs, that identifies and distinguishes the source of the goods of one party from those of others.

A

Trademarks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is a type of intellectual property that safeguards original works of authorship as soon as the author fixes the work in a tangible form of expression.

17
Q

The certification by a responsible authority that the person described is cleared for access to classified matter at the appropriate level.

A

Security Clearance Certificate

18
Q

A type of security clearance that is valid for five years unless sooner revoked by the issuing authority.

19
Q

A type of security clearance that is valid for two years unless sooner revoked by the issuing authority.

20
Q

This pertains to thee importance of the firm with reference to the natural economy and security.

A

Relative Criticality

21
Q

This is the susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazards.

A

Relative Vulnerability

22
Q

Any acts or conditions which may result in the compromise of information, loss of life or destruction of property or disruption of the objective of the installation

A

Security Hazards

23
Q

Act of stealing small things or items of little value, especially habitually.

24
Q

One who steals due to his inability to resist the unexpected opportunity and has little fear of detection.

A

Casual Pilferer

25
One who steals with preconceived plans and takes away any or all types of items or supplies for economic gain.
Systematic Pilferer
26
Intentional destruction or the deliberate damaging or destroying of property or equipment.
Sabotage
27
The activity of spying or the use of spying or spies to gather secret information.
Espionage
28
These are activities designed to overthrow the govt. or intended or likely to undermine or overthrow a govt. or other institutions.
Subversive Activities
29
The basic instrument for determining security vulnerability.
Security Survey
30
Is similar to the entrance conference, and it is done after the compilation of the security survey.
Exit conference
30
Is a dialogue between the survey team and the management, and officials of a plant before the security survey is conducted.
Entrance Conference
31
This is conducted to check on the degree of compliance with the recommend countermeasures and to determine the effectiveness and adequacy of the countermeasures which are in effect.
Security Inspection
32
Is one has been so published to the office that all concerned personnel are usually aware of its eminence and may consequently, make such preparations as are necessary.
Announced Security Inspection
33
It is an Inspection whose imminence is known only to certain selected personnel, normally the office head and intelligence personnel of the office to be inspected.
Unannounced Security Inspection
34
It is an inspection conducted in such a manner that office personnel are not aware that such action is taking place.
Penetration Security Inspection
35
A planned and organized determination of facts concerning specific loss or damage of assets due to threats, hazards or unsecured conditions.
Security Investigation