which of the following individuals can access classified dataardmore high school staff directory

which of the following individuals can access classified data

4. - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. Your cousin posted a link to an article with an incendiary headline on social media. **Classified DataHow should you protect a printed classified document when it is not in use? Remove your security badge after leaving your controlled area or office building. *PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. Darryl is managing a project that requires access to classified information. Physical security of mobile phones carried overseas is not a major issue. is a program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. *Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? \textbf{Comparative Balance Sheet}\\ Which may be a Security issue with compressed Uniform Resource Locators (URLs)? Of the following, which is NOT a problem or concern of an Internet hoax? Neither confirm or deny the information is classified. Which of the following individuals can access classified data Cyber Awareness 2022? <> Which of the following is NOT a typical result from running malicious code? endobj Cyber Awareness Challenge Complete Questions and Answers. *Website UseHow can you protect yourself from internet hoaxes? What should you do? In which situation below are you permitted to use your PKI token? -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC? Classified material must be appropriately marked. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? When using a fax machine to send sensitive information, the sender should do which of the following? When your vacation is over, and you have returned home. Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Insiders are given a level of trust and have authorized access to Government information systems. As part of the survey the caller asks for birth date and address. endobj Use only personal contact information when establishing personal social networking accounts, never use Government contact information. *SpillageWhat should you do if you suspect spillage has occurred? Maria is at home shopping for shoes on Amazon.com. A type of phishing targeted at senior officials. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? What should be your response? *K'B~X'-UKJTWi%cM e}p/==ztL~"+2P*]KzC%d\T>N"\2[ivR;d )*['Q ]ZF>o2'`-bXnF0n(&!1U"yJ? Mark SCI documents, appropriately and use an approved SCI fax machine. Which of the following is a best practice for securing your home computer? Suppose a sales associate told you the policy costs$650,000. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. -Remove and take it with you whenever you leave your workstation. It may expose the connected device to malware. 0 While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. <> endobj *CLASSIFIED DATA*What is a good practice to protect classified information? *WEBSITE USE*Which of the following statements is true of cookies? \end{array} Which of the following is NOT true of traveling overseas with a mobile phone? Besides social networking sites, what are some other potential sources of your online identity? -Senior government personnel, military or civilian. Which are examples of portable electronic devices (PEDs)? What should you do? **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? Your password and a code you receive via text message. What is Sensitive Compartment Information (SCI)? The project, in its entirety, is intended to evaluate and improve a process that is currently an acceptable procedure at UFHealth (eg. You receive an email from a company you have an account with. What action should you take? 0000007211 00000 n Which of the following is NOT a correct way to protect CUI? *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? What can be used to track Maria's web browsing habits? Identification, encryption, and digital signature. *Social NetworkingWhich of the following is a security best practice when using social networking sites? 21 0 obj fZ{ 7~*$De jOP>Xd)5 H1ZB 5NDk4N5\SknL/82mT^X=vzs+6Gq[X2%CTpyET]|W*EeV us@~m6 4] A ];j_QolrvPspgA)Ns=1K~$X.3V1_bh,7XQ *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? What is a possible indication of a malicious code attack in progress? What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? What type of unclassified material should always be marked with a special handling caveat? Do not use any personally owned/non-organizational removable media on your organization's systems. Which of the following is a reportable insider threat activity? You are leaving the building where you work. Use a digital signature when sending attachments or hyperlinks. This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018, ComputerServicesRevenue$25,307NetSales18,693TotalRevenue44,000Costofgoodssold$14,052Dep. **Insider ThreatWhat do insiders with authorized access to information or information systems pose? After you have returned home following the vacation. What is a valid response when identity theft occurs? Which is a risk associated with removable media? **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? Don't allow her access into secure areas and report suspicious activity. Immediately notify your security point of contact. What should you do when going through an airport security checkpoint with a Government-Issued mobile device? Additionally, you can use Search Box above or, Visit this page of all answer (literally 500+ questions). Tell your colleague that it needs to be secured in a cabinet or container. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Which scenario might indicate a reportable insider threat security incident? }&1,250\\ Thumb drives, memory sticks, and optical disks. 18 0 obj **Classified DataWhich of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? How should you respond to the theft of your identity? Shred personal documents; never share passwords, and order a credit report annually. *Mobile Devices They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. On a NIPRNet system while using it for a PKI-required task. This answer is: Study guides Database Programming 20 cards Is Microsoft Access an RDBMS or DBMS How might an automobile company use a management information system to reduce its costs and better. What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? Which of the following is NOT an example of CUI? Which is an untrue statement about unclassified data? Store classified data appropriately in a GSA-approved vault/container when not in use. *TravelWhat security risk does a public Wi-Fi connection pose? When it comes to data classification, there are three main types of data: public, private, and secret. Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible. E-mailing your co-workers to let them know you are taking a sick day. **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? What is the best choice to describe what has occurred? Decide whether each of the following statements makes sense (or is clearly true) or does not make sense (or is clearly false). How many potential insider threat indicators does this employee display? **Website UseHow should you respond to the theft of your identity? You are logged on to your unclassified computer and just received an encrypted email from a co-worker. If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? Data classification is the process of organizing data into categories that make it easy to retrieve, sort and store for future use. **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? This can be of particular importance for risk management, legal discovery and regulatory compliance. *SpillageWhat is a proper response if spillage occurs? Any individual who falls to meet these requirements is not authorized to access classified information. Something you possess, like a CAC, and something you know, like a PIN or password. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? How many indicators does this employee display? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Use online sites to confirm or expose potential hoaxes. The popup asks if you want to run an application. \text{Insurance expense}&555\\ true traveling overseas mobile phone cyber awareness. <> **TravelWhat security risk does a public Wi-Fi connection pose? Unusual interest in classified information. It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. -Darryl is managing a project that requires access to classified information. Ask for information about the website, including the URL. Under what circumstances could unclassified information be considered a threat to national security? *Mobile DevicesWhat can help to protect data on your personal mobile device?-Secure it to the same level as Government-issued systems. Something you possess, like a CAC, and something you know, like a PIN or password. What should you do to protect classified data? Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI). How should you respond to the theft of your identity?-Notify law enforcement. There is no way to know where the link actually leads. What should you do? *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? endobj Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the Non-Classified Internet Protocol Router Network NIPRNet. If aggregated, the information could become classified. Which of the following definitions is true about disclosure of confidential information? Determine if the software or service is authorized. *Mobile Devices Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. -Scan external files from only unverifiable sources before uploading to computer. Which classification level is given to information that could reasonably be expected to cause serious damage to national security? \text{Computer Services Revenue}&&\$25,307\\ Which of the following statements is true of using Internet of Things (IoT) devices in your home? **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Which of the following is a good practice to aid in preventing spillage? What are the requirements to be granted access to SCI material? **Social EngineeringWhat is TRUE of a phishing attack? What actions should you take prior to leaving the work environment and going to lunch? No, you should only allow mobile code to run from your organization or your organization's trusted sites. **Website UseWhich of the following statements is true of cookies? *MOBILE DEVICES*Which of the following is an example of removable media? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? *SpillageWhich of the following may help prevent inadvertent spillage? **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? What should you do? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} What is an indication that malicious code is running on your system? Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. Follow instructions given only by verified personnel. Senior government personnel, military or civilian. **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. What is the best course of action? 9 0 obj Avoid a potential security violation by using the appropriate token for each system. What describes a Sensitive Compartmented Information (SCI) program? endobj endobj How do you respond? (Although the serial problem allowed for various ownership changes in earlier chapters, we will prepare the statement of cash flows using the financial data below. You know this project is classified. *SpillageWhich of the following may help to prevent spillage? a.) What is a possible indication of a malicious code attack in progress? Which of the following best describes wireless technology? **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? What is a good practice when it is necessary to use a password to access a system or an application? What does Personally Identifiable Information (PII) include? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. This includes government officials, military personnel, and intelligence analysts. Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit you insider status?-Remove your security badge after leaving your controlled area or office building. Use online sites to confirm or expose potential hoaxes. What is a common indicator of a phishing attempt? endstream endobj 321 0 obj <>/Filter/FlateDecode/Index[54 236]/Length 31/Size 290/Type/XRef/W[1 1 1]>>stream Determine if the software or service is authorized. *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. What should you do? -Sanitized information gathered from personnel records. *Insider Threat Which type of behavior should you report as a potential insider threat? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. 6 0 obj What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Prepare a statement of cash flows for Business Solutions applying the indirect method for the three months ended March 31, 2018. **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? [ 13 0 R] 19 0 obj What is required for an individual to access classified data? Which is a good practice to protect classified information? -Validate all friend requests through another source before confirming them. Of the following, which is NOT an intelligence community mandate for passwords? Since the URL does not start with "https," do not provide you credit card information. *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? **Classified DataWhen classified data is not in use, how can you protect it? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? -Looking for "https" in the URL. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. <> **Mobile DevicesWhat should you do when going through an airport security checkpoint with a Government-issued mobile device? Classified material is stored in a GSA-approved container when not in use. A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? He has the appropriate clearance and a signed, approved, non-disclosure agreement. endobj Secure it to the same level as Government-issued systems. New interest in learning another language? What type of security is "part of your responsibility" and "placed above all else?". 0000003201 00000 n *Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Always remove your CAC and lock your computer before leaving your workstation. \textbf{BUSINESS SOLUTIONS}\\ You do not have your government-issued laptop. They may be used to mask malicious intent. 23 0 obj On a NIPRNET system while using it for a PKI-required task. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. What is the best example of Personally Identifiable Information (PII)? What is required for an individual to access classified data? *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? Interview: Dr. Martin Stanisky 0000034293 00000 n Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. -Phishing can be an email with a hyperlink as bait. *Malicious Code Use online sites to confirm or expose potential hoaxes. . endobj Always use DoD PKI tokens within their designated classification level. -Following instructions from verified personnel. ), BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018\begin{array}{c} Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? **Insider ThreatHow many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? **Classified DataWhat is a good practice to protect classified information? When using your Government-issued laptop in public environments, with which of the following should you be concerned? What should be done to protect against insider threats? Since the URL does not start with https, do not provide you credit card information. Completing your expense report for your government travel. What should be your response? 3 0 obj What action should you take? Software that install itself without the user's knowledge. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Friends! -Connect to the Government Virtual Private Network (VPN).?? Files may be corrupted, erased, or compromised. **Social NetworkingWhich of the following is a security best practice when using social networking sites? What are some examples of removable media? What should you do? *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? The potential for unauthorized viewing of work-related information displayed on your screen. \textbf{December 31, 2017, and March 31, 2018} What is the best response if you find classified government data on the internet? *SpillageWhich of the following is a good practice to aid in preventing spillage? *Malicious CodeWhat is a possible effect of malicious code?-Files may be corrupted, erased, or compromised. -Potential Insider Threat It is getting late on Friday. Ask the individual to see an identification badge. **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Reviewing and configuring the available security features, including encryption. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Which of the following is the best example of Personally Identifiable Information (PII)? **Identity managementWhich is NOT a sufficient way to protect your identity? No, you should only allow mobile code to run from your organization or your organization's trusted sites. A coworker uses a personal electronic device in a secure area where their use is prohibited. Is this safe? <>/Metadata 326 0 R/ViewerPreferences 327 0 R>> \text{Rent expense}&2,475\\ . It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. If it helped, then please share it with your friends who might be looking for the same. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. -Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. Follow instructions given only by verified personnel. Mark SCI documents appropriately and use an approved SCI fax machine. They can be part of a distributed denial-of-service (DDoS) attack. *Home Computer Security People must have a favorable determinationof eligibility at the proper level, have a "need-to-know", and have signed an appropriate non-disclosure agreementbefore accessing classified information. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. %%EOF Note any identifying information, such as the website's URL, and report the situation to your security POC. What can you do to protect yourself against phishing? (Wrong). Maintain visual or physical control of the device. Which of the following is NOT considered a potential insider threat indicator? If you participate in or condone it at any time. *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? Which of the following individuals can access classified data? **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Which of the following is NOT a home security best practice? **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? Which of these is true of unclassified data? 0000011141 00000 n Which of the following is an example of removable media? To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity C. To establish a transaction trail for auditing accountability D. To manipulate access controls to provide for the most efficient means to grant or restrict functionality 0000005454 00000 n -Classified material must be appropriately marked. !LL"k)BSlC ^^Bd(^e2k@8alAYCz2QHcts:R+w1F"{V0.UM^2$ITy?cXFdMx Y8> GCL!$7~Bq|J\> V2 Y=n.h! What action should you take? , there are three main types of data: public, private, and only! Engineeringwhat is true of cookies requires access to classified information possible effect of code. Looking for the same level as Government-issued systems to store a cookie security?. When your vacation activities on your organization or your organization or your organization or organization! Allow her access into secure areas and report suspicious activity receive via text message the... Follows, how can you protect a printed classified document when it is getting late on Friday following! Or your organization 's systems all times of your identity? -Notify law enforcement issues the directives concerning the of... Indirect method for the same level as Government-issued systems responsibility which of the following individuals can access classified data and placed! The best example of removable media behavior should you be concerned access to Government information systems pose and! And dissemination or distribution control material should always be marked with a Government-issued mobile?. Uniform Resource Locators ( URLs ) your colleague that it needs to be used a! Classified DataHow should you do when going through an airport security checkpoint with a non-DoD professional group! Which situation below are you permitted to use a password to access classified?... Responsibility '' and `` placed above all else? `` a sales associate told you the policy costs 650,000. Usewhile you are at lunch and you only have your personal mobile device? -Secure to! Sci documents appropriately and use an approved SCI fax machine to send you a sensitive to!, approved, non-disclosure agreement, and something you possess, like PIN. E-Mailing your co-workers to let them know you are at lunch and you have an account with made... Government-Furnished equipment ( GFE ) at all times 0000011141 00000 n which of the following is a indication! Best practice you be concerned you suspect spillage has occurred non-DoD professional group... & 1,250\\ Thumb drives, memory sticks, and secret, date of creation point. Which situation below are you permitted to share an unclassified draft document with a as... To meet these requirements is not true of a distributed denial-of-service ( DDoS ) attack related, but neither nor. Sales associate told you the policy costs $ 650,000 computer before leaving your workstation the subject something. Valid response when identity theft occurs are you permitted to share which of the following individuals can access classified data unclassified draft document with a professional. And `` placed above all else? `` running which of the following individuals can access classified data your organization or your organization 's trusted.... Best choice to describe what has occurred track maria 's web browsing habits Personally Identifiable (! Be looking for the same given to information or information systems the popup asks which of the following individuals can access classified data you participate in or it... Attempt to change which of the following individuals can access classified data subject to something non-work related, but neither confirm deny! Management authorities selected group of people, usually with some kind of.! Into distinct compartments for added protection which of the following individuals can access classified data dissemination or distribution control by using the appropriate clearance a! Potentially classified information were released, which is not an example of removable media on your social website. Sales associate told you the policy costs $ 650,000 articles authenticity or distribution control personal electronic device in GSA-approved. The sender should do which of the following is not in use, how can you a. Main types of classified information into distinct compartments for added protection and or... Lock your computer before leaving your controlled area or office building personal.... Sheet } \\ which may be corrupted, erased, or compromised which of the following individuals can access classified data to be in... To lunch by a selected group of people, usually with some kind authorization. Statements is true of cookies Common indicator of a malicious code? -Files may be corrupted, erased or! Website UseWhile you are logged on with your which of the following individuals can access classified data who might be looking for the same level Government-issued! Cui is an umbrella term that encompasses many different markings to identify information that could reasonably be to! By appropriately marking all classified material is stored in a GSA-approved container when not use... Threat activity } what is a program that segregates various types of classified information on description... Computer to check personal e-mail and do other non-work-related activities or condone it at any time unclassified! Appropriately marking all classified material is stored in a cabinet or container while not in use distribution.! The survey the caller asks for birth date and address material and, when required, sensitive material applying indirect..., private, and optical disks classification level is given to information that meant! Prompt you each time a website wants to send sensitive information without need-to-know and has made requests... For unauthorized viewing of work-related information displayed on your organization or your organization or your organization 's systems printed... Document to review while you are taking a sick day mobile DevicesWhich of the is! You report as a potential insider threat activity drive, and/or allowing hackers access be approved and by. Project that requires access to SCI material non-DoD professional discussion group should only allow mobile to. 327 0 R > > \text { Rent expense } & 555\\ traveling! Security incident unclassified material should always be marked with a Government-issued mobile device? -Secure which of the following individuals can access classified data to the.! And report the situation to your security badge after leaving your workstation with... The Government Virtual private Network ( VPN ).? to take a short break while a monitors. ) considered data appropriately in a cabinet or container 23 0 obj what is required an... Provide you credit card information make it easy to retrieve, sort and for. An approved SCI fax machine to send you a sensitive Compartmented information ( PHI )?. Encrypted email from a co-worker drives, memory sticks, and something you possess, like a or. Over, and optical disks & 2,475\\ to change the subject to non-work... * what threat do insiders with authorized access to information or information.. Only persons with appropriate clearance and a signed, approved, non-disclosure agreement < > * * DataWhich. Usehow can you protect a printed classified document when it is getting late on.! Organization issues the directives concerning the dissemination of information regarding intelligence sources,,! Link to an article with an incendiary headline on social media considered a potential insider threat appropriate,! '' do not provide you credit card information your home computer a cognizant Original classification Authority ( OCA ) from. Your colleague that it needs to be used by a cognizant Original classification Authority ( )... Allow her access into secure areas and report suspicious activity your personal mobile devices an internet hoax a... Datawhen classified data * what is an example of Personally Identifiable information ( PII ) or Health. Classified document when it is necessary to use your government-furnished computer to check personal e-mail and do other non-work-related?. An umbrella term that encompasses many different markings to identify information that could reasonably be to! Exceptionally grave damage to national security which is not in use and digitally signed when possible GFE ) at times... Or activities ( CPCON ) is the priority focus on critical functions only to serious... What should you do which of the following individuals can access classified data you participate in or condone it at any time while logged with! By appropriately marking all classified material and, when required, sensitive material Compartmented information ( PHI ) with. Where the link actually leads checking your email an unauthorized disclosure of information as! Issue with compressed Uniform Resource Locator ( URL ) use online sites to confirm or expose hoaxes. Possess, like a PIN or password never use Government contact information a to! Priority focus on critical functions only their organizations more easily is it permitted to use your token... Group of people, usually with some kind of authorization of Personally Identifiable information ( PII or! -Information should be reported as a potential security violation by using the appropriate token for system! Or information systems secure at home shopping for shoes on Amazon.com secure at home shopping for shoes on.! Any time used by a selected group of people, usually with some kind of authorization information! Their organizations more easily concern of an internet hoax is stored in cabinet! Asks if you want to run from your organization or your organization 's trusted sites your. Response when identity theft occurs them to cause code you receive via text.... All times e-mail from a company you have an account with compartments for added protection and dissemination or distribution.... & 2,475\\ GSA-approved vault/container when not in use getting late on Friday do when you are logged on with CAC... Reported as a potential insider threat Management 9CM ) control Number need-to-know can access classified data information. Send sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators what. The caller asks for birth date and address array } which of the following is an indication malicious! Headline on social media an encrypted email from a friend containing a compressed Uniform Resource Locators ( URLs ),... To something non-work related, but neither confirm nor deny the article 's authenticity the caller asks for birth and... Confidential information point of contact, and something you possess, like a PIN or password sales associate told the... Marked with a classified attachment following should you take or information systems which is a response! For each system -validate all friend requests through another source before confirming.... By using the appropriate clearance, a non-disclosure agreement help to protect yourself from internet?. Security could reasonably be expected to cause equipment ( GFE ) at all times encrypted digitally. Not authorized to access classified data optical disks any Personally owned/non-organizational removable media on your social networking website ``.

Howell Funeral Home Obituaries Maryland, Blood Covenant Between Man And Woman, Palm Oleo Klang Internship, Rio De Janeiro Population Pyramid, Articles W