Classification Declassification Safeguarding & Identifying Threats Reporting CI & Threat Info Project Specific Requirements
100
What is Confidential Classification
Release of this level of classified information could result in damage to national security.
100
What is a Downgrading
This is the process in which information is moved to a lower classification when the information no longer requires protection in the interest of national security.
100
Who are Custodians
People who are in possesion of, or who are otherwise charged with safeguarding classified information.
100
Who is Dawn Hagen
This is the person you would report any NON-IMMINENT threats to.
100
What is Locking Your Computer
This security measure should be used anytime you leave your computer.
200
What is Secret Classification
Release of this level of classified information could result in serious damage to national security.
200
What is Declassification
This occurs when a document no longers needs classified protection.
200
What is your head, your hands, and an approved container
These are the only three authorized places you can store classified information.
200
What is the Defense Hotline
You would contact this agency for any threats to national security.
200
What is CAC Card
This security card is used to access many of the tools needed to do your job.
300
What is Top Secret Classification
Release of this level of classified information could result in EXCEPTIONALLY GRAVE DAMAGE to national security.
300
What is Mandatory Declassification Review (MDR)
This process to declassify information is used when somoene from the public submits paperwork requesting the declassification and made available to the public.
300
What is Actual Compromise
This type of compromise occurs when we know for sure that an unauthorized individual had/has access to classified information
300
What is Espionage
The act of obtaining, delivering, transmitting, or communicating, or receiving information about the national defense with an intent to injure the US.
300
What is Secret Classification
This is the classification of our project.
400
What is Original and Derivative Classifiers
These 2 types of people are the only ones with the ability to classify information.
400
What is 25 years
It takes this many years for the Automatic Declassification System to declassify information.
400
What is Counter Intelligence (CI)
The process of indentifying, understanding, prioritizing, and counteracting foreign intelligence threats the United States faces.
400
What is Terrorism
The calculated use of unlawful violence or the threat of unlawful violence to install fear.
400
What is USB
You should never have anything other than your mouse, keyboard, or CAC reader plugged into this port.
500
What is Compilation
This process occures when combining two or more pieces of unclassified information, once combined could warrant protection as classified information.
500
What is Scheduled Declassification
This type of declassification occurs when the instructions assigned by the OCA are followed to declassify it.
500
What is Human Intelligence, Signals Intelligence, Imagery Intelligence, Open Source Intelligence, Measures and Signatures Intelligence
These are 5 information collection methodologies used by possible threats
500
What is a Individual Culpability Report
This report is used when a individual is responsible for a security violation.
500
What is Passwords
These should only be written down if they are locked in your file cabinet.






Security Briefing

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline