Term
Discuss the Navy’s policy on PED within classified spaces |
|
Definition
All members upon check-in are briefed and acknowledge the prohibited items list for the command/campus. All cellular telephones, pagers, PDAs and two way radios that transmit are prohibited |
|
|
Term
Explain Security Challenges Procedures |
|
Definition
Immediately upon noticing a person without the proper badge displayed or escort present, escort individual out of the space and report to the Command Security Manager (CSM – LCDR Sandoval) |
|
|
Term
|
Definition
Information that if released would cause exceptionally grave damage to national security. Must maintain a system to record the receipt, reproduction, transfer, transmission, downgrading, declassification and destruction of information |
|
|
Term
|
Definition
Information that if released would cause serious damage to national security |
|
|
Term
|
Definition
Information that if released would cause damage to national security |
|
|
Term
|
Definition
Information relating to North Atlantic Treaty Organization |
|
|
Term
|
Definition
Information pertaining to Combined Maritime Forces Command |
|
|
Term
|
Definition
Classification representing Australia, Canada, New Zealand, United Kingdom and United States |
|
|
Term
|
Definition
Classification representing Australia, Canada, Great Britain and United State |
|
|
Term
Sensitive but Unclassified |
|
Definition
Information that is not classified but could cause harm, such as PII |
|
|
Term
|
Definition
Information that is unclassified but could impact OPSEC |
|
|
Term
|
Definition
Personally Identifiable Information |
|
|
Term
|
Definition
Information not releasable to any foreign nationals |
|
|
Term
Controlled Unclassified Information |
|
Definition
Sensitive / Controlled Unclassified data. |
|
|
Term
|
Definition
Originated controls dissemination and / or release of the document |
|
|
Term
|
Definition
No classified information |
|
|
Term
Discovery of a Compromise |
|
Definition
An individual discovering a compromise shall immediately notify their Command Security Manager. Upon his/her investigation a report will be filed to proper authority. If it is believed that the Command Security Manager is involved, the individual shall report it to the next higher person |
|
|
Term
|
Definition
The ability and opportunity to obtain knowledge or possession of classified information |
|
|
Term
|
Definition
The exposure of classified information to an unauthorized person. |
|
|
Term
|
Definition
A message or information that has a specific recipient |
|
|
Term
What is Physical Security |
|
Definition
Measures take to preclude unauthorized access to a mechanism, Facility or information |
|
|
Term
What is the requirement for transporting classified material |
|
Definition
Command Security Manager shall ensure that only appropriately cleared personnel or authorized carriers are to transport classified information the means selected should minimize the risk of a loss or compromise while permitting the use of the most cost-effective mode of transport |
|
|
Term
What items are required to transport classified material |
|
Definition
-Courier Card -Signed Form 10 -Equivalent security clearance for items being carried. |
|
|
Term
What are the 8 reasons a Security Clearance could be revoked/Suspended |
|
Definition
Reoccurring patter of questionable judgment Emotionally unstable behavior Dishonorable discharge Unreported finical problems Using unlawful controlled substances Mentally incompetent Convicted of a crime in U.S. courts and consequently serve one year incarcerate |
|
|
Term
WHAT IS SENSITIVE COMPARTMENTED INFOMRATION |
|
Definition
In a vault, modular vault or secure room equipped with an Intrusion Detection System and a personnel response to the alarm within 15 minuets of the alarm annunciation if the area is covered by security in depth |
|
|
Term
How do you store, control and safeguard TOP SECRET information |
|
Definition
In the same manner prescribed for SCI. |
|
|
Term
How do you store, control and safeguard SECRET information |
|
Definition
In the same manner prescribed for Top Secret. |
|
|
Term
How do you store, control and safeguard CONFIDENTIAL information |
|
Definition
Store Confidential information the same manner prescribed for Top Secret except that supplemental controls are not required. |
|
|
Term
What the requirements for accrediting a SCIF |
|
Definition
SCIFs are accredited through GSA |
|
|
Term
how do you properly dispose of SCI hard drive |
|
Definition
Under Normal conditions follow SECNAVINST 5510.36 Information Security program guidance. Under emergency actions follow BHRINST 5511.3J Emergency action and Destruction Plan |
|
|
Term
how to properly dispose of a GENSER hard drive and a UNCLASS hard drive |
|
Definition
SECNAVINST 5510.36 Information Security Program guidance |
|
|
Term
What's the purpose of an SF86 |
|
Definition
Questionnaire for National Security Position; background investigation to determine suitability for sensitive positions |
|
|
Term
What are the procedures for Destruction of burn bags that contain classified material |
|
Definition
Depends on the classification level |
|
|
Term
What are the procedures for Destruction of classified CD/DVDs |
|
Definition
|
|
Term
What are the procedures for Reporting security violation or compromise |
|
Definition
Report to Supervisor, CMS, SSO Self reporting |
|
|
Term
What are the procedures for Unofficial foreign travel while holding a SCI clearance |
|
Definition
Conducted by SSO and noted in file |
|
|
Term
What are the procedures for SAER (Security Access Eligibility Report) |
|
Definition
report incidents via JPAS |
|
|
Term
What is the purpose of Classified markings/stickers |
|
Definition
Markings is required on all information technology (IT) systems and electronic media , including removable components that contain classified information. |
|
|
Term
What is the purpose of Standard Form 700 |
|
Definition
700 is a form that contains vital information about the security containers in which it is located. |
|
|
Term
What is the purpose of Standard From 702 |
|
Definition
This form is used to record who opens the container, closes the container, and does the check at the end of the day |
|
|