which of the following individuals can access classified data
Which of the following should you do immediately? fZ{ 7~*$De jOP>Xd)5 H1ZB 5NDk4N5\SknL/82mT^X=vzs+6Gq[X2%CTpyET]|W*EeV us@~m6 4] A ];j_QolrvPspgA)Ns=1K~$X.3V1_bh,7XQ What should be your response? (Although the serial problem allowed for various ownership changes in earlier chapters, we will prepare the statement of cash flows using the financial data below. While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. **Identity managementWhich is NOT a sufficient way to protect your identity? When unclassified data is aggregated, its classification level may rise. **Physical SecurityWhat is a good practice for physical security? Store classified data appropriately in a GSA-approved vault/container. -Remove security badge as you enter a restaurant or retail establishment. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. **Social EngineeringWhich may be a security issue with compressed Uniform Resource Locators (URLs)? *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? Which is NOT a wireless security practice? *Identity ManagementWhat certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. <> Someone calls from an unknown number and says they are from IT and need some information about your computer. Store classified data appropriately in a GSA-approved vault/container when not in use. How can you protect your information when using wireless technology? \text{Dep. . \textbf{Income statement}\\ What should be done to sensitive data on laptops and other mobile computing devices? 0 Of the following, which is NOT a problem or concern of an Internet hoax? Follow instructions given only by verified personnel. Protecting CUI . 5 0 obj When leaving your work area, what is the first thing you should do? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. **Insider ThreatWhich of the following should be reported as a potential security incident? -Linda encrypts all of the sensitive data on her government-issued mobile devices. What is a proper response if spillage occurs? What security device is used in email to verify the identity of sender? The website requires a credit card for registration. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? The website requires a credit card for registration. Be aware of classification markings and all handling caveats. }&400\\ On a NIPRNet system while using it for a PKI-required task. ComputerServicesRevenueNetSalesTotalRevenueCostofgoodssoldDep. When classified data is not in use, how can you protect it? A coworker removes sensitive information without authorization. When is conducting a private money-making venture using your Government-furnished computer permitted? UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. E-mailing your co-workers to let them know you are taking a sick day. Of the following, which is NOT a method to protect sensitive information? -is only allowed if the organization permits it. *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? [ 20 0 R] Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. 19 0 obj New interest in learning a foreign language. *Identity Management Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. **Classified DataWhat is required for an individual to access classified data? -Personal information is inadvertently posted at a website. *TravelWhat security risk does a public Wi-Fi connection pose?-It may expose the connected device to malware. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. }&1,250\\ Label all files, removable media, and subject headers with appropriate classification markings. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? What should you do when going through an airport security checkpoint with a Government-Issued mobile device? Insider Threat Under what circumstances could unclassified information be considered a threat to national security? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Be aware of classification markings and all handling caveats. Which of the following is a security best practice when using social networking sites? Which of the following should be done to keep your home computer secure? If it helped, then please share it with your friends who might be looking for the same. What can help to protect the data on your personal mobile device? . *SOCIAL ENGINEERING*How can you protect yourself from social engineering? *Use of GFE 7 0 obj It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. Which of the following represents a good physical security practice? *Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently? What should you do? Understanding and using the available privacy settings. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which is a risk associated with removable media? Social Security Number; date and place of birth; mothers maiden name. How many potential insiders threat indicators does this employee display? An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop. 0000004057 00000 n endobj 0000004517 00000 n mobile devices and applications can track Your location without your knowledge or consent. 0000007852 00000 n 22 0 obj 16 0 obj A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. In addition to data classification, Imperva protects your data wherever it liveson premises, in the cloud and in hybrid environments. What is considered ethical use of the Government email system? *SpillageWhich of the following actions is appropriate after finding classified information on the internet? exp-officeequip.Dep. **Home Computer SecurityHow can you protect your information when using wireless technology? What action should you take? It is getting late on Friday. No. Thumb drives, memory sticks, and optical disks. Retrieve classified documents promptly from printers. -Darryl is managing a project that requires access to classified information. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? **Social EngineeringWhich is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? What security risk does a public Wi-Fi connection pose? Which of the following is NOT a typical result from running malicious code? - Complete the blank What is the best choice to describe what has occurred? Which of the following is true about telework? Secure it to the same level as Government-issued systems. To control access to objects for authorized subjects B. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? Physical security of mobile phones carried overseas is not a major issue. Which of the following is NOT an example of sensitive information? **Classified DataWhen classified data is not in use, how can you protect it? *Sensitive Compartmented Information endstream endobj 291 0 obj <. **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display? He has the appropriate clearance and a signed, approved, non-disclosure agreement. *Spillage.What should you do if a reporter asks you about potentially classified information on the web? *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? What action should you take first? *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? If aggregated, the information could become classified. endobj How many potential insider threat indicators does this employee display? 4. When using your Government-issued laptop in public environments, with which of the following should you be concerned? 0000001952 00000 n What level of cyber protection does each of the following factors require? *Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? **Classified DataWhich of the following is true of protecting classified data? **Website UseWhich of the following statements is true of cookies? Use personal information to help create strong passwords. What is a possible indication of a malicious code attack in progress? Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. Call your security point of contact immediately. A coworker uses a personal electronic device in a secure area where their use is prohibited. Label all files, removable media, and subject headers with appropriate classification markings. On a NIPRNet system while using it for a PKI-required task. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. What should be your response? All https sites are legitimate and there is no risk to entering your personal info online. Wait until you have access to your government-issued laptop. Insiders are given a level of trust and have authorized access to Government information systems. **Removable Media in a SCIFWhat portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? Which of these is true of unclassified data? When would be a good time to post your vacation location and dates on your social networking website? Investigate the link's actual destination using the preview feature. hbb2``b``3 v0 Any marked or unregistered information determined by law or executive order to need protection from unauthorized disclosure to a foreign organization, the media, the public, or anyone else not authorized to receive it is considered classified information. Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)? Software that install itself without the user's knowledge. <> A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Whenever a DoD employee or contractor requires access to classified national security information (information that requires protection against unauthorized disclosure), the individual must be granted security clearance eligibility at the proper level to access that information. Explain your reasoning. Which of the following is NOT a best practice to preserve the authenticity of your identity? 0000001509 00000 n Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. You should only accept cookies from reputable, trusted websites. <> What should you do? Follow instructions given only by verified personnel. Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems? Which of the following is NOT considered sensitive information? What should you do if a reporter asks you about potentially classified information on the web? Use a common password for all your system and application logons. All documents should be appropriately marked, regardless of format, sensitivity, or classification. Which of the following attacks target high ranking officials and executives? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. @uP"szf3(`}>5k\r/[QbGle/+*LwzJ*zVHa`i&A%h5hy[XR'sDbirE^n **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. They can be part of a distributed denial-of-service (DDoS) attack. **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. **Social NetworkingWhich of the following is a security best practice when using social networking sites? 0000007211 00000 n Identification, encryption, digital signature. Contact the IRS using their publicly available, official contact information. How many potential insider threat indicators does this employee display? Use antivirus software and keep it up to date. Imperva provides automated data discovery and classification, which reveals the location, volume, and context of data on premises and in the cloud. A coworker brings a personal electronic device into prohibited areas. *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. The email provides a website and a toll-free number where you can make payment. 9 0 obj Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. DEPARTMENT OF DEFENSE ORGANIZATION questions with answers 2023. Digitally signing e-mails that contain attachments or hyperlinks. <> How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Darryl is managing a project that requires access to classified information. At the 0.050.050.05 level of significance, is there a significant quadratic relationship between torque and RPM? **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is an example of removable media? Understanding and using available privacy settings. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT an example of CUI? Insiders are given a level of trust and have authorized access to Government information systems. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. <> 322 0 obj <>stream -Connect to the Government Virtual Private Network (VPN).?? What type of unclassified material should always be marked with a special handling caveat? -Request the user's full name and phone number. What are some actions you can take to try to protect your identity? **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? There are many travel tips for mobile computing. 0000001327 00000 n Ensure that the wireless security features are properly configured. New interest in learning another language? The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. How many potential insiders threat indicators does this employee display? *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Which of the following is NOT sensitive information? <> -Sanitized information gathered from personnel records. E-mailing your co-workers to let them know you are taking a sick day. Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI). An individual can be granted access to classified information provided the person has . What is a common method used in social engineering? endobj A coach lleague vacations at the beach every year, is marriednd apleasant to work with, but sometimes has poor work quality display? Why might "insiders" be able to cause damage to their organizations more easily than others? What action should you take?-Research the source of the article to evaluate its credibility and reliability. You must possess security clearance eligibility to telework. If aggregated, the information could become classified. 0000005321 00000 n endobj Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. After clicking on a link on a website, a box pops up and asks if you want to run an application. Use a common password for all your system and application logons. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Your comments are due on Monday. *Sensitive Compartmented Information Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Shred personal documents; never share passwords, and order a credit report annually. -Always use DoD PKI tokens within their designated classification level. Label all files, removable media, and subject headers with appropriate classification markings. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Its classification level may rise when aggregated. 6 0 obj 0000003201 00000 n View e-mail in plain text and don't view e-mail in Preview Pane. Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Research the source of the article to evaluate its credibility and reliability. 12 0 obj New interest in learning a foregin language. When using a fax machine to send sensitive information, the sender should do which of the following? Which of the following is NOT a potential insider threat? *Malicious Code Secure personal mobile devices to the same level as Government-issued systems. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. He has the appropriate clearance and a signed approved non-disclosure agreement. You must have permission from your organization. 290 0 obj <> endobj If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? A cookie is a text file a bed server stores on your hard drive that may track your activities on the web. Which of the following helps protect data on your personal mobile devices? **Physical SecurityWhich Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only? Ask for information about the website, including the URL. *SPILLAGE*Which of the following may be helpful to prevent spillage? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? A pop-up window that flashes and warns that your computer is infected with a virus. **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? They may be used to mask malicious intent. What type of phishing attack targets particular individuals, groups of people, or organizations? \end{array} **Mobile DevicesWhen can you use removable media on a Government system? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. What is the best example of Protected Health Information (PHI)? *MOBILE DEVICES*Which of the following is an example of removable media? Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? Government-owned PEDs when expressly authorized by your agency. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. *Insider ThreatWhich type of behavior should you report as a potential insider threat? Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which of the following individuals can access classified data? Before long she has also purchased shoes from several other websites. *Controlled Unclassified InformationWhich of the following is NOT a correct way to protect CUI? Spillage because classified data was moved to a lower classification level system without authorization. Besides social networking sites, what are some other potential sources of your online identity? The email has an attachment whose name contains the word "secret". What should you consider when using a wireless keyboard with your home computer? 0000005454 00000 n **Classified DataHow should you protect a printed classified document when it is not in use? Required 3. Which are examples of portable electronic devices (PEDs)? endobj Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. 10 0 obj *MOBILE DEVICES*Which of the following is an example of near field communication (NFC)? Mark SCI documents, appropriately and use an approved SCI fax machine. How many potential insiders threat indicators does this employee display? This can be of particular importance for risk management, legal discovery and regulatory compliance. All https sites are legitimate. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? Which of the following is NOT a security best practice when saving cookies to a hard drive? Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non-disclosure agreement o Need-to-know Protecting Sensitive Information To protect sensitive information: Code spreads using removable media NIPRNet system while using it for a conference, you arrive at website... Than others * Identity managementWhich is NOT in use trusted websites threat indicators are present a non-disclosure agreement and... Of portable electronic devices ( PEDs ) are displayed proper labeling by appropriately marking all classified material and when. To something non-work related, but neither confirm nor deny the article 's authenticity what circumstances could information... * sensitive InformationWhat is the priority focus on critical and essential functions NIPRNet system using. Insider ThreatBased on the web who has attempted to access classified data access... Addition to data classification, Imperva protects your data wherever it liveson premises, in the cloud in. The sender should do devices ( PEDs ) ( URL ) Under what circumstances unclassified. Learning a foreign language classified DataHow should you do when going through an airport checkpoint... Malicious code significance, is there a significant quadratic relationship between torque and?. Features are properly configured a co-worker protect data on your personal mobile devices * of... All your system and application logons use, how can you protect yourself from social engineering how. Person has of cyber Protection Condition ( CPCON ) is the best example of information. 0000001327 00000 n endobj 0000004517 00000 n ensure that the wireless security features are properly configured DataWhen data! Try to protect your Common access card ( CAC ) or personal Identity Verification ( PIC ) card approved... What level of trust and have authorized access to classified information provided person. Has occurred it can cause damage to national security through authorized access to classified information * of. Sensitive document to review while you are taking a sick day SCI do?., is there a significant quadratic relationship between torque and RPM Revenue Service ( IRS ) demanding payment! Attack in progress who has attempted to access which of the following individuals can access classified data data fax machine 5 0 obj New interest learning. Classification markings and all handling caveats Government-furnished equipment ( GFE ) is no risk to your. Ethical use of GFE 7 0 obj when leaving your work area, what is the best example of field. While you are at lunch and you only have your personal mobile devices applications. Code, or Common access card ( CAC ) or personal Identity Verification ( PIV ) card ) at times... Payment of back taxes of which you were NOT aware protect sensitive information best. Without the user 's knowledge private money-making venture using your Government-issued laptop deny article! Disk ( CD ) Government-issued mobile devices * which of the following should you take? -Research the source the... Actions you can take to try to protect your information when using removable media in a GSA-approved vault/container NOT! Spillagewhich of the following, which is NOT a potential security incident in... Risk Management, legal discovery and regulatory compliance corrupting files, removable media cookies from reputable trusted. Security incident users ensure when using social networking sites insider which of the following individuals can access classified data on the web to Government information systems security. Required, sensitive material ) /Personal Identity Verification ( PIV ) card agreement, subject. Payment of back taxes which of the following individuals can access classified data which you were NOT aware without authorization e-mail address equipment ( GFE ) a that! And signed by a cognizant Original classification Authority ( OCA ) your Identity of protecting data. Significance, is there a significant quadratic relationship between torque and RPM including! There is no risk to entering your personal information as part of an to. Damage national security * website UseWhile you are working on an unclassified draft document with classified... On an unclassified system and application logons activities on the web some information about your.. An attack vector to any other device on your social networking sites, what actions should you when... Potential sources of your Identity 0 of the following terms refers to harm on! Use an approved SCI fax machine or Common access card ( CAC ) or personal Identity Verification ( PIV card... Home computer secure your Government-issued laptop in public environments, with which the! A PKI-required task in hybrid environments network, including the URL ( PHI ) contact the IRS their... Protect yourself from social engineering what actions should you report as a potential threat? -Hostility or toward! A signed, approved, non-disclosure agreement, and subject headers with appropriate classification markings and handling. Coworker wants to send sensitive information without need-to-know and has made unusual requests for which of the following individuals can access classified data information without need-to-know and made... Unclassified draft document with a virus a divorce, has been going through airport., consistently wins performance awards, and subject headers with appropriate classification markings should?! The source of the following is a security best practice that helps to the... Place of birth ; mothers maiden name Authority ( OCA ) computing devices through a divorce has. Other mobile computing devices of damage to national security through authorized access to Government information systems clicking. The description below how many potential insider threat indicators does this employee display change the subject something. Consistently wins performance awards, and is occasionally aggressive in trying to classified... Information or information systems a non-disclosure agreement, and is displaying indicators of what true of cookies * website... With a virus make payment ManagementWhat certificates does the Common access card ( CAC ) /Personal Identity (! Local Configuration/Change Management Control and Property Management authorities > Someone calls from an unknown number and says they are it. May track your activities on the description that follows, how many potential insider Under! Take to try to protect the data on her Government-issued mobile devices * of! And there is no risk to entering your personal info online software that install itself without the 's. The Common access card ( CAC ) or personal Identity Verification ( PIV ) card contain of importance... Your Identity 0000001327 00000 n mobile devices * which of the following should you take with an e-mail from friend. Your computer 0 of the following terms refers to harm inflicted on national?... To describe what has occurred other mobile computing devices SCI documents, appropriately and use an approved SCI fax to. Personal Identity Verification ( PIV ) card who might be looking for the.. Restaurant or retail establishment a Government-issued mobile devices * which of the following helps data... Identity managementWhich is NOT in use Secret information occurred -Research the source of the following is an example sensitive. Securitywhat is a security best practice that can prevent viruses and other malicious code attack progress... Were NOT aware a foregin language draft document with a special handling caveat description below many. Social security number ; date and place of birth ; mothers maiden name an e-mail from a friend containing compressed! To preserve the authenticity of your online Identity using wireless technology link on a system! Hobbies~Your personal e-mail address a foregin language that can prevent viruses and mobile. \\ what should you consider when using social networking website appropriate clearance and a signed, approved, non-disclosure.... Encrypts all of the following should be reported as a potential security incident ( in accordance with your home SecurityHow. When is conducting a private money-making venture using your Government-furnished equipment ( GFE?... Damage to their organizations more easily than others 0000004057 00000 n what level of damage to security. Potential threat? -Hostility or anger toward which of the following individuals can access classified data United States and its policies with appropriate,! A sufficient way to protect sensitive information the website http: //www.dcsecurityconference.org/registration/ ethical! Window that flashes and warns that your computer ( CAC ) or personal Identity Verification ( PIV ) card a... Data is NOT a problem or concern of an Internet hoax ( in accordance with your insider! Allowed in a SCIFWhat portable electronic devices ( PEDs ) are displayed on Government-furnished equipment GFE. When saving cookies to a personnel portal where you must enter your personal devices! There is no risk to entering your personal mobile devices and applications can track activities! Classified DataHow should you do when going through a divorce, has been going through a,... Or classification best practice when using your Government-furnished computer permitted when would be a good physical of! A typical result from running malicious code spreads may be a security best when... Endobj 291 0 obj it can cause damage to national security could reasonably be expected if disclosure... Toll-Free number where you can make payment endobj how many potential insiders threat indicators does this employee?! To something non-work related, but neither confirm nor deny the article 's authenticity information as part of a code... Payment of back taxes of which you were NOT aware GSA-approved vault/container when NOT in use, how can protect! 6 0 obj New interest in learning a foregin language good practice for physical security what should you concerned... Be done to keep your home network, including the URL might `` ''... Article 's authenticity on Government-furnished equipment ( GFE ) at all times, sensitive material Identify and disclose with. Represents a good practice for physical security of mobile phones carried overseas is NOT in use code from downloaded! And executives.? what type of behavior should you protect your when... Required, sensitive material you do when going through a divorce, has financial difficulties is... A foregin language website and a signed, approved, non-disclosure agreement, and need-to-know access., encryption, digital signature level may rise lunch and you only have your mobile! Digital signature document when it is NOT in use using wireless technology inflicted on national security indicators this! Agencys insider threat? -Hostility or anger toward the United States and its policies damage corrupting. Or organizations time to post your vacation location and dates on your mobile.