which of the following individuals can access classified data

**Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Unusual interest in classified information. <> Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. What action should you take? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. *Mobile DevicesWhat can help to protect data on your personal mobile device?-Secure it to the same level as Government-issued systems. Note any identifying information, such as the websites URL, and report the situation to your security POC. Which of the following statements is NOT true about protecting your virtual identity? An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? Which must be approved and signed by a cognizant Original Classification Authority (OCA)? **Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. Don't allow her access into secure areas and report suspicious activity. 23 0 obj **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. It may expose the connected device to malware. Interview: Dr. Martin Stanisky *Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented Information (SCI)? *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? A colleague often makes other uneasy with her persistent efforts to obtain information about classified project where she has no need to know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. What is a proper response if spillage occurs? What is a common indicator of a phishing attempt? He has the appropriate clearance and a signed approved non-disclosure agreement. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? *Social Engineering **Classified DataWhich type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? 16 0 obj What should you do? Reviewing and configuring the available security features, including encryption. 6 0 obj Be aware of classification markings and all handling caveats. Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? A coworker uses a personal electronic device in a secure area where their use is prohibited. Use personal information to help create strong passwords. Media containing Privacy Act information, PII, and PHI is not required to be labeled. Thumb drives, memory sticks, and optical disks. Given that limx1f(x)=5\lim_{x\rightarrow1}f(x)=-5limx1f(x)=5 and limx1g(x)=4\lim_{x\rightarrow1}g(x)=4limx1g(x)=4, find the indicated limits. What can help to protect the data on your personal mobile device? Wait until you have access to your government-issued laptop. Baker was Ms. Jones's psychiatrist for three months. *Insider ThreatWhat threat do insiders with authorized access to information or information systems pose?-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? An individual can be granted access to classified information provided the person has . You are reviewing your employees annual self evaluation. -It is inherently not a secure technology. Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). Below are most asked questions (scroll down). What advantages do insider threats have over others that allows them to be able to do extraordinary damage to their Is it okay to run it? 0000034293 00000 n Use online sites to confirm or expose potential hoaxes. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. *Malicious CodeAfter visiting a website on your Government device, a popup appears on your screen. Which of the following is required to access classified information? What information relates to the physical or mental health of an individual? 0000001509 00000 n . Insiders are given a level of trust and have authorized access to Government information systems. *REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? *Sensitive Compartmented InformationWhat is a Sensitive Compartmented Information (SCI) program? . Secure it to the same level as Government-issued systems. Explain your reasoning. Which of the following is true of Internet hoaxes? 0 **Social EngineeringWhich is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Which of the following helps protect data on your personal mobile devices? a.) Why might "insiders" be able to cause damage to their organizations more easily than others? **Home Computer SecurityWhat should you consider when using a wireless keyboard with your home computer? Since the URL does not start with https, do not provide you credit card information. Your password and a code you receive via text message. *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? *Sensitive Compartmented Information 24 0 obj Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. On a NIPRNet system while using it for a PKI-required task. **TravelWhich of the following is a concern when using your Government-issued laptop in public? Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? Senior government personnel, military or civilian. Understanding and using the available privacy settings. Which of the following is NOT Government computer misuse? 12 0 obj <> How should you respond? When using your government-issued laptop in public environments, with which of the following should you be concerned? When is conducting a private money-making venture using your Government-furnished computer permitted? When it comes to data classification, there are three main types of data: public, private, and secret. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Of the following, which is NOT a characteristic of a phishing attempt? *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Store it in a General Services Administration (GSA)-approved vault or container. After visiting a website on your Government device, a popup appears on your screen. ~A coworker brings a personal electronic device into a prohibited area. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. exp - computer equip. When unclassified data is aggregated, its classification level may rise. Of the following, which is NOT a problem or concern of an Internet hoax? **Identity managementWhich of the following is NOT a best practice to preserve the authenticity of your identity? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. **Insider ThreatWhich type of behavior should you report as a potential insider threat? They may be used to mask malicious intent. When classified data is not in use, how can you protect it? A type of phishing targeted at senior officials. +"BgVp*[9>:X`7,b. Which of the following individuals can access classified data Cyber Awareness 2022? 5 0 obj *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? **Classified DataWhat is required for an individual to access classified data? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. What should you do? *Malicious CodeWhat is a possible effect of malicious code?-Files may be corrupted, erased, or compromised. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? *Home Computer Security If aggregated, the information could become classified. Connect to the Government Virtual Private Network (VPN). You receive an email from a company you have an account with. 13 0 obj Hostility and anger toward the United States and its policies. Store it in a shielded sleeve to avoid chip cloning. What are some examples of removable media? What is a common method used in social engineering? Decide whether each of the following statements makes sense (or is clearly true) or does not make sense (or is clearly false). On a NIPRNet system while using it for a PKI-required task. Select the information on the data sheet that is protected health information (PHI). endobj 0000005958 00000 n *Mobile Devices \text{Insurance expense}&555\\ 3 0 obj endobj A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? Something you possess, like a CAC, and something you know, like a PIN or password. 0000006504 00000 n -Ask them to verify their name and office number. Is this safe? **TravelWhat is a best practice while traveling with mobile computing devices? Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. The website requires a credit card for registration. <> *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Which of the following is a best practice for securing your home computer? Which of these is true of unclassified data?-Its classification level may rise when aggregated. **Physical SecurityWhat is a good practice for physical security? <> [ 13 0 R] Use only your personal contact information when establishing your account, *Controlled Unclassified InformationSelect the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI), Jane JonesSocial Security Number: 123-45-6789, *Controlled Unclassified InformationSelect the information on the data sheet that is protected health information (PHI), Interview: Dr. Nora BakerDr. startxref DEPARTMENT OF DEFENSE ORGANIZATION questions with answers 2023. *Malicious CodeWhich of the following statements is true of cookies? <> -Always use DoD PKI tokens within their designated classification level. Hostility or anger toward the United States and its policies. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. [ 20 0 R] Based on the description that follows, how many potential insider threat indicator(s) are displayed? When would be a good time to post your vacation location and dates on your social networking website? What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? 17.41 Access to classified information. *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? *Insider ThreatWhich of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. !LL"k)BSlC ^^Bd(^e2k@8alAYCz2QHcts:R+w1F"{V0.UM^2$ITy?cXFdMx Y8> GCL!$7~Bq|J\> V2 Y=n.h! What is a way to prevent the download of viruses and other malicious code when checking your e-mail? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? Immediately notify your security point of contact. 1312.23 Access to classified information. What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? Its classification level may rise when aggregated. **Classified DataWhen classified data is not in use, how can you protect it? 0000000975 00000 n -is only allowed if the organization permits it. **Mobile DevicesWhat should you do when going through an airport security checkpoint with a Government-issued mobile device? <> \text{Rent expense}&2,475\\ Use a single, complex password for your system and application logons. *Malicious CodeWhat are some examples of malicious code? What can you do to protect yourself against phishing? In which situation below are you permitted to use your PKI token? Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? Which of the following is true about telework? What threat do insiders with authorized access to information or information Systems pose?? :qanB6~}G|`A(z* 4-npeQ ZAM+VP( CyEaSQ6%+$,k5n:rQ7N~,OZEH&"dI'o)3@:# 8I |HBkd What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. \textbf{BUSINESS SOLUTIONS}\\ What information posted publicly on your personal social networking profile represents a security risk? Which is NOT a method of protecting classified data? Besides social networking sites, what are some other potential sources of your online identity? Which of the following is an example ofmalicious code? You must possess security clearance eligibility to telework. What actions should you take prior to leaving the work environment and going to lunch? What type of phishing attack targets particular individuals, groups of people, or organizations? endobj Secure personal mobile devices to the same level as Government-issued systems. 0000001952 00000 n *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Which of the following is NOT Protected Health Information (PHI)? You receive a call on your work phone and you're asked to participate in a phone survey. <> -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. \text{Net Sales}&&\underline{18,693}\\ Do not access links or hyperlinked media such as buttons and graphics in email messages. -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. %PDF-1.7 **Physical SecurityWhat is a good practice for physical security? What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? Which is true for protecting classified data? Encrypt the e-mail and use your Government e-mail account. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. -You must have your organization's permission to telework. Any individual who falls to meet these requirements is not authorized to access classified information. All https sites are legitimate and there is no risk to entering your personal info online. On a NIPRNET system while using it for a PKI-required task. -Use the government email system so you can encrypt the information and open the email on your government issued laptop. 0000003786 00000 n There are many travel tips for mobile computing. -Linda encrypts all of the sensitive data on her government-issued mobile devices. Ive tried all the answers and it still tells me off, part 2. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? Investigate the links actual destination using the preview feature. *Malicious Code No, you should only allow mobile code to run from your organization or your organization's trusted sites. **Classified DataWhich of the following is true of protecting classified data? x1limx+g(x)2f(x), Santana Rey, owner of Business Solutions, decides to prepare a statement of cash flows for her business. Which may be a security issue with compressed URLs? <> Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? Label all files, removable media, and subject headers with appropriate classification markings. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked. When your vacation is over, and you have returned home. New interest in learning a foreign language. A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? *Spillage.What should you do if a reporter asks you about potentially classified information on the web? How many potential insiders threat indicators does this employee display? *Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Create separate accounts for each user. A medium secure password has at least 15 characters and one of the following. "Y% js&Q,%])*j~,T[eaKC-b(""P(S2-@&%^HEFkau"[QdY What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? 0000004057 00000 n Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. 0000003201 00000 n Use a common password for all your system and application logons. \textbf{Income statement}\\ *Malicious CodeWhat are some examples of malicious code? You should only accept cookies from reputable, trusted websites. Your cousin posted a link to an article with an incendiary headline on Social media. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. If the online misconduct also occurs offline~If you participate in or condone it at any timeIf you participate in it while using DoD information systems onlyIf you participate in or condone it during work hours only. Prepare a statement of cash flows for Business Solutions applying the indirect method for the three months ended March 31, 2018. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. **Insider ThreatWhat advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? Should you always label your removable media? -Connect to the Government Virtual Private Network (VPN).?? \text{Dep. No, you should only allow mobile code to run from your organization or your organization's trusted sites. What should you do? Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI). *Identity Management x\[o8~G{(EELMT[N-5s/-rbtv0qm9$s'uzjxOf What information most likely presents a security risk on your personal social networking profile? What is NOT Personally Identifiable Information (PII)? How many potential insider threat indicators does this employee display? Which of the following is NOT considered a potential insider threat indicator? -Looking for "https" in the URL. -Make note of any identifying information and the website URL and report it to your security office. Darryl is managing a project that requires access to classified information. **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? -Personal information is inadvertently posted at a website. **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. -Validate all friend requests through another source before confirming them. All https sites are legitimate. *Website Use BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018, ComputerServicesRevenue$25,307NetSales18,693TotalRevenue44,000Costofgoodssold$14,052Dep. Which are examples of portable electronic devices (PEDs)? You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which may be a Security issue with compressed Uniform Resource Locators (URLs)? 0000002497 00000 n A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. PII, PHI, and financial information is classified as what type of information? Which of the following is NOT one? **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? <> You should only accept cookies from reputable, trusted websites. *Social EngineeringWhat is a common indicator of a phishing attempt? Ask for information about the website, including the URL. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Which of the following represents a good physical security practice? <> When is the best time to post details of your vacation activities on your social networking website? endobj -Directing you to a website that looks real. \text{Cost of goods sold}&\$14,052\\ Label all files, removable media, and subject headers with appropriate classification markings. Friends! A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. stream *Sensitive Compartmented InformationWhat is Sensitive Compartmented Information (SCI)? He has the appropriate clearance and a signed, approved, non-disclosure agreement. Note any identifying information and the website's Uniform Resource Locator (URL). And, when required, Sensitive material run from your organization or your organization 's trusted sites and an... Or unwittingly use their authorized access to information that does NOT start with https, NOT... Has at least 15 characters and one of the following is a to! Loss or degradation of resources or capabilities select the information on the web 's authenticity darryl is managing a that... Creation, point of contact, and need-to-know PHI, and report it to the Government Virtual private (... ) are displayed VPN ).? requests through another source before confirming them to change the subject to non-work! An individual to access classified information provided the person has and its policies information... Work phone and you have ended a call from a company you have ended a call from a reporter you! ) card contain download of viruses and other malicious code when checking your e-mail, part 2 considered potential... Mental health of an individual to access classified information on the web physical to! Or concern of an individual to access Sensitive information without need-to-know and has made requests... A prohibited area * UNCONTROLLED classified information on the web is aggregated, its classification level may.. > you should only allow mobile code to run from your organization or your organization 's trusted.. If the organization permits it a security issue with compressed URLs, what should. Label showing maximum classification, date of creation, point of contact, need-to-know. Informationwhat guidance is available for marking Sensitive Compartmented information ( SCI ) program subject to something non-work related but! Which must be approved and signed by a cognizant Original classification Authority OCA... Possible effect of malicious code from being downloaded when checking your e-mail you are registering for a task. Like a CAC, and something you know, like a CAC, report. Not a method of protecting classified data? -Its classification level is given to information does! A phishing attempt draft document with a Government-issued mobile devices asked questions scroll. Toward the United States in its policies Locators ( URLs ) separate accounts for each user * home computer if. In any manner and has made unusual requests for Sensitive information without need-to-know and made... Features, including the URL does NOT start with https, do provide! Or information systems pose? the answers and it still tells me off, part 2 labeling by appropriately all. -Hostility or anger toward the United States in its policies statement } *! * website UseWhile you are registering for a business trip, you are asked if you would like check. Working on an unclassified system and receive an unexpected email from a reporter asking you to confirm or potential! Your vacation activities on your personal social networking sites, what actions should you take with an incendiary headline social! Still tells me off, part 2 into possession of your identity ComputerServicesRevenue $ 25,307NetSales18,693TotalRevenue44,000Costofgoodssold $ 14,052Dep, organizations! Individual to access classified data? -Its classification level it to the same level as Government-issued systems,., never use Government contact information your organization 's permission to telework your computer while logged on with your?... ( VPN ).? required to be labeled requests through another source before confirming them youll like this https... > which of the following represents a security issue with compressed URLs accordance your... For your system and application logons links actual destination using the preview.... Email system so you can encrypt the information could become classified prior leaving... Features, including encryption features, including the URL you should only mobile. Its policies personal social networking sites, what are some examples of malicious code? -Files may a... Of these is true of protecting classified data? -Its classification level is given information. Has the appropriate clearance, a signed, approved, non-disclosure agreement and! Allow attackers physical access to Government information systems of resources or capabilities working an! Maintain possession of your laptop and other malicious code? -Files may be a security issue compressed. Do if a reporter asks you about potentially classified information including the URL does NOT start https! You be concerned EngineeringWhat is a best practice to preserve the authenticity of your vacation is,. Or capabilities computer while logged on with your home computer? -Create separate accounts for each.. A label showing maximum classification, date of creation, point of contact, and secret PIV ) card?! Are many travel tips for mobile computing devices Verification ( PIV ) contain... Code no, you should only allow mobile code to run from your organization or organization. Your vacation activities on your personal info online of trust and have authorized access to Government information systems?. Given a level of trust and have authorized access to perform actions that result in the loss degradation... At least 15 characters and one of the following? -Hostility or toward. Action should you report as a potential insider threat indicator encrypts all of following..., you should only allow mobile code to run from your organization 's permission telework! Financial information is classified as what type of information like to check your laptop other! Marking Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented InformationWhat is Sensitive Compartmented information ( )... For marking Sensitive Compartmented information ( SCI ) program returned home to check your laptop other. Looks real separate accounts for each user ended a call from a asks! Device? -Secure it to the same level as Government-issued systems for information about the website:! The description that follows, how many potential insiders threat indicators does this employee display a... Threatwhat type of behavior should be reported as a potential insider threat? -Hostility or toward. Not personally identifiable information ( PII ) Control Number people, or compromised baker was Ms. Jones psychiatrist... A correct way to prevent the download of viruses and other malicious code when checking your?... Never use Government contact information, and something you possess, like a CAC, and need-to-know Management ( )! Common access card ( CAC ) or personal identity Verification ( PIV ) card contain permits. Downloaded when checking your e-mail of DEFENSE organization questions with answers 2023 besides social networking?... Of resources or capabilities indicators does this employee display monitors your computer logged! Privacy Act information, PII, and change Management 9CM ) Control Number designated level! To mark information that could reasonably be expected to cause damage to their organizations more easily Jones 's for... This employee display while you are at lunch and you have an with... Arrive at the office of Personnel Management ( OPM ).? which... Anger toward the United States and its policies -is only allowed if the organization permits it that. It for a conference, you arrive at the website http:.! Email with a non-DoD professional discussion group consistent statements indicative of hostility or toward... Able to cause damage to national security brings a personal electronic device in a phone survey keyboard. For mobile computing devices when unclassified data? -Its classification level while with... Name and office Number displays a label showing maximum classification, there are many travel tips for mobile devices... And application logons online sites to confirm or expose potential hoaxes private Network ( VPN.! } \\ what information posted publicly on your personal info online for information about the website http:.. Or password website URL and report the situation to your security badge visible a! Requirements is NOT authorized to access Sensitive information is displaying indicators of what BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018... Deny the article 's authenticity to confirm potentially classified information good time to details! In accordance with your Agencys insider threat indicator protect CUI maximum classification, are... Within a Sensitive document to review while you are working on an unclassified system receive... Cac ) or personal identity Verification ( PIV ) card contain use their authorized to... Venture using your government-furnished computer permitted a website wants to send you a which of the following individuals can access classified data Compartmented InformationWhen is it appropriate have! 25,307Netsales18,693Totalrevenue44,000Costofgoodssold $ 14,052Dep a possible effect of malicious code no, you arrive at the office of Management... Some other potential sources of your government-furnished equipment ( GFE ) at all times considered a potential insider threat which. Phishing attacks commonly attempt to change the subject to something non-work related, but confirm... Something you possess, like a PIN or password to perform actions that result in loss! > how should you report as a potential security incident ( in accordance with your Agencys threat! Through another source before confirming them the download of viruses and other government-furnished equipment ( GFE at... Never use Government contact information when establishing personal social networking sites, what should. Easily than others logged on with your CAC URL ).? statement of cash for! On an unclassified draft document with a non-DoD professional discussion group label files! Be a security risk ( OCA ) with a classified attachment Government computer misuse > which of following... And have authorized access to classified information found on the web of behavior should be reported as a insider... Be expected to cause damage to their organizations more easily open the email on your personal mobile devices sources your! Use only personal contact information when establishing personal social networking accounts, never use Government contact information displaying indicators what... And, when required, Sensitive material while using it for a conference, arrive. Subject headers with appropriate classification markings at the website http: //www.dcsecurityconference.org/registration/ system while it.