
Should you disclose classified information to a reporter?
If the reporter is asking you for your opinion on the matter, it is best to decline to divulge any information on this computer. If the reporter calls you and asks you to confirm that you have potentially classified information on the Web, be very careful not to share it.
What should I do if a reporter calls me?
If the reporter calls you and asks you to confirm that you have potentially classified information on the Web, be very careful not to share it. While this reporter may be trying to gain access to your social networks or other information, the first thing you need to do is obtain a clearance and sign a nondisclosure agreement.
What should you do if you are in possession of classified information?
If you are in possession of classified information and are wondering what to do in this scenario, then something is terribly off. The first thing you should do is inform the source of that information that you are not adequately trained to handle even the most common scenarios that may arise.
What is required for an individual to access classified data?
What is required for an individual to access classified data? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. What type of activity or behavior should be reported as a potential insider threat?
What to do if you are not the designated spokesperson?
What to do if you're the PIO for an agency?
What was my job when I worked for the Office of Naval Intelligence?
Is ONI a shared office?
Is the internet classified?
Can neither confirm nor deny?
Can you talk to anyone who claims to be the media?
See 4 more
About this website

What is required for an individual to access classified information?
Classified information may be made available to a person only when the possessor of the information establishes that the person has a valid “need to know” and the access is essential to the accomplishment of official government duties.
Which type of behavior should you report as a potential insider threat?
An insider threat uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions resulting in loss or degradation of resources or capabilities.
Has someone who works with classified information What should you do if you are contacted by a foreign national seeking information on a research project?
AS someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? inform your security POC of all bob-professional or non-routine contacts with foreign nationals....
What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause quizlet?
The unauthorized disclosure of Confidential information could reasonably be expected to cause damage to national security. The unauthorized disclosure of Secret information could reasonably be expected to cause serious damage to national security.
How should you respond to the theft of your identity Cyber Awareness 2022?
-Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks. How should you respond to the theft of your identity? -Notify law enforcement.
What are some indicators of insider threat behavior and who would you report this to?
Indicators: Increasing Insider Threat AwarenessUnusual logins. ... Use or repeated attempted use of unauthorized applications. ... An increase in escalated privileges. ... Excessive downloading of data. ... Unusual employee behavior. ... Make sense of event data with a SIEM solution.More items...
How do you handle classified information?
In general, classified documents must be handled in a way that protects the integrity and confidentiality of the information they contain. This includes securing documents in a safe or other authorized storage container when the documents are not being used by staff.
How do you safeguard classified information?
(c) Classified information being transmitted from one Commission office to another shall be protected with a classified document cover sheet and hand delivered by an appropriately cleared person to another appropriately cleared person.
What should you do if an individual asks you to let her follow you into your controlled space stating that she left her security badge at her desk?
What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? Don't allow her access into secure areas and report suspicious activity.
What is the first step in reporting an incident of unauthorized disclosure?
Once you discover or suspect unauthorized disclosure, you must first protect the classified information to prevent further unauthorized disclosure. Then you must report the unauthorized disclosure to the appropriate authorities who will, in turn, investigate the incident and impose sanctions, if warranted.
What level of knowledge can the unauthorized disclosure of information classified as confidential reasonably be expected to cause?
Answer: Unauthorized disclosure of Secret information could reasonably be expected to cause serious damage to our national security. Unauthorized disclosure of Top Secret information could reasonably be expected to cause exceptionally grave damage to our national security.
Which classification level is given to information that could reasonably be expected to cause serious damage?
be classified “Secret” its unauthorized disclosure could reasonably be expected to cause serious damage to the national security. This classification should be used sparingly. Examples of “ serious damage” include disruption of foreign relations significantly.
Which of the following would be considered insider threat?
The characteristics of a malicious insider threat involves fraud, corporate sabotage or espionage, or abuse of data access to disclose trade secrets to a competitor.
Which of the following is mostly considered an insider threat?
The NITTF defines five main categories of insider threat which we will discuss in this course: leaks, spills, espionage, sabotage, and targeted violence.
Which of the following are examples of behavior indicators associated with insider threat?
Insider Threat IndicatorsAbnormal Access Requests. ... Self-Escalation of User Privileges. ... Using Unauthorized Storage Media. ... Sending Emails to Recipients Outside the Organization. ... Accessing Information and Systems During Off Hours/Vacations. ... Sudden Changes in Behavior Towards Coworkers. ... Unexplained Financial Gains.More items...•
What is considered an insider threat?
The Cyber and Infrastructure Security Agency (CISA) defines insider threat as the threat that an insider will use his or her authorized access, wittingly or unwittingly, to do harm to the Department's mission, resources, personnel, facilities, information, equipment, networks, or systems.
DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Knowledge Check - Quizlet
Study with Quizlet and memorize flashcards containing terms like Spillage: What should you do if a reporter asks you about potentially classified information on the web?, What should you do when you are working on an unclassified system and receive an email with a classified attachment?, Which classified level is given to information that could reasonably be expected to cause serious damage to ...
DOD Cyber Awareness Challenge 2022 Flashcards | Quizlet
Study with Quizlet and memorize flashcards containing terms like *Spillage Which of the following may help to prevent spillage?, *Spillage Which of the following actions is appropriate after finding classified information on the internet?, *Classified Data Which of the following individuals can access classified data? and more.
DoD Cyber Awareness 2019 - Subjecto.com
NCLEX 10000 Integumentary Disorders. When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately?
you receive an inquiry from a reporter about potentially classified ...
Classified information is a sensitive piece of information.When I receive an inquiry from a reporter about potentially classified information on the internet;. I should not confirm or deny the fact that information is classified. After the conversation, I should inform relevant authorities about the conversation.
Who can access classified data? - Answers
Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data.
What to do if you are not the designated spokesperson?
If you are not the designated spokesperson, then politely decline to answer and refer the reporter to the designated spokesperson. Then notify the designated spokesperson
What to do if you're the PIO for an agency?
If you’re the PIO for an agency, stick to the script that you have been given, by those who matter.
What was my job when I worked for the Office of Naval Intelligence?
When I worked for the Office of Naval Intelligence (ONI), my job was writing training material about how to protect classified information. I also wrote regulations for protection of classified information to companies that contracted with the Navy.
Is ONI a shared office?
At ONI we all shared offices. So I sometimes heard information that was
Is the internet classified?
If it’s on the web, it’s normally not “classified”. Since anything on the Internet can be accessed by someone else, somewhere else, if the reporter asked me about it, my first question would be why he or she didn’t access it themselves. After all, if I can do it, so can they, and their doing so would limit my exposure in case there was a security compromise.
Can neither confirm nor deny?
The joke amongst a lot of the world is “I can neither confirm nor deny”, which while being an answer, is no answer.
Can you talk to anyone who claims to be the media?
Never, under any circumstances, talk to anyone who “claims” to be media…no matter what you know.
