GENERAL SECURITY (SPED)
Name the goals of integrating CI and threat awareness into a security program?
1.Maintain a strategic advantage in operations, programs, and classified research and development.
2. Assist in force protection.
3. Provide security awareness tools for establishing securit...
GENERAL SECURITY (SPED)
Name the goals of integrating CI and threat awareness into a security program?
1.Maintain a strategic advantage in operations, programs, and classified research and
development.
2. Assist in force protection.
3. Provide security awareness tools for establishing security countermeasures.
4. Ensure integrity of DoD and U.S. industry program secrets, technologies, and
operations.
5. Protect our warfighters.
Provides the legal requirement to use lawful means to ensure U.S. receives the
best intelligence available, name the source.
E.O. 12333
The manual that includes CI-related requirements for industry is?
DoD 5220.22-M NISPOM
Regulation mandating the reporting of suspicious activities or potential
espionage indicators
DoDD 5240.06, Counterintelligence Awareness and Reporting (CIAR)
Regulation mandating the establishment of an insider threat program
DoDD 5205.16, Insider Threat Program
Protect anything that, if compromised, would: name all 5 of them.
1.Significantly damage national security
2. Alter the program's direction.
3. Compromise the program or system capabilities.
4. Shorten the expected system life.
5. Require research and development to counter the impact of loss.
What is first line of defense against espionage?
your personnel
All imminent threats—whether DoD facility or personnel or contractor facility—
must be reported immediately and directly to the appropriate law enforcement
agency, which, in most cases within the United States is?
FBI
In addition to collecting and processing intelligence about our enemies, the
Intelligence Community is also faced with the problem of identifying,
understanding, prioritizing, and counteracting the foreign intelligence threats that
are encountered by the United States. This activity is known as
counterintelligence.
Every cleared defense contractor (CDC) has a _________________ who is
responsible for the overall security of the facility and for ensuring that security
regulations and policies are followed.
facility security officer (FSO)
What 3 statements describe why reporting certain information is important?
Name all 3.
1. Reporting suspicious contacts can lead to the capture of individuals seeking to harm
national security.
2. Reporting adverse information about employees of cleared contractor facilities can
, help to safeguard classified information.
3. Failing to report an employee's failure to follow safeguarding procedures can lead to
the disclosure of classified information, which may result in the loss of life of our service
members.
Several regulatory and legal documents form the basis for the requirements to
report.The baseline security requirements (including the requirement to report)
that ensure protection of classified information by contractors is called what?
NISPOM (correct response)
Established the partnership between the U.S. government and private industry
that is known as the National Industrial Security Program is what order.
E.O. 12829
The contractual agreement in which contractors agree to maintain minimum
security controls to protect classified information
DD Form 441, DD Form 441 is the contractual agreement in which contractors agree to
maintain minimum security controls to protect classified information in accordance with
the NISPOM.
Different types of information require reporting to different government entities.,
Where do you report PSMO-I
Changes to personnel information (correct response)
Changes in facility information should be reported to the
DSS IS REP
According to NISPOM paragraph 1-302g, you must report a change in
company ownership. You must also report changes in the name or address of the
company or facility, changes to Key Management Personnel (KMPs), termination of
company operations for any reason, and changes in Foreign Ownership, Control, or
Influence (FOCI).
An _________________ is anyone with authorized access to the information or
things an organization values most, and who uses that access - either wittingly or
unwittingly - to inflict harm to the organization or national security. When an
insider becomes a threat, it can have far-reaching consequences on
organizations, companies, and national security.
insider threat
Employees of cleared industry must report potential threats to the
__________________?
Facility Insider Threat Program Senior Official (ITPSO) or Facility Security Officer
(FSO).
The OPSEC process consists of five steps. Each step provides the answers to
some very important questions. Name the 5 steps.
Step 1 is identifying critical information.
Step 2 is analyzing threats.
Step 3 is analyzing vulnerabilities.
Step 4 is assessing risks.
Step 5 is applying OPSEC countermeasures.
What does SAPs aim to achieve? Name all 4 of them.
1.Protect technological breakthroughs
2. Cover exploitation of adversary vulnerabilities
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller LectDan. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.