6th vid discussion Flashcards

1
Q

This involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure.

A

Document and Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any recorded information regardless of its physical form or characteristics

A

Document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It includes all information concerning document, cryptographic devices developed projects and materials following on the categories of Top Secret, Secret, Confidential, and Restricted

A

Classified Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This refers to the assigning of information or material, one of the four security categories after determination has been made that the information requires the security protection as provided.

A

Classify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The act of removing the security classification from classified information or matter.

A

Declassify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It refers to the act of changing the assigned classification from classified information or matter.

A

Reclassify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It refers to the act of assigning the information or matter to the higher classification than that assigned to it. previously

A

Upgrading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is the dissemination of classified information or matter to be limited strictly to those people whose duties requires knowledge or possession thereof.

A

Need to know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It refers to the grant of access to the classified matter only to properly cleared person when such classified information is required in the performance of their official duties.

A

Compartmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This takes place through the loss of security which results from unauthorized persons obtaining knowledge of classified matters

A

Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process of destroying a document which is no longer significant in the organization.

A

Purging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These are information’s that in some special way relates to the status or activities of the possessor and over which the possessor asserts ownership.

A

Proprietary Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The information must have been developed by the company and not be available to the Government or to the public without restriction from another source.

A

Proprietary Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It consist of any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage versus competitors who do not know or use it.

A

Trade Secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is a process or device for continuous use in the protection of the business

A

Trade Secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is a grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of 17 years.

A

Patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Is a word, phrase, symbol or design, or a combination of words, phrases, symbols or designs, that identifies and distinguishes the source of the goods of one party from those of others.

A

Trademarks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A type of intellectual property that safeguards original works of authorship as soon as the author fixes the work in a tangible form of expression.

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The certification by a responsible authority that the person described is cleared for access to classified matter at the appropriate level.

A

Security Clearance Certificate

20
Q

Two types of Security Clearance

A
  1. Final
  2. Interim
21
Q

It is valid for five years unless sooner revoked by the issuing authority.

A

Final

22
Q

It is valid for two years unless sooner revoked by the issuing authority

A

Interim

23
Q

This pertains to the importance of the firm with reference to the natural economy and security.

A

Relative Criticality

24
Q

This is the susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazards.

A

Relative Vulnerability

25
Q

Any acts or conditions which may result in the compromise of information, loss of life, loss or destruction of property or disruption of the objective of the installation.

A

Security Hazards

26
Q

Act of stealing small things or items of little value, especially habitually.

A

Pilferage

27
Q

Two types of Pilferer

A
  1. Casual Pilferer
  2. Systematic Pilferer
28
Q

One who steals due to his inability to resist the unexpected opportunity and has little fear of detection.

A

Casual Pilferer

29
Q

One who steals with preconceived plans and takes away any or all types of items or supplies for economic gain.

A

Systematic Pilferer

30
Q

Intentional destruction or the deliberate damaging or destroying of property or equipment.

A

Sabotage

31
Q

The activity of spying or the use of spying or spies to gather secret information

A

Espionage

32
Q

This is a hazard because people may come to know the confidential processes or procedures of a certain organization or business establishment

A

Espionage

33
Q

These are activities designed to overthrow the government or intended or likely to undermine or overthrow a government or other institutions.

A

Subversive Activities

34
Q

It results to the disruption of the normal operations of an institution or organization

A

Subversive Activities

35
Q

The basic instrument for determining security vulnerability

A

Security Survey

36
Q

Critical on-site examination and analysis of an industrial plant, business, a home or public or private institution done to ascertain the facility’s current security status.

A

Security Survey

37
Q

Two types of Security Survey Conference

A
  1. Entrance Conference
  2. Exit Conference
38
Q

a dialogue between the survey team and the management and officials of a plant before the security survey is conducted.

A

Entrance Conference

39
Q

It is similar to entrance conference, and it is done after the completion of the security survey

A

Exit Conference

40
Q

This is conducted to check on the degree of compliance with the recommended countermeasures and to determine the effectiveness and adequacy of the countermeasures which are in effect.

A

Security Inspection

41
Q

Three Specific types of Security Inspection

A
  1. Announced Security Inspection
  2. Unannounced Security Inspection
  3. Penetration Security Inspection
42
Q

Is one has been so published to the office that all concerned personnel are usually aware of its eminence and may consequently, make such preparations as are necessary

A

Announced Security Inspection

43
Q

It is an inspection whose imminence is known only to certain selected personnel, normally the office head and intelligence personnel of the office to be inspected.

A

Unannounced Security Inspection

44
Q

It is usually conducted during non – duty hour periods.

A

Unannounced Security Inspection

45
Q

It is an inspection conducted in such a manner that office personnel are not aware that such action is taking place

A

Penetration Security Inspection

46
Q

A planned and organized determination of facts concerning specific loss or damage of assets due to threats, hazards or unsecured conditions.

A

Security Investigation