All Areas II Flashcards
This enables individuals to be able to authenticate themselves on security websites and securely log into computer systems
Common Access Card (CAC)
Older style of lock; may be used for classified storage in certain cases
Mechanical combination lock
Lock that complies with UL Standard 768-Group 1
Combination padlock
Lock that complies with FF-L-2740 series lock specification
Electromechanical combination lock
Lock that has limited resistance to forced entry
Low security padlock
A facility used by the intelligence community
SCIF
The governing authority to approve security containers
GSA
Areas designed and authorized for the open storage of classified information. These facilities are usually build to commercial construction standards and do not afford the extra security inherent with a vault.
Secure rooms
Constructed to meet strict forcible entry standards, including reinforced concrete on all walls, ceiling, and floor, plus a hardened steel door
Vaults
The terrorist threat level indicating anti-U.S. terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation. There is a substantial DoD presence, and the operating environment favors the terrorist.
High terrorist threat level
The terrorist threat level indicating no terrorist group is detected or the terrorist group in non-threatening
Low terrorist threat level
The terrorist threat level indicating anti-U.S. terrorists are present and attack personnel as their preferred method of operation, or a group uses large casualty-producing attacks as their preferred method but has limited operational activity. The operat
Significant terrorist threat level
The terrorist threat level indicating terrorists are present but there are no indications of anti-U.S. activity. The operating environment favors the host nation or the U.S.
Moderate terrorist threat level
Physical security plan
At a minimum, these should include special and general guard orders, access and material control, protective barrier lighting systems, locks, and Intrusion Detection Systems (IDS)
Much of U.S. classified information originates within this environment
Industrial
Security compliance is overseen by this organization if a contractor works at his/her own facility
Defense Security Service
A contractor must adhere to the security rules of the __________ commander when working at a government installation
Installation
The program that covers protection of classified information
by government contractors
NISP
FSO responsibilities
- Ensure compliance with the NISP
- Follow NISPOM guidelines
- Provide training for cleared individuals
If you are a government contractor working on a contractor-owned system at a contractor facility, you must follow the security provisions of this reference
Chapter 8 of the NISPOM
True or False: A SAP can retain security cognizance if necessary.
True
A government employee with the authority to enter into, administer, and/or terminate contracts and make related determinations and findings
Contracting Officer
This government employee is a subject matter expert who has regular contact with the contractor
COTR
The document that outlines in detail what will be required to complete a contract
Statement of Work (SOW)
The document that establishes the government’s authority to review the contractor’s security program to ensure compliance
DD Form 441
The form a contractor could use to determine if classified storage is required, and at what level
DD Form 254
A cleared individual can only have access at the _______ level as the facility clearance
Same
For the purpose of a visit to another cleared facility, a clearance can be verified by looking in ________
JPAS
The issuance of ________ is the responsibility of the DoD CAF
Eligibility
Unauthorized disclosure of this information could reasonably be expected to cause serious damage to our national security.
Secret
Unauthorized disclosure of this information could reasonably be expected to cause exceptionally grave damage to our national security.
Top Secret
Unauthorized disclosure of this information could reasonably be expected to cause damage to our national security.
Confidential
This is defined as the incorporating, paraphrasing, restating, or generating in new form any information that is already classified.
Derivative Classification
This is defined as an initial determination that information requires, in the interest of national security, protection against unauthorized disclosure.
Original Classification
This is defined as unclassified information or classified information (at a lower level) that when the information is combined or associated reveals additional factors that qualifies for classification.
Compilation
The term used to identify individuals specifically authorized in writing to make initial classification decisions.
Original Classification Authority
This contains classification levels, special requirements and duration instructions for programs, projects, plans, etc.
Security Classification Guides (SCG)
The six step process an OCA applies in making classification determinations
Original Classification Process
The authorized change in the status of information goes from classified information to unclassified information
Declassification
The declassification system where Permanently Valuable Historical records are declassified when they are 25 years old
Automatic declassification
The declassification system where information exempted from automatic declassification is reviewed for possible declassification
Systematic declassification review
The declassification system where the public can ask for classified information be review for declassification and public release
Mandatory Declassification Review (MDR)