Domain 2: Asset Security; Classifying Data Flashcards
Labels are used with subjects or objects?
Objects.
When is an object labeled “Top Secret”?
“Top Secret” shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security.
When is an object labeled “Secret”?
“Secret” shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security.
When is an object labeled “Confidential”?
“Confidential” shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause damage to national security.
What is SBU?
Sensitive but Unclassified.
What is FOUO?
For Official Use Only.
What labels do private sector companies use?
“Internal Use Only” and “Company Proprietary”.
What is unclassified?
Data that is not sensitive.
Who applies a label to an object?
Security Administrator.
What are Security Compartments?
Compartments allow additional control over highly sensitive information. This is called Sensitive Compartmented Information (SCI).
Some compartments used by the United States are HCS, COMINT (SI), GAMMA (G), TALENT KEYHOLE (TK). What do they require?
These compartments require a documented and approved need to know in addition to a normal clearance such as top secret.
What is clearance?
A clearance is a formal determination of whether or not a user can be trusted with a specific level of information.
What does a clearance require?
Each clearance requires a myriad of investigations and collection of personal data. Once all data has been gathered (including a person’s credit score, arrest record, interviews with neighbors and friends, and more), an administrative judge makes a determination on whether or not this person can be trusted with U.S. national security information.
What are the two most popular reasons why people are not granted U.S. Government clearance?
Drug use and foreign influence.
What is formal access approval?
Documented approval from the data owner for a subject to access certain objects, requiring the subject to understand all of the rules and requirements for accessing data, and consequences should the data become lost, destroyed, or compromised.