Topic 6 Flashcards

1
Q

This involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure.

A

Document and Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any recorded information regardless of its physical form or characteristics.

A

Document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It includes all information concerning documents, cryptographic devices, developed projects and materials following on the categories of Top Secret, Secret, confidential and restricted.

A

Classified Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refers to the assigning of information or material, one of the four security categories after determination has been made that information requires the security protection as provided.

A

Classify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Act of removing the security classification from classified information or matter.

A

Declassify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refers to the act of changing the assigned classification from classified information or matter.

A

Reclassify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Refers to the act of assigning the information or matter to the higher classification assigned to it than that previously.

A

Upgrading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It refers to the grant of access to the classified matter only to properly cleared person when such classified information is required in the performance of their official duties.

A

Compartmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This takes place through the loss of security which results from unauthorized persons obtaining knowledge or classified matters.

A

Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of destroying a document which is no longer significant in the organization.

A

Purging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These are information that in some special way relates to the status or activities of the possessor and over which the possess asserts ownership.

A

Proprietary Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It consist of any formula, pattern, device or compilation of information which is used in one’s business.

A

Trade Secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is a process or device for continuous use in the protection of the business.

A

Trade Secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is a grant made by the govt. to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of 17 years.

A

Patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is a word, phrase, symbol or design, or a combination of words, phrases, symbols or designs, that identifies and distinguishes the source of the goods of one party from those of others.

A

Trademarks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is a type of intellectual property that safeguards original works of authorship as soon as the author fixes the work in a tangible form of expression.

A

Copyright

17
Q

The certification by a responsible authority that the person described is cleared for access to classified matter at the appropriate level.

A

Security Clearance Certificate

18
Q

A type of security clearance that is valid for five years unless sooner revoked by the issuing authority.

A

Final

19
Q

A type of security clearance that is valid for two years unless sooner revoked by the issuing authority.

A

Interim

20
Q

This pertains to thee importance of the firm with reference to the natural economy and security.

A

Relative Criticality

21
Q

This is the susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazards.

A

Relative Vulnerability

22
Q

Any acts or conditions which may result in the compromise of information, loss of life or destruction of property or disruption of the objective of the installation

A

Security Hazards

23
Q

Act of stealing small things or items of little value, especially habitually.

A

Pilferage

24
Q

One who steals due to his inability to resist the unexpected opportunity and has little fear of detection.

A

Casual Pilferer

25
Q

One who steals with preconceived plans and takes away any or all types of items or supplies for economic gain.

A

Systematic Pilferer

26
Q

Intentional destruction or the deliberate damaging or destroying of property or equipment.

A

Sabotage

27
Q

The activity of spying or the use of spying or spies to gather secret information.

A

Espionage

28
Q

These are activities designed to overthrow the govt. or intended or likely to undermine or overthrow a govt. or other institutions.

A

Subversive Activities

29
Q

The basic instrument for determining security vulnerability.

A

Security Survey

30
Q

Is similar to the entrance conference, and it is done after the compilation of the security survey.

A

Exit conference

30
Q

Is a dialogue between the survey team and the management, and officials of a plant before the security survey is conducted.

A

Entrance Conference

31
Q

This is conducted to check on the degree of compliance with the recommend countermeasures and to determine the effectiveness and adequacy of the countermeasures which are in effect.

A

Security Inspection

32
Q

Is one has been so published to the office that all concerned personnel are usually aware of its eminence and may consequently, make such preparations as are necessary.

A

Announced Security Inspection

33
Q

It is an Inspection whose imminence is known only to certain selected personnel, normally the office head and intelligence personnel of the office to be inspected.

A

Unannounced Security Inspection

34
Q

It is an inspection conducted in such a manner that office personnel are not aware that such action is taking place.

A

Penetration Security Inspection

35
Q

A planned and organized determination of facts concerning specific loss or damage of assets due to threats, hazards or unsecured conditions.

A

Security Investigation