Vocab 9 - Protecting Assets in the NISP (Glossary) Flashcards
Access
The ability and opportunity to obtain knowledge of classified information.
Acquisition Special Access Program (ASAP)
A Special Access Program (SAP) established primarily to protect sensitive research, development, testing, and evaluation or procurement activities in support of sensitive military and intelligence requirements.
Acquisition Systems Protection (ASP)
The safeguarding of defense systems anywhere in the acquisition process as defined in Department of Defense (DoD) Directive 5000.1; defense technologies being developed that could lead to weapon or defense systems; and defense research data.
Adjudication
Evaluation of personnel security investigations and other relevant information to determine if it is clearly consistent with the interests of national security for persons to be granted or retain eligibility for access to classified information and continue to hold positions requiring a trustworthiness decision.
Adjudication Facility
A facility with assigned adjudicators certified to evaluate
Personnel Security Investigations (PSI) and other relevant information to determine if granting or continuing national security eligibility is clearly consistent with the interests of national security. The DoD consolidated adjudications facility is known as the DoD Central Adjudication Facility (CAF).
Alternative Compensatory Control Measures (ACCM)
Measures designed to safeguard sensitive intelligence and operations when normal security measures are either not sufficient to achieve strict controls over access to information or where strict SAP access controls are either not required or are too stringent.
Analysis
The process by which information is transformed into intelligence; a systemic examination of information to identify significant facts, make judgments, and draw conclusions.
Anomaly
Activity or knowledge, outside the norm, that suggests a foreign entity has foreknowledge of U.S. information, processes, or capabilities.
Antiterrorism (AT)
Defensive measures used to reduce the vulnerability of individuals and property to terrorist acts, to include rapid containment by local military and civilian forces.
Assets
A person, structure, facility, information, material, or process that has value.
Caveat
A designator used with or without a security classification to further limit the dissemination of restricted information.
Central Intelligence Agency (CIA)
An independent U.S. Government agency responsible for providing national security intelligence to senior U.S. policymakers. Primary mission: collect, analyze, evaluate, and disseminate foreign intelligence to assist the President and senior U.S. government policymakers.
Classification
The determination that official information requires, in the interests of national security, a specific degree of protection against unauthorized disclosure, coupled with a designation signifying that such a determination has been made.
Classified Information
Information that has been determined pursuant to Executive Order (EO) 13526, or any successor order, EO 12951, or any successor order, or the Atomic Energy Act of 1954 (42 U.S.C. 2011) to require protection against
unauthorized disclosure and that is marked to indicate its classified status when indocumentary form.
Classified Information Spillage
Security incident that occurs whenever classified data is spilled either onto an unclassified information system or to an information system with a lower level of classification or different security category.
Clearance
Formal security determination by an authorized adjudicative office that an individual has authorized access, on a need to know basis, to a specific level of
collateral classified information (TOP SECRET, SECRET, CONFIDENTIAL).
Cleared Contractor (CC)
A person or facility operating under the National Industrial Security Program (NISP) that has had an administrative determination that they are eligible, from a security point of view, for access to classified information of a certain level (and all lower levels).
Cleared Contractor Facility
Any industrial, educational, commercial facility, or other
entity that has been granted a facility security clearance under the U.S. NISP.
Cleared Defense Contractor (CDC)
A subset of contractors cleared under the NISP who have contracts with the Department of Defense. Therefore, not all cleared contractors have contracts with DoD.
Cleared Employee
A person who has been granted access to classified information, other than the President and Vice President, employed by, or detailed or assigned to, a
department or agency, including members of the Armed Forces; an expert or consultant to a department or agency; an industrial or commercial contractor, licensee, certificate holder, or grantee of a department or agency, including all subcontractors; a personal services contractor; or any other category of person who acts for or on behalf of a department or agency as determined by the appropriate department or agency head.
Communications Security (COMSEC)
The protection resulting from all measures designed to deny unauthorized persons’ information of value that might be derived from the possession and study of telecommunications or to mislead unauthorized persons in their interpretation of the results of such possession and study.
Compromise
An unauthorized disclosure of classified information.
Contact
Any form of meeting, association, or communication in person by radio, telephone, letter, computer, or other means, regardless of who initiated the contact for social, official, private, or other reasons.
Confidential
Confidential information is information or material of which unauthorized disclosure could reasonably be expected to cause damage to the national security that the Original Classification Authority (OCA) is able to identify or describe.
Counterintelligence (CI)
Information gathered and activities conducted to identify,
deceive, exploit, disrupt, or protect against espionage or other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons or their agents, or international terrorist organizations or activities.
Countermeasure
The employment of devices or techniques that impair the operational effectiveness of enemy activity. Countermeasures may include anything that effectively negates an adversary’s ability to exploit vulnerabilities.