Study sets, textbooks, questions
Upgrade to remove ads
Joint Staff Insider Threat Awareness
Inside Thread Awareness Study Guide
Terms in this set (10)
Three phases of recruitment include:
Spot and Assess, Development, and Recruitment
Social media is one platform used by adversaries to recruit potential witting or unwitting insiders.
Indicators of an Insider Threat may include unexplained sudden wealth and unexplained sudden and short term foreign travel
What is an insider threat?
anyone with authorized access to the information or things an organization values most, and who uses that access - either wittingly or unwittingly - to inflict harm to the organization or national security
You notice a coworker is demonstrating some potential indicators (behaviors) of a potential insider threat. How would you report it?
Contact the Joint Staff Security Office
Consequences of not reporting foreign contacts, travel or business dealings may result in:
- Loss of employment or security clearance
- UCMJ/Article 92 (mil)
- Disciplinary action (civ)
- Criminal charges
DoD and Federal employees may be subject to both civil and criminal penalties for failure to report. For cleared defense contractors, failing to report may result in loss of employment and security clearance. Individuals may also be subject to criminal charges.
Some techniques used for removing classified information from the workplace may include:
- USB data sticks
- Making photo copies of documents
- Physically removing files
Insiders may physically remove files, they may steal or leak information electronically, or they may use elicitation as a technique to subtly extract information about you, your work, and your colleagues.
Why is it important to identify potential insider threats?
insiders have freedom of movement within and access to classified information that has the potential to cause great harm to national security
Sets found in the same folder
Level I Antiterrorism Awareness Training
DHA-US001 HIPAA Challenge Exam
Alcohol and Substance Abuse Prevention (JKO) Pre-T…
DoD Mandatory Controlled Unclassified Information…
Sets with similar terms
SAPPC - Personnel Security
SPēD - SFPC - General (Information Security)
Introduction to Industrial Security - Test Questio…
Other Quizlet sets
Promoting Communication and Social Skills in Child…
Unit 2 World Geography Review (Questions)
Radiation monitoring notes
What did Hofling et al (1966) find?
Like Windows, Linux refers to drives and partitions by letters of the alphabet.
23. If power is based on personality and individual differences, the personality traits will affect how individuals acquire and use power.
In the Online Democracy model, the "voter activation network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using info obtained from: