1:00
en
CR
REFRESHER 2015
11
DIRECTOR OF OPERATIONS: PUBLIC RELEASE OF INFORMATION AS WELL AS PHOTOS MUST FIRST BE APPROVED BY THIS PERSON.
NISPOM: INDUSTRY'S PRIMARY REFERENCE IN THE PROTECTION OF CLASSIFIED INFORMATION.
SECRET: INFORMATION/MATERIAL WHOSE UNAUTHORIZED DISCLOSURE COULD CAUSE SERIOUS DAMAGE TO NATIONAL SECURITY.
CLASSIFIED: OFFICIAL GOVERNMENT INFORMATION THAT HAS BEEN DETERMINED TO REQUIRE PROTECTION IN THE INTEREST OFNATIONAL SECURITY.
NISP: THE ACCRONYM FOR THE AUTHORITY WHICH REQUIRES ALL PRIVATE COMPANIES & NON-GOVERNMENT INSTITUTIONS ACCESS TO U. S. CLASSIFIED INFORMATION.
SUSPICIOUS CONTACTS: ANY EFFORT OR ATTEMPT TO OBTAIN ILLEGAL OR UNAUTHORIZED ACCESS TO CLASSIFIED, PROPRIETARY OR SENSITIVE INFORMATION.
FSO: CHANGE IN EMPLOYEE STATUS, SUSPICIOUS OCCURRENCES SECURITY INFRACTIONS AND ADVERSE INFORMATION SHOULD BE REPORTED TO THIS PERSON.
OUT BRIEF: THIS QUESTIONNAIE IS FILLED OUT AFTER YOUR FOREIGN TRAVEL IS COMPLETED.
REQUIRED REPORTING: CHANGE IN NAME, TERMINATION OF EMPLOYMENT, SUSPICIOUS CONTACTS, UNAUTHORIZED RECEIPT OF CLASSIFIED MATERIAL ARE ALL EVENTS OF WHAT REQUIREMENT?
SF 312: THIS FORM IS SIGNED WHEN YOU ARE GRANTED ACCESS TO CLASSIFIED INFORMATION AS WELL AS WHEN YOUR ACCESS IS TERMINATED.
NEED TO KNOW: THIS IS ESSENTIAL TO THE PERFORMANCE OF AN INDIVIDUAL'S JOB DUTIES IN FULFILLING A CLASSIFIED CONTRACT.
DEFENSIVE SECURITY: WHEN TRAVELING OUTSIDE THE U.S., YOU SHOULD PRACTICE VARIOUS METHODS OF PRECAUTION. THIS IS REFERRED TO AS WHAT?
THREAT AWARENESS: THE PROCESS OF IDENTIFYING, UNDERSTANDING, PRIORITIZING, AND COUNTERACTING FOREIGN INTELLIGENCE THREATS.
CYBER SECURITY: PROCESSES AND PRACTICES DESIGNED TO PROTECT NETWORKS, COMPUTERS, PROGRAMS AND DATA FROM ATTACK, DAMAGE OR UNAUTHORIZED ACCESS.
DEFENSE HOTLINE: 1-800-424-9098 - THIS IS THE NUMBER TO WHAT?
REFRESHER 2015
Across:3. | OFFICIAL GOVERNMENT INFORMATION THAT HAS BEEN DETERMINED TO REQUIRE PROTECTION IN THE INTEREST OFNATIONAL SECURITY. | 5. | CHANGE IN EMPLOYEE STATUS, SUSPICIOUS OCCURRENCES SECURITY INFRACTIONS AND ADVERSE INFORMATION SHOULD BE REPORTED TO THIS PERSON. | 7. | INFORMATION/MATERIAL WHOSE UNAUTHORIZED DISCLOSURE COULD CAUSE SERIOUS DAMAGE TO NATIONAL SECURITY. |
| 8. | THIS IS ESSENTIAL TO THE PERFORMANCE OF AN INDIVIDUAL'S JOB DUTIES IN FULFILLING A CLASSIFIED CONTRACT. | 9. | THE ACCRONYM FOR THE AUTHORITY WHICH REQUIRES ALL PRIVATE COMPANIES & NON-GOVERNMENT INSTITUTIONS ACCESS TO U. S. CLASSIFIED INFORMATION. | 10. | THIS FORM IS SIGNED WHEN YOU ARE GRANTED ACCESS TO CLASSIFIED INFORMATION AS WELL AS WHEN YOUR ACCESS IS TERMINATED. |
| | Down:1. | ANY EFFORT OR ATTEMPT TO OBTAIN ILLEGAL OR UNAUTHORIZED ACCESS TO CLASSIFIED, PROPRIETARY OR SENSITIVE INFORMATION. | 2. | THE PROCESS OF IDENTIFYING, UNDERSTANDING, PRIORITIZING, AND COUNTERACTING FOREIGN INTELLIGENCE THREATS. | 3. | PROCESSES AND PRACTICES DESIGNED TO PROTECT NETWORKS, COMPUTERS, PROGRAMS AND DATA FROM ATTACK, DAMAGE OR UNAUTHORIZED ACCESS. |
| 4. | INDUSTRY'S PRIMARY REFERENCE IN THE PROTECTION OF CLASSIFIED INFORMATION. | 6. | THIS QUESTIONNAIE IS FILLED OUT AFTER YOUR FOREIGN TRAVEL IS COMPLETED. |
| |
© 2015
PuzzleFast.com, Noncommercial Use Only
REFRESHER 2015
Across:3. | OFFICIAL GOVERNMENT INFORMATION THAT HAS BEEN DETERMINED TO REQUIRE PROTECTION IN THE INTEREST OFNATIONAL SECURITY. | 5. | CHANGE IN EMPLOYEE STATUS, SUSPICIOUS OCCURRENCES SECURITY INFRACTIONS AND ADVERSE INFORMATION SHOULD BE REPORTED TO THIS PERSON. | 7. | INFORMATION/MATERIAL WHOSE UNAUTHORIZED DISCLOSURE COULD CAUSE SERIOUS DAMAGE TO NATIONAL SECURITY. |
| 8. | THIS IS ESSENTIAL TO THE PERFORMANCE OF AN INDIVIDUAL'S JOB DUTIES IN FULFILLING A CLASSIFIED CONTRACT. | 9. | THE ACCRONYM FOR THE AUTHORITY WHICH REQUIRES ALL PRIVATE COMPANIES & NON-GOVERNMENT INSTITUTIONS ACCESS TO U. S. CLASSIFIED INFORMATION. | 10. | THIS FORM IS SIGNED WHEN YOU ARE GRANTED ACCESS TO CLASSIFIED INFORMATION AS WELL AS WHEN YOUR ACCESS IS TERMINATED. |
| | Down:1. | ANY EFFORT OR ATTEMPT TO OBTAIN ILLEGAL OR UNAUTHORIZED ACCESS TO CLASSIFIED, PROPRIETARY OR SENSITIVE INFORMATION. | 2. | THE PROCESS OF IDENTIFYING, UNDERSTANDING, PRIORITIZING, AND COUNTERACTING FOREIGN INTELLIGENCE THREATS. | 3. | PROCESSES AND PRACTICES DESIGNED TO PROTECT NETWORKS, COMPUTERS, PROGRAMS AND DATA FROM ATTACK, DAMAGE OR UNAUTHORIZED ACCESS. |
| 4. | INDUSTRY'S PRIMARY REFERENCE IN THE PROTECTION OF CLASSIFIED INFORMATION. | 6. | THIS QUESTIONNAIE IS FILLED OUT AFTER YOUR FOREIGN TRAVEL IS COMPLETED. |
| |
© 2015
PuzzleFast.com, Noncommercial Use Only