Presentation is loading. Please wait.

Presentation is loading. Please wait.

Sample only Order at www.redbikepublishing.com Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.

Similar presentations


Presentation on theme: "Sample only Order at www.redbikepublishing.com Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the."— Presentation transcript:

1 Sample only Order at www.redbikepublishing.com Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the security classification system. Employee reporting obligations and requirements. Security procedures and duties applicable to the employee's job.

2 Sample only Order at www.redbikepublishing.com Report to DISCO Employees who do not want to perform on classified work Refusal to sign SF 312

3 Sample only Order at www.redbikepublishing.com 1-207 Hotlines Hotlines are available. However, recommend that company officers have chance to handle situation Not to take place of investigations May be used to tip off Defense Hotline The Pentagon Washington, DC 20301-1900 (800) 424-9098

4 Sample only Order at www.redbikepublishing.com 1-3 Reporting Events that impact: –FCL –PCL –Protection of classified information –Loss or compromise Contractors cleared employees on reporting channels with: –Federal agencies –FBI –CSA

5 Sample only Order at www.redbikepublishing.com 1-3 Reporting (To FBI) Reports to FBI –Espionage –Sabotage –Terrorism –Subversive activities –Submit copy of written report to CSA

6 Sample only Order at www.redbikepublishing.com How to Report Report to the FBI Follow up with written report Send copy to IS Rep with FBI approval Contact FBI File Office Send Written Report Notify DSS when permitted

7 Sample only Order at www.redbikepublishing.com 1-3 Reporting (To CSA) Reports to CSA –Adverse information –Suspicious contacts –Change in cleared employee status –Naturalization –Not desiring to work on classified contract

8 Sample only Order at www.redbikepublishing.com DISCO Adverse Information Changes in Cleared Employee Status Citizenship by Naturalization Employees Desiring Not to Perform on Classified Work Standard Form (SF) 312

9 Sample only Order at www.redbikepublishing.com 1-3 Reporting (to CSA) Reports to CSA –SF 312 –Changes affecting FCL –Changes in storage capability –Inability to protect classified –Security equipment vulnerabilities –Unauthorized receipt of classified –Compromise information –Disposition of classified information –Foreign classified contracts

10 Sample only Order at www.redbikepublishing.com 1-3 Reporting (to CSA) Reports to CSA –Refusal to sign SF 312 –Changes affecting FCL –Changes in storage capability –Inability to protect classified –Security equipment vulnerabilities –Unauthorized receipt of classified –Compromise information –Disposition of classified information –Foreign classified contracts

11 Sample only Order at www.redbikepublishing.com 1-303 Loss, Compromise or Suspected Compromise Conduct preliminary inquiry Submit initial report Submit final report

12 Sample only Order at www.redbikepublishing.com 1-303 Loss, Compromise or Suspected Compromise Conduct preliminary inquiry Submit initial report Submit final report Discover circumstances surrounding the reported loss, compromise or suspected compromise.

13 www.ispcert.com Threat Awareness Briefing

14 Sample only Order at www.redbikepublishing.com www.ispcert.com Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods of Contact Countermeasures Test CONTENTS

15 www.ispcert.com  Why go through process of Research and Development  Let someone else pay for R&D  Possible military application WHY OUR TECHNOLOGY?

16 Sample only Order at www.redbikepublishing.com www.ispcert.com Protect Proprietary, For Official Use Only and Sensitive Information  This information includes:  Vendor prices  personnel ratings  medical records  corporate financial investments and resources  trade secret information  corporate/government relations  corporate security vulnerabilities  financial forecasts and budget information EMPLOYEE RESPONSIBILITY

17 Sample only Order at www.redbikepublishing.com www.ispcert.com Company Computer Security Safeguards  Use computers for authorized business  Establish and protect passwords  Visit only authorized websites  Use caution when downloading attachments  Save all work  Use classified systems for classified processing EMPLOYEE RESPONSIBILITY

18 Sample only Order at www.redbikepublishing.com www.ispcert.com  The following may indicate that you could be targeted:  Your access to active intelligence interest  Overseas locations where foreign intelligence operates  Located in the U.S. where foreign nationals can gain access to you  Ethnic, racial, or religious background that may attract the attention of a foreign intelligence operative EMPLOYEE RESPONSIBILITY

19 Sample only Order at www.redbikepublishing.com www.ispcert.com  Foreign Threat  Economic – theft of technology and commerce  Classified information-solicitation for unauthorized disclosure  Intelligence-collection efforts  Conduct Risk Analysis  Who is targeting  What do they want  How do they get it THREAT AWARENESS AND DEFENSE

20 Sample only Order at www.redbikepublishing.com www.ispcert.com  Collection efforts  Elicitation  Eavesdropping  Surveillance  Theft  Interception THREAT AWARENESS AND DEFENSE

21 Sample only Order at www.redbikepublishing.com www.ispcert.com  Suspicious Activities  Requests for information outside of need to know  Unauthorized reproduction of materials  Unauthorized removal/destruction of materials  Unexplained affluence  Regular, unexplained foreign travel  Maintains long hours in spite of job dissatisfaction Employees are required to report efforts by any individual to obtain illegal or unauthorized access to classified or sensitive information— This include proprietary information INSIDER THREAT Robert Philip Hanssen

22 Sample only Order at www.redbikepublishing.com www.ispcert.com  Fax  Snail Mail  E-mail  Telephone  Personal Contact May seem innocent enough, but….  Legitimate business requests will come through appropriate channels  Personal Contact: Asks about project specifics, whether or not classified or proprietary details  Email address originated in a foreign country METHODS OF CONTACT

23 Sample only Order at www.redbikepublishing.com www.ispcert.com  Remain non-committal if approached  Report all suspicious activities to FSO  Practice smart information systems security  Escort visitors  Pay attention to surroundings  Secure building at the end of the day COUNTERMEASURES


Download ppt "Sample only Order at www.redbikepublishing.com Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the."

Similar presentations


Ads by Google