Security Awareness Training

Slides:



Advertisements
Similar presentations
Pennsylvania BANNER Users Group 2007 Disaster Recover For The Financial Aid Environment.
Advertisements

1 Authored by South Fort Worth Composite Squadron 02-Mar-2004 Rev 50 Version 2.3 Modified by Lt Colonel Fred Blundell TX-129th Fort Worth Senior Squadron.
1 Authored by Lt Colonel Steve Haney 23-May-2000 Rev 23 Modified by Lt Colonel Fred Blundell TX-129th Fort Worth Senior Squadron For Local Training Rev.
Developed by the National Emergency Services Academy Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training Rev 5.1.
Authored by Rich Simerson 01-Jun-2007 Updated 01-Feb-2011 Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training Rev.
Authored by John W. Desmarais 18-Dec-1999 Updated 09-Jul-2008 Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training.
1 Authored by John W. Desmarais 18-Dec-1998 Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training Rev Jan-2014.
Authored by John W. Desmarais 18-Dec-1999 Updated by Brockman 09-Jul-2008 Modified by Lt Colonel Fred Blundell TX-129th Fort Worth Senior Squadron For.
THE FOLLOWING MINI PRESENTATION ON OPSEC IS TAKEN FROM A US AIR FORCE BRIEFING. ALTHOUGH THIS IS A MILITARY PRESENTATION, IT PROVIDES A GOOD OVERVIEW OF.
Introduction to Operations Security (OPSEC) Updated 09/28/11 1 Security is Everyone's Responsibility – See Something, Say Something!
Authored by N.P. Norris - USAF Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training Only Rev Jan-2014.
Authored by John W. Desmarais 18-May-1998 Updated 18-May-2008 Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training.
HUMAN FACTORS Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training Rev Jan-2014.
Security Solutions Group
1 Authored by John W. Desmarais 18-Dec-1998 Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training Rev Jan-2014.
Authored by John W. Desmarais 18-May-1998 Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training Rev Jan-2014.
Authored by Gary Dawson 01-Jan-2012 TX-129 Fort Worth Senior Squadron Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local.
Authored by John W. Desmarais 18-Dec-1999 Updated by Brockman 09-Jul-2008 Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local.
Authored by J. Desmarais Modified by Lt Colonel Fred Blundell TX-129th Fort Worth Senior Squadron For Local Training Rev Jan-2014.
1 Authored by John W. Desmarais 18-May-1999 Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training Rev Jan-2014.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Authored by John W. Desmarais 18-May-1999 Updated by 09-Jul-2008 Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training.
Introduction to CAP Safety Authored by Paul Mondoux – NHWG/SE Modified by Lt Colonel Fred Blundell TX-129th Fort Worth Senior Squadron For Local Training.
1 Authored by M. Moyer 01-Mar-2011 Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training Rev Jan-2014.
Authored by John W. Desmarais 18-May-1999 Updated by 09-Jul-2008 Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training.
Welcome! 1 Safe Harbor - Safe Schools, LLC - all rights reserved 2012.
1 Authored by John W. Desmarais Updated 10-Jun-2005 Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training Rev Jan-2014.
1 of 2 Going on vacation requires careful preparation and there are a number of things you should do at the office before taking extended time off. This.
AFAMs and Civil Air Patrol PIOs August CAP Mission Summary CAP Mission Summary Training and Qualification Changes Training and Qualification Changes.
Presented by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron United States Air Force Auxiliary - Civil Air Patrol Rev Jan
TLO 2: Action: Plan operational security. Intermediate-level training.
UNCLASSIFIED. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that.
Developing a Records & Information Retention & Disposition Program:
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
iWATCH Army Training for Contractors “See Something -- Say Something”
One Team, One Fight One Mission Presented by the Ordnance Center & Schools Security Office.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Information Asset Classification
Operation Name SGT Artemis O’Conan Operations Center
Military families and Operational Security. Family members are vital to the success of our military. You may not know it, but you play a crucial role.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Presented by the 1st Information Operations Command.
ESCCO Data Security Training David Dixon September 2014.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Using NIMA Limited Distribution Data & Products Many of NIMA’s data and products are Unclassified Limited Distribution (LIMDIS). These materials are used.
Operational Security PCC. VII-F.1.
Security Awareness Training
APAN Group Owner Training. APAN Groups Overview FOUO PII Other types Information Categories Aggregate data impacts OPSEC Group Owner Responsibilities.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Public Affairs Office Utah National Guard Meeting the Media.
OPSEC and Geospatial Information. Five step process Our operations from an adversary point of view Compilation Indicators Operations Security.
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
Sensitive But Unclassified (SBU) Information
UNCLASSIFIED OPSEC AND THE HOLIDAY SEASON. UNCLASSIFIED O VERVIEW What does OPSEC have to do with the holidays? OPSEC and Shopping Presents! OPSEC at.
Watech.wa.gov Records Management In a nutshell. watech.wa.gov What’s a record? A record is anything you create in the course of doing your work – Everything.
Operational Security Awareness
Provided by OSPA ( Operations Security (OPSEC)
For Official Use Only (FOUO) and Similar Designations NPS Security Office
2015Computer Services – Information Security| Information Security Training Budget Officers.
HIPAA Privacy What Every Staff Member Needs to Know.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Privacy & Confidentiality
Command Indoctrination Operations Security DD MMM YY
Employee Privacy and Privacy of Employee Information
Overall Classification of this Briefing is UNCLASSIFIED
Command Indoctrination Operations Security DD MMM YY
Presentation transcript:

Security Awareness Training OPSEC Security Awareness Training Authored by Kalet Talley 05-May-2006 Updated By J Salvador 20-Nov-2007 Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local Training Rev 6.0 03-Jan-2014

This Training Slide Show is a project undertaken by Lt Colonel Fred Blundell of the TX-129 Fort Worth Senior Squadron, Fort Worth, TX for local use to assist those CAP Members interested in advancing their skills. The information contained herein is for CAP Member’s personal use and is not intended to replace or be a substitute for any of the CAP National Training Programs. Users should review the presentation’s Revision Number at the end of each file name to ensure that they have the most current publication.

So What Is OPSEC? “Operations Security” OPSEC deals primarily with protecting sensitive but unclassified information that can serve as indicators about our mission, operations and capabilities A Five Step Process 1. Identify Critical Information (CI) 2. Analyze the threat to the CI 3. Determine OPSEC vulnerabilities 4. Determine the acceptable level of risk 5. Implement appropriate countermeasures

VULNERABILITY ANALYSIS The OPSEC Process COUNTERMEASURE APPLICATION CRITICAL INFORMATION THREAT ANALYSIS VULNERABILITY ANALYSIS RISK ASSESSMENT PROGRAM REVIEW

You already practice OPSEC at home When most of us leave home for vacation, we take actions to protect our homes while we’re away. We may: Stop newspaper deliveries Have the yard mowed Buy light timers Have a neighbor get the mail In short, we want our houses to look like someone is home

What is Critical Information? Critical Information (CI) is information which can potentially provide an adversary with knowledge of our intentions, capabilities or limitations. It can also cost us our technological edge or jeopardize our people, resources, reputation and credibility. Controlled unclassified information, is often identified as Critical Information.

Information Designations For Official Use Only (FOUO) Non-classified but sensitive DoD information Some CAP missions are designated FOUO CAP radio frequencies are designated FOUO Other agencies use similar designations Sensitive But Unclassified (SBU) Law Enforcement Sensitive (LES) Trusted Agent – Eyes Only, etc.

Control of Critical Information Regardless of the designation, the loss or compromise of sensitive information could pose a threat to the operations or missions of the agency designating the information to be sensitive. Sensitive information may not be released to anyone who does not have a valid “need to know”.

Examples of Critical Information Deployments Chaplain or other support requested of CAP Technology Capabilities of SDIS, ARCHER Exercises CAP participation in DoD exercises Missions Planned intercept missions Law enforcement support missions Major event support like the Super Bowl or Olympics

Communications Frequencies and access tones Locations of Resources Airplanes, Vehicles, Repeater Sites, etc.

The Threat Others constantly study us to determine our weaknesses Their Tools: HUMINT Human Intelligence SIGINT Signals Intelligence COMMINT Communications Intelligence ELINT Electronic Intelligence Many more “INTs”

HUMINT You could be a target! Watch what you say to: The public/media Friends Professional Colleagues outside of CAP/DoD Places to be especially wary At work Bars and restaurants Conventions/symposiums Don’t try to impress people with your knowledge Loose Lips Sink Ships!

SIGINT, COMMINT, ELINT Americas enemies actively target US military communications systems CAP performs non-combat military missions and operates on military frequencies CAP is entrusted with more sensitive military information than you may think Don’t assume we’re immune because we’re out of the mainstream military presence For that reason we can actually be MORE vulnerable Watch what you transmit on: Radios, phones, Fax, and email

Vulnerability: Public Web Sites Publicly accessible web sites will NOT contain: For Official Use Only (FOUO) Information Such as CAP frequencies Sensitive Information Plans Planned Deployments Personal Information SSANs Home phone numbers

Marking Documents Documents containing FOUO info must be marked Examples of CAP FOUO documents: Exercise or operational plans Lists of CAP radio frequencies or access tones UNCLASSIFIED//FOR OFFICIAL USE ONLY Information contained in this document is designated by the Department of Defense (DoD) as For Official Use Only (FOUO) and may not be released to anyone without the prior permission of NHQ CAP and/or CAP-USAF

Material other than paper documents (for example, slides, computer media, films, etc.) shall bear markings that alert the holder or viewer that the material contains FOUO information. Each part of electrically transmitted messages containing FOUO information shall be marked appropriately. Messages containing FOUO information shall contain the abbreviation “U//FOUO" before the beginning of the text.

Protection of FOUO Information FOUO information should be stored in locked desks, file cabinets, bookcases, locked rooms, or similar items, unless Government or Government-contract building security is provided. FOUO documents and material may be transmitted via first-class mail, parcel post or -- for bulk shipments -- fourth-class mail. Electronic transmission of FOUO information (voice, data or facsimile) should be by approved secure communications systems whenever practical.

It’s Everyone’s Responsibility The purpose of the security program is to protect against unauthorized disclosure of official information. Keep your information secure at all times. OPSEC is mostly common sense. If we all take the time to learn what information needs protecting, and how we can protect it, we can continue to execute our mission effectively.

Disclosure of Information Disclosure of information, quite simply is when information passes from one party to another. When dealing with sensitive information, it is the responsibility of the party possessing the information to ensure it is not disclosed to parties who do not have a need for or a right to the information.

Authorized Disclosure Disclosure of sensitive information is authorized only when the party receiving the information can be properly identified and has a “need to know.” “Need to Know” does not mean, because a person holds a high management position, he or she automatically needs access to the information.

Unauthorized Disclosure Unauthorized disclosure of sensitive information is when the party receiving the information does not have a “Need to Know.” In most cases, unauthorized disclosures are unintentional and due to poor planning or a failure to think by the possessing party.

Unaware of Surroundings One of the leading causes of unintentional disclosures is simply people not being aware of what is happening around them. Discussing sensitive information when you are unsure or unaware of your surroundings can quickly lead to this information being disclosed to the wrong people.

Awe Of Position We all want to please our commanders, and work very hard each day to do so. However, even if a superior officer requests something that is sensitive in nature, we must still make sure they meet all the requirements for access to this information just like everyone else.

The “Message” Operations Security is everyone’s business Good OPSEC saves lives and resources Always use common sense and stay alert Only release info to those with a valid need-to-know Identify vulnerabilities to your commander

The Bottom Line OPSEC is a time-tested process that analyzes threats, identifies Critical Information, and develops appropriate countermeasures OPSEC is used by all of us in everyday life OPSEC is not so much a bunch of security rules, but a common-sense approach to viewing your operations through the adversary’s eyes OPSEC increases opportunities for mission success by protecting Critical Information You are the key to making OPSEC work!

Success Means... Being effective in helping defend our homeland Keeping CAP and Air Force people alive and safe Helping America keep its technological and military advantage Helping preserve freedom and liberty

QUESTIONS? ALWAYS THINK SAFETY!