Question: Which Is A Good Practice To Protect Classified Information?

Which of the following is an example of malicious code?

Taking advantage of common system vulnerabilities, malicious code examples include computer viruses, worms, Trojan horses, logic bombs, spyware, adware, and backdoor programs.

Visiting infected websites or clicking on a bad email link or attachment are ways for malicious code to sneak its way into a system..

What can malicious code do?

Malicious code is the kind of harmful computer code or web script designed to create system vulnerabilities leading to back doors, security breaches, information and data theft, and other potential damages to files and computing systems. It’s a type of threat that may not be blocked by antivirus software on its own.

What describes a sensitive compartmented information program quizlet?

Sensitive Compartmented Information: Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence.

What best describes a sensitive compartmented information program?

Sensitive Compartmented Information (SCI) is information about certain intelligence sources and methods and can include information pertaining to sensitive collection systems, analytical processing, and targeting, or which is derived from it.

What is a best practice while traveling with mobile computing devices cyber awareness?

What is a best practice while traveling with mobile computing devices? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities?

How should you protect your Common Access Card?

How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Store it in a shielded sleeve to avoid chip cloning.

What are three examples of personal information?

Examples of personal information are:a person’s name, address, phone number or email address.a photograph of a person.a video recording of a person, whether CCTV or otherwise, for example, a recording of events in a classroom, at a train station, or at a family barbecue.More items…

What is a common method used in social engineering cyber awareness 2020?

Phishing attacks are the most common type of attacks leveraging social engineering techniques. Attackers use emails, social media, instant messaging and SMS to trick victims into providing sensitive information or visiting malicious URLs in the attempt to compromise their systems.

How do you protect personally identifiable information?

10 steps to help your organization secure personally identifiable information against loss or compromiseIdentify the PII your company stores.Find all the places PII is stored.Classify PII in terms of sensitivity.Delete old PII you no longer need.Establish an acceptable usage policy.Encrypt PII.More items…•

What describes how sensitive compartmented information?

SCI is a classification label indicating that items or information is sensitive and part of a specific program or department. The program office, or GCA determines what is SCI and identifies it with proper classification markings.

What are the four types of personal information?

The following are common types of personal information.Name. A person’s name.Identification. Government issued id numbers such as a passport number or vehicle license plate.Address. Physical address and digital addresses such as an IP address.Contact. … Biographical. … Technical. … Biological Identifiers. … Medical.More items…•

What does personal information consist of?

Personal information is any piece of information that relates to a living, identifiable human being. People’s names, contact details, financial health, purchase records: anything that you can look at and say “this is about an identifiable person”. Even if their name doesn’t appear, it could be personal information.

What is a PII violation?

One of the most familiar PII violations is identity theft, said Sparks, adding that when people are careless with information, such as Social Security numbers and people’s date of birth, they can easily become the victim of the crime. …

What kind of data needs protection?

Key pieces of information that are commonly stored by businesses, be that employee records, customer details, loyalty schemes, transactions, or data collection, needs to be protected. This is to prevent that data being misused by third parties for fraud, such as phishing scams, and identity theft.

What is the best example of personally identifiable information?

Personally identifiable information, or PII, is any data that could potentially be used to identify a particular person. Examples include a full name, Social Security number, driver’s license number, bank account number, passport number, and email address.

What is the best description of two factor authentication cyber awareness?

Two-factor authentication (sometimes called “two-step verification”) combines something you know — your username and password, with something you have — such as your phone or a physical security key, or even something you are — like your fingerprint or another biometric, as a way of confirming that a person is …

Who is responsible for protecting PII?

From a legal perspective, the responsibility for protecting PII may range from no responsibility to being the sole responsibility of an organization. Generally, the responsibility is shared with the organization holding the PII and the individual owner of the data. That said, while you might not be legally responsible.

Which is a rule for removable media?

What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Do not use any personally owned/non-organizational removable media on your organization’s systems.

What are the basic personal information?

Personal information includes a broad range of information, or an opinion, that could identify an individual. … For example, personal information may include: an individual’s name, signature, address, phone number or date of birth. sensitive information.

What describes a sensitive compartmented information program cyber awareness challenge?

UNCLASSIFIED Cyber Awareness Challenge 2019 SCI and SCIFs SCI and SCIFs Sensitive Compartmented Information Sensitive Compartmented Information (SCI) is a program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control.

What is a sensitive compartmented information clearance?

Sensitive compartmented information (SCI) is a type of classified information controlled through formal systems established by the Director of National Intelligence. … Therefore, it is sufficient to declare that a candidate possesses a TS/SCI clearance with a polygraph.