Insider Threat Awareness

1234567891011121314151617181920212223
Across
  1. 2. Policy Violations, Sharing Credentials and ______________ by trusted Insiders can result in system access to malicious outsiders.
  2. 3. A ______________ is typically a current or former employee with direct, credible information about wrongdoing that they report through appropriate channels.
  3. 7. A _____________ insider is someone who deliberately steals sensitive data or sabotages an organization.
  4. 9. He was arrested on February 15, 2019, which prevented him from possibly carrying out acts of violence. He self-identified as a 'White Nationalist' for over 30 years in writings advocating for 'focused violence' in order to establish a white homeland.
  5. 12. Training and _____________ is an essential defensive strategy for countering threats from cyber-enabled economic collection and espionage.
  6. 15. 1. He was an Army psychiatrist who shot and killed 13 unarmed personnel at Fort Hood, Texas. He was known to have communicated with radical Islamic cleric Anwar Nasseral-Awlaki.
  7. 18. This former U.S. Army Infantryman expressed a desire for violent retribution for attacks against Muslims in internet posts and forums. He testified that he intended to commit mass murder and was convicted of providing material support to terrorists and attempted use of a weapon of mass destruction.
  8. 19. A _____________ insider is an employee who makes a mistake, such as losing a company device or falling for a phishing scam.
  9. 21. The Economic Espionage Act of 1996 sets punishment for violations at: UP TO ________ IN PRISON AND UP TO $500,000 FINE
  10. 22. The Economic Espionage Act of 1996 specifically protects:
  11. 23. Cyber insider threat is an individual with _____________ access who wittingly or unwittingly attempts to disrupt a computer network or system.
Down
  1. 1. He was a major in the U.S. Army Reserve Command at Fort Bragg, North Carolina. He pleaded guilty to threatening mosque members in order to obstruct their free exercise of religious beliefs.
  2. 4. Whistleblower laws prohibit employers from ___________ employees who report wrongdoing
  3. 5. The ___________ is America's first whistleblower law and one of the strongest whistleblower laws in the United States.
  4. 6. Sensitive Compartmented Information (SCI) must be stored in.
  5. 8. The ______________ passed after the 2008 financial crisis, created multiple whistleblower programs across agencies like the SEC and CFTC.
  6. 10. China and ____________ are strategic competitors of the United States and are the most aggressive collectors of US economic information and technology.
  7. 11. Of the seven cases tried under the Economic Espionage Act in Fiscal Year 2010, six involved a link to _____________.
  8. 13. He posted about his desire to travel to Ukraine to fight with a violent, far-right paramilitary group on social media. He also disseminated guidance to others on how to construct Improvised Explosive Devices (IEDs) on his Facebook account.
  9. 14. Under 18 U.S. Code ยง 1924, unauthorized removal and retention of classified documents or material is punishable by: Fine and up to ________ in Prison.
  10. 16. DOD contracts shall require contractors to report the potential classification of _________ or compiled CUI to a DOD representative.
  11. 17. Whistleblowers perform an _____ service for the public and federal agencies when they report evidence of wrongdoing.
  12. 20. Requirements for safeguarding classified information for contractors/industry supporting U.S. Government entities can be found in: