Government Cyber Awareness

12345678910111213141516171819
Across
  1. 3. Unauthorized disclosure of this category of classified information could be expected to cause grave damage to national security (2 words)
  2. 6. __________ Unclassified Information
  3. 10. The ability and opportunity to gain knowledge of classified information.
  4. 12. Unauthorized disclosure of this category of classified information could be expected to cause serious damage to national security
  5. 14. Unauthorized disclosure of this category of classified information could be expected to cause damage to national security
  6. 15. This type of controlled access area is established to work on classified material during regular working hours, but during non-working hours, classified material must be stored in an approved repository for classified storage
  7. 17. __________-in-depth is a determination made by the Cognizant Security Agency (CSA) that a contractor's security program consists of layered and complementary security controls sufficient to deter and detect unauthorized entry and movement within the facility
  8. 19. Before releasing classified material to someone, the holder of the material must determine that the person has appropriate eligibility for access and a valid __________ (3 words)
Down
  1. 1. Any circumstance or event with the potential to adversely impact agency operations (including mission, functions, image, or reputation) agency assets, or individuals.
  2. 2. The purpose of the Assesment and Authorization (A&A) process is to __________ cleared contractors' new Information Systems for classified processing.
  3. 4. A security __________ is any weakness that can be exploited by an adversary to gain access to an asset to include a person, structure, facility, information, material, or process that has value.
  4. 5. __________ Workforce 2.0 is the whole-of-government approach to reform the personnel security process and establish a single vetting system for the U.S. Government.
  5. 7. This is the supplement to the Federal Acquisition Regulation administered by the Department of Defense (acronym)
  6. 8. If classified information is transmitted through unsecure means, it is considered a __________ at a minimum.
  7. 9. There is only one type of these currently available and GSA-approved for classified storage: The Sargent & Greenleaf (S&G) Model 8077
  8. 11. The alpha-numeric code assigned to each contractor who does work for the U.S. government assigned through the System for Award Management (acronym)
  9. 13. We lessen the impact of foreign ownership, control, or influence (FOCI) using this type of agreement
  10. 16. When an administrative determination of eligibility for access to classified information by a specific contractor company has been made, that company is said to be a __________ contractor
  11. 18. Probability and severity of loss linked to threats or hazards and vulnerabilities.