Across
- 2. A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure. (three words)
- 6. Data derived from friendly detectable actions and opensource information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities or activities.
- 8. You are required to ______ suspicious behavior.
- 10. ____ ________ Monitoring (two words)
- 11. An adversary having the intent, capability, and opportunity to cause loss or damage.
- 12. Goal of an Insider Threat Program.
- 13. ________ Assistance Program
Down
- 1. Reportable action. (two words)
- 3. A potential risk indicator for person living above his means.
- 4. The ability and opportunity to obtain knowledge of classified sensitive information.
- 5. Threat of injury to persons.
- 7. Any person with authorized access to an U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems.
- 9. An employee who hates his job to the point of aggression.
