Security 101

1234567891011121314151617181920
Across
  1. 2. You are required to ____ any suspicious behavior to Jovian Security.
  2. 3. One of the penalties for failure to comply with export guidelines is ____ years in prison.
  3. 6. The last name of your Security Manager/FSO/CSSO.
  4. 8. When someone sends an email with a link to a bogus website that tricks you into giving up your password, it is called ____.
  5. 10. Your ____ is your underwear; don't share it with your friends and change it often.
  6. 12. This information is deemed sensitive by the USG and requires protection of confidentiality.
  7. 14. If you ____ something, say something.
  8. 15. Two types of terrorism are International and ____.
  9. 17. Owning a security clearance does not mean you have the right to access all classified information; you must also have ____.
  10. 18. ____ is a US regulatory regime to restrict and control the export of defense and military related technologies to safeguard the US national security and further US foreign policy objectives.
  11. 20. An unsolicited request for detailed information about your job, security clearance, contract activities, etc. would be considered a ____ contact.
Down
  1. 1. Your Top Secret clearance is referred to as your ____ clearance.
  2. 4. This information, if disclosed, could reasonably be expected to cause exceptionally grave damage to National Security.
  3. 5. Never click on these in an email that has been sent by an unknown or untrusted source.
  4. 7. ____ information is any information about you or another cleared employee that suggests the ability to safeguard classified information may be impaired.
  5. 9. An ____ is an employee with legitimate access who is hardest to detect and who can cause the most damage to a company.
  6. 11. As a cleared employee of the federal government, you should neither confirm nor deny the validity of any classified information that appears in open-source publications, on television, or in movies. This is covered under Public ____.
  7. 13. Safeguard protected information, report unauthorized disclosure, and prepublication are your three ____ obligations.
  8. 16. A malicious code that can infect your system.
  9. 19. Any data that could be used to potentially identify a person.