Across
- 2. You are required to ____ any suspicious behavior to Jovian Security.
- 3. One of the penalties for failure to comply with export guidelines is ____ years in prison.
- 6. The last name of your Security Manager/FSO/CSSO.
- 8. When someone sends an email with a link to a bogus website that tricks you into giving up your password, it is called ____.
- 10. Your ____ is your underwear; don't share it with your friends and change it often.
- 12. This information is deemed sensitive by the USG and requires protection of confidentiality.
- 14. If you ____ something, say something.
- 15. Two types of terrorism are International and ____.
- 17. Owning a security clearance does not mean you have the right to access all classified information; you must also have ____.
- 18. ____ is a US regulatory regime to restrict and control the export of defense and military related technologies to safeguard the US national security and further US foreign policy objectives.
- 20. An unsolicited request for detailed information about your job, security clearance, contract activities, etc. would be considered a ____ contact.
Down
- 1. Your Top Secret clearance is referred to as your ____ clearance.
- 4. This information, if disclosed, could reasonably be expected to cause exceptionally grave damage to National Security.
- 5. Never click on these in an email that has been sent by an unknown or untrusted source.
- 7. ____ information is any information about you or another cleared employee that suggests the ability to safeguard classified information may be impaired.
- 9. An ____ is an employee with legitimate access who is hardest to detect and who can cause the most damage to a company.
- 11. As a cleared employee of the federal government, you should neither confirm nor deny the validity of any classified information that appears in open-source publications, on television, or in movies. This is covered under Public ____.
- 13. Safeguard protected information, report unauthorized disclosure, and prepublication are your three ____ obligations.
- 16. A malicious code that can infect your system.
- 19. Any data that could be used to potentially identify a person.
