Security Education Week 2019

12345678910111213
Across
  1. 5. a weakness in a system or internal controls that could be exploited by a threat source
  2. 6. a fancy term for scamming people, ripping them off is social __________
  3. 8. a cyber attack that uses email to trick users into taking an action, such as clicking on a link or opening an attachment
  4. 10. this is granted to an employee for access to classified information
  5. 11. this policy states that Leonardo DRS computers are for DRS business purposes only (2 words)
  6. 13. this type of agreement is made between the US Government, Leonardo, and DRS to mitigate potential security risks and influence associated with foreign ownership
Down
  1. 1. this type of email can be reported using the add-in button on the Outlook toolbar
  2. 2. provide advanced notice of this type of travel in advance to trade and security
  3. 3. performing unrequired work outside of normal duty hours is an indicator of this (2 words)
  4. 4. this type of information reflects poorly on the integrity or character of a cleared employee that suggests that his or her ability to safeguard classified info may be impaired.
  5. 7. while in a DRS facility, a visitor must be ________ at all times unless approved by security
  6. 9. the level of facility security clearance at DRS Laurel Technologies Johnstown
  7. 12. unclassified info that requires protection from unauthorized disclosure, special handling safeguards, or prescribed limits on dissemination