Across
- 2. Person, A person has a favorable determination of eligibility for access to classified information, has signed an approved nondisclosure agreement, and has a need-to-know.
- 5. An administrative determination that an individual is eligible, from a security point of view, for access to classified information.
- 11. Activities designed to prevent or thwart spying, intelligence gathering, and sabotage by an enemy or other foreign entity.
- 13. 5 step process to keep potential adversaries from accessing our critical information, to include information about planned, ongoing, or completed operations.
- 14. Unauthorized disclosure of classified information.
- 15. Concealing foreign travel, unexplained affluence, working abnormal work hours, or attempting to access sensitive information without authorization.
- 18. Travel Report your _______ ______ to your security office at least 30 days in advance
- 19. Threat, The likelihood, risk or potential for an insider to use their authorized access, wittingly or unwittingly, to harm the organization and / or national security.
- 20. Oversees and implements security measures within a specific facility or organization.
Down
- 1. The process of changing laws so that certain actions are no longer considered crimes or have reduced penalties.
- 3. Clearance, Having a ________ _________ requires me to report changes in status, adverse information, foreign travel and submit an SF86 every 5 years.
- 4. Unclassified Information, Information that requires safeguarding or dissemination controls as per laws, regulations, or government-wide policies.
- 6. An administrative determination that, from a security viewpoint, an entity is eligible for access to classified information.
- 7. Any form of subtle extraction of information during an apparently normal and innocent conversation.
- 8. Unauthorized disclosure that can be expected to cause Serious Damage to National Security.
- 9. The ability or opportunity to obtain knowledge of classified information.
- 10. Spotting and assessing can be a phase of this insider threat technique.
- 12. This is an example: Processing classified material on a non-approved computer.
- 16. Information, Any information that adversely reflects on the integrity or character of a cleared employee, which suggests that his or her ability to safeguard classified information may be impaired, that his or her access to classified information clearly may not be in the interest of national security, or that the individual constitutes an insider threat.
- 17. Evaluation, A personnel security investigative process to review the background of a covered individual who has been determined to be eligible for access to classified information or to hold a sensitive position at any time during the period of eligibility.
