Loss of availability
the IS, network and/or data are unavailable to authorized users, and missions or operations cannot be performed.
loss of
... [Show More] integrity
the data can no longer be trusted to be reliable or accurate
authentication
is the mechanism that authorizes or allows access to computer systems and networks and the data that resides there. loss or incorrect authentication services could allow unauthorized access to classified data. Most important IA attribute along with confidentiality.
loss of confidentiality
the data may be available in an electronic form to users who are not authorized to receive it. Most important IA attribute along with authentication.
loss of non-repudiation
means that authorized users no longer can be certain with whom they are communicating because general communications (and therefore the data processed by that information system) cannot be trusted or verified.
E.O. 13467, "Reforming Processes Related to Suitability for Govt Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information
The policy under which DoD reciprocally accepts existing national security eligibility determinations or clearances from other Government agencies
Activity Security Manager
is responsible for ensuring policy requirements for addressing an unauthorized disclosure are met
Requirments for access to NATO information
Personnel has been subject of a favorably adjudicated BI with a 10 yr scope, T5, current within five years prior to the assignment, and completed a NATO briefing
Purpose of the Controlled Access Program Coordinator (CAPCO) register
to identify the official classification and control markings, and their authorized abbreviations and portion markings
Security Violation
An event that results in or could be expected to result in the loss or compromise of
classified information
unauthorized disclosure, misclassification, unauthorized establishment or continuance of a SAP, anything contrary to EO 13526
Security Infraction
This event cannot reasonably be expected to and does not result in the loss, compromise, or suspected compromise of classified information
Impacts of security incidents
damage to national security
reduced effectiveness of DoD
increased cost
compromise to integrity of information
nullification of safeguards
Causes of security incidents
non-compliance
ignorance
carelessness
deliberateness
natural disasters
lack of communication
Requirements to perform classified activities from non-traditional locations (e.g., the employees home)
employee must be trained to operate classified information systems employee must be trained on protection and storage of classified information and Communications Security (COMSEC) materials
The employee must receive written approval for use of classified
limited access may be approved for non-US citizens only if
the prior 10 years of the subject's life can be appropriately investigated
Investigative requirement for access to Single Integrated Operational Plan-Extremely Sensitive Information (SIOP-ESI)
Individual has a valid favorable adjudicated T5 or SSBI investigation.
Qualifying criteria for personnel assigned to nuclear weapons personnel assurance positions
must be US Citizen
have security clearance eligibility in accordance with the position
must be continuously evaluated
Investigation requirements for initial assignment to a Presidential Support Activities (Yankee White) Category 2 position
Favorable completed T5/SSBI within 36 months preceding selection.
Suitability adjudication
an adjudication process that refers to a person's identifiable character traits and conduct sufficient to decide whether employment or continued employment would or would not protect the integrity or promote the efficiency of the Federal service
Copies of personnel security
investigative reports must be
destroyed by DoD recipient
organizations, within how many
days following completion
of the necessary personnel
security determination?
90 days [Show Less]