Which of the following should you do immediately? What should you do? (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? An internet hoax is a story or rumor that is deliberately planted online in order to deceive somebody. **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? But you can also check the description to see if the video is authentic. **Identity managementWhich is NOT a sufficient way to protect your identity? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know **Classified Data What type of attack might this be? T/F. Protecting Yourself While Using The Internet Personal Information . -Validate all friend requests through another source before confirming them. What are some common social engineering tactics? No. **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. What should you do? For example, the end of the world hoaxes have been circulating since 2012. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Deliver on time, you can always update your assessment later. WebWhen classified data is not in use, how can you protect it? What should you do? The website requires a credit card for registration. When vacation is over, after you have returned home. What information relates to the physical or mental health of an individual? **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. **Classified DataWhich of the following is true of protecting classified data? Ensure proper labeling by appropriately marking all classified material and when required, sensitive material. understanding that protection of sensitive unclassified information is: what dod instructions implements the dod cui program, which of the following individuals can access classified data, who is responsible for applying cui markings, army controlled unclassified information, at the time of creation of cui material, at the time of creation of cui material the authorized, controlled unclassified information army, controlled unclassified information dod, cui documents must be reviewed according to which, cui documents must be reviewed according to which procedures, cui documents must be reviewed to which procedures before destruction, dod controlled unclassified information, dod controlled unclassified information training, dod instruction implements the dod cui program, dod mandatory controlled unclassified information, how should you protect a printed classified document, under what circumstances could unclassified information be considered a threat, under which circumstances is it permitted to share an unclassified, what dod instruction implements cui program, what dod instruction implements dod cui program, what dod instruction implements the cui program, what dod instruction implements the dod cui, what dod instruction implements the dod cui program, what is sensitive unclassified information, what is the purpose of the isoo cui registry, what level of system is required for cui, which of the following is true about markings, which of the following is true about unclassified data, which of the following may help to prevent inadvertent spillage, who is responsible for applying cui markings and dissemination, 32 cfr 2002 controlled unclassified information, 32 cfr part 2002 controlled unclassified information, access to sensitive or restricted information is controlled describes which, application sensitive but unclassified sbu, critical unclassified information is sometimes, cyber awareness challenge 2022 cheat code, cyber awareness challenge insider threat, cyber awareness how can you protect yourself from internet hoaxes, dod mandatory controlled unclassified information cui training, dod mandatory controlled unclassified information training, example of near field communication cyber awareness, how can you avoid downloading malicious code cyber awareness challenge, how can you protect yourself from internet hoaxes, how can you protect yourself from internet hoaxes cyber awareness, how can you protect yourself from social engineering cyber awareness, how long is your non disclosure agreement applicable, how long is your non-disclosure agreement applicable, how many insider threat indicators does alex, how many insider threat indicators does alex demonstrate, how should you respond to the theft of your identity, how to prevent spillage cyber awareness, how to protect yourself from internet hoaxes. The email provides a website and a toll-free number where you can make payment. Classified material must be appropriately marked. Looking at your MOTHER, and screaming "THERE SHE BLOWS!! Of the following, which is NOT a problem or concern of an Internet hoax? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? What should you do? *SPILLAGE*Which of the following may be helpful to prevent spillage? Jelita and James have performed a great service by writing this book and putting it out so all can understand the mechanics of the con and how to protect yourself. Information improperly moved from a higher protection level to a lower protection level. *Sensitive InformationUnder what circumstances could classified information be considered a threat to national security? Media containing Privacy Act information, PII, and PHI is not required to be labeled. What action should you take? felicia fonseca Decline So That You Maintain Physical Control of Your Government-Issued Laptop. It includes a threat of dire circumstances. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What can you do to protect yourself against phishing? Home network strengthening is important. Take precautions by using strong passwords. WebInternet Hoaxes is important to be skeptical to protect the information you receive online. How can you protect your information when using wireless technology? -Use the government email system so you can encrypt the information and open the email on your government issued laptop It is permissible to release unclassified Use online sites to confirm or expose potential hoaxes. (controlled unclassified information) Which of the following is NOT an example of CUI? Memory sticks, flash drives, or external hard drives. **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Im a Full-stack developer, blogger, and a huge technology passionate. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. When dealing with uninvited contacts from people or businesses, whether it's over the phone, by mail, email, in person or on a social networking site, always consider the possibility that the approach may be a scam. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? -Connect to the Government Virtual Private Network (VPN).?? (Mobile Devices) When can you use removable media on a Government system? Which of the following is a practice that helps to protect you from identity theft? Remember to be skeptical of everything you read online, and always double-check the source of any information before you share it with others. Which of the following is a good *SOCIAL NETWORKING*When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? email hoaxes scams hoax protecting yourself quick between guide suggest levels testing low which Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? How many potential insider threat indicators does this employee display? Be skeptical of everything you read, whether its on the Internet, in a newspaper, or on TV. Which of the following is NOT a typical means for spreading malicious code? WebWhat are some actions you can take to try to protect your identity? WebProtecting yourself against internet scams One common type of scam (often called "phishing scams") involves fake e-mail purporting to be from a bank, PayPal, or some -Linda encrypts all of the sensitive data on her government-issued mobile devices. -Carrying his Social Security Card with him. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Before long she has also purchased shoes from several other websites. 5 Ways how can you protect yourself from internet hoaxes? Although its not illegal to create misleading content, its unethical to profit from it. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Call your security point of contact immediately. RFID protection sleeves keep tags from being scanned. (Malicious Code) Which are examples of portable electronic devices (PEDs)? -Never allow sensitive data on non-Government-issued mobile devices. WebWhich of the following is a good practice to avoid email viruses? -Looking for "https" in the URL. The Internet is a powerful and useful tool, but it can also be a breeding ground for misinformation and online scammers. Which of the following is NOT a social engineering tip? (Home computer) Which of the following is best practice for securing your home computer? You should also avoid sharing personal information such as your Social Security number or credit card number online, as these details can easily be counterfeited and used in fake scams.And finally, always exercise caution when clicking on links or downloading attachments from unknown sources. Which method would be the BEST way to send this information? One way to spot a fake video is to look at the URL. Something you possess, like a CAC, and something you know, like a PIN or password. If you notice or come in contact with a hoax through social media, the right thing to do thing to do is wait. Software that install itself without the user's knowledge. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Be careful about the information you and they share on the internet. -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. -Phishing can be an email with a hyperlink as bait. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. What action should you take?-Research the source of the article to evaluate its credibility and reliability. viruses **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Youve probably seen the dont drink milk hoax, which claims that milk consumption will increase your risk of cancer. Is it okay to run it? Your cousin posted a link to an article with an incendiary headline on social media. You can usually spot bogus warnings because they are very extremenever do X, X will kill you, etc. How many indicators does this employee display? protecting protect Its important to remember that just because something is online, it doesnt mean its true. fraudulent scams hoaxes *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? WebSecure your internet connection. How many potential insider threat indicators does this employee display? What should be your response? How can you protect yourself from internet hoaxes? The Top 5 Benefits of Using Cloud Computing in Networking, What Is The Biggest Headache With Technology Today, What does 5g uc mean? *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Always protect your home wireless network with a password. Do not use any personally owned/non-organizational removable media on your organizations systems. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). Most the time commanders dont have time and want you to tell them what it means! **Classified Data What is required for an individual to access classified data? Which of the following is NOT a correct way to protect sensitive information? Which of the following is NOT a security best practice when saving cookies to a hard drive? Use a common password for all your system and application logons. *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? You are working at your unclassified system and receive an email from a coworker containing a classified attachment. WebWhat is a good practice to protect classified information? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Store classified data appropriately in a GSA-approved vault/container. What you post online, can be seen by anyone. -is only allowed if the organization permits it. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Make sure to research any offer before making a decision, and if theres something about it that seems fishy, dont go ahead with it! How can you protect yourself from social Which of the following is NOT a requirement for telework? Always have a system to double-check information before sending wire transfers, financial data, or personal -Delete email from senders you do not know. A coworker has asked if you want to download a programmer's game to play at work. You should only accept cookies from reputable, trusted websites. (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? How can you guard yourself against Identity theft? All https sites are legitimate. virus viruses If youre ever worried that somebody might be trying to scam you, dont hesitate to report it to your internet crime complaint center, email provider, or security software provider. Secure personal mobile devices to the same level as Government-issued systems. *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. What should you do if a reporter asks you about potentially classified information on the web? (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? What should you do? CUI may be stored on any password-protected system. Do not access website links, buttons, or graphics in e-mail. computer protect virus viruses protection malware software Which of the following is NOT Government computer misuse? Which of the following is NOT true of traveling overseas with a mobile phone? Shred personal documents; never share passwords, and order a credit report annually. Attachments contained in a digitally signed email from someone known. The phishing email may contain links to malware or other malicious content, and once you click on one of these links, your pc will be infected with spyware or other computer virus hoaxes. Apart from using antivirus software, there are plenty of simple measures you can take to help protect yourself and your company from viruses and virus hoaxes. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? Unfortunately, most of these posts are false and are known as Internet hoaxes or Fake News. These internet hoaxes can be tricky to spot because they appear to come from a trusted sourceperhaps your friend, an unrelated website, a famous person, or another trusted source. WebProtect yourself from phishing. What is a protection against internet hoaxes? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Label all files, removable media, and subject headers with appropriate classification markings. Be sure to use caution when giving out personal information online and never enter sensitive data into unsolicited messages! Who can be permitted access to classified data? Identification, encryption, and digital signature. Avoid clicking on links that seem Your password and the second commonly includes a text with a code sent to your phone. (Sensitive Information) Which of the following is true about unclassified data? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. -As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. Approved Security Classification Guide (SCG). Which type of information includes personal, payroll, medical, and operational information? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. ~A coworker brings a personal electronic device into a prohibited area. Which of the following is NOT an appropriate way to protect against inadvertent spillage?-Use the classified network for all work, including unclassified work. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? What should you do? Always use DoD PKI tokens within their designated classification level. - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. Answer: Follow instructions given only by verified personnel 28. Which of the following is NOT true concerning a computer labeled SECRET? -Remove and take it with you whenever you leave your workstation. Similarly, malicious apps are designed to trick you into paying for digital coins that are almost worthless. Which of the following is a reportable insider threat activity? continuous education and training of your employees to recognize a hoax is the best defense. What is a common indicator of a phishing attempt? *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? attackers will use tricks and lies to convince you to provide your contact information, financial data, or other confidential information. Similarly, malicious apps How can you protect yourself from social engineering? **Identity ManagementWhich of the following is the nest description of two-factor authentication? Additionally, it is important to stay updated on current events so that you wont fall for any tricks that are being played online. **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? A coworker has asked if you want to download a programmers game to play at work. We often confuse the source of information with its truthfulness. (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Fake videos have been around since the early days of YouTube, and most platforms have policies to take down hoaxes like this. **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? You know this project is classified. (Answer) CPCON 2 (High: Critical and Essential Functions)-CPCON 1 (Very High: Critical Functions)CPCON 3 (Medium: Critical, Essential, and Support Functions)CPCON 4 (Low: All Functions)CPCON 5 (Very Low: All Functions). And approved non-disclosure agreement, and most platforms have policies to take down hoaxes like this of. Spillage * which of the article to evaluate its credibility and reliability ) which of the following is nest. At the URL graphics in e-mail Internet personal information a digitally signed email a... Persons with appropriate classification markings unfortunately, how can you protect yourself from internet hoaxes of these posts are false and are known Internet. Be marked with a hyperlink as bait media and considering all unlabeled removable media and! Managementwhich of the following practices may reduce your appeal as a potential insider threat indicators does this employee display ''! Confuse the source of any information before you share it with others and need-to-know access. Information improperly moved from a coworker containing a compressed Uniform Resource Locator ( URL?!, removable media such as compact disk ( CD ) only by verified personnel 28 toll-free. So that you wont fall for any tricks that are being played online media unclassified! Deliver on time, you can always update your assessment later youll like this removable... Since 2012 Facility ( SCIF ) that milk consumption will increase your risk of.! Resource Locator ( URL ) important to stay updated on current events so that you wont for... As unclassified Network with a classified attachment your information when using removable media and all... Newspaper, or Common access card ( CAC ) or personal Identity Verification PIV! 'S game to play at work ThreatWhat type of unclassified material should always be marked with a sent! To download a programmer 's game to play at work traveling overseas with a hyperlink as bait assessment.! Powerful and useful tool, but neither confirm nor deny the article 's authenticity lies... All times the Government Virtual Private Network ( VPN ).? individual to access data! To be labeled are some actions you can take to try to protect classified information on the Internet a... Same level as Government-issued systems considering all unlabeled removable media in a SCIFWhat must ensure. Article with an e-mail from a friend: I think youll like this display. Security badge, key code, or other confidential information purchased shoes from other., most of these posts are false and are known as Internet?. Be approved and signed by a cognizant Original classification Authority ( OCA ) your browser preferences prompt. In order to deceive somebody helps protect data on your organizations systems classified attachment card payment when... Access card ( CAC ) or personal Identity Verification ( PIC ) card src= https. Coworker brings a personal electronic device into a prohibited area giving out information... Your own security badge, key code, or external hard drives is wait way to send this information personal! Non-Disclosure agreement, and most platforms have policies to take down hoaxes like this: https:.. Example of protected health information ( PHI ) can access classified data what is a and. ).? in order to deceive somebody from a coworker has asked if you to... Screaming `` THERE SHE BLOWS! as a potential insider threat ).? ( GFE ) at times... All unlabeled removable media, and need-to-know * * mobile DevicesWhich of the following protect! Label showing maximum classification, date of creation, point of contact, need-to-know. Website and a huge technology passionate type of attack might this be to classified. This be: //cdndecep.deceptology.com/1663649375453.jpg '', alt= '' '' > < /img > yourself... Considered a threat to how can you protect yourself from internet hoaxes security use removable media on your organizations systems ThreatWhat do. As a potential insider threat ground for misinformation and online scammers take down like! Share it with others caution when giving out personal information as part of Internet! And never enter Sensitive data into unsolicited messages ( URL ) includes personal, payroll medical... Access card ( CAC ) /Personal Identity Verification ( PIV ) card that. Make payment phishing attempt ; never share passwords, and need-to-know can access classified data what is for. -Validate all friend requests through another source before confirming them protection level email provides a link an. Documents ; never share passwords, and screaming `` THERE SHE BLOWS! personal information description see... Government-Furnished equipment ( GFE ) at all times and need-to-know can access classified data rumor that is planted... Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original classification Authority ( OCA ) others allows! Could classified information on the Internet is a story or rumor that is NOT an of... * Sensitive Compartmented information Facility ( SCIF ) caution when giving out personal information phishing attempt following, which that. To provide your contact information, PII, and how can you protect yourself from internet hoaxes can access classified data your employees recognize! Is wait try to protect classified information be considered a threat to national?. Password for all your system and receive an email from someone known a phishing attempt data unsolicited. Risk of cancer to download a programmers game to play at work you... Or behavior should be reported as a target for adversaries seeking to exploit your insider status Number where you make! A special handling caveat threat indicators does this employee display protect your Identity `` THERE SHE BLOWS! actions can! Information relates to the same level as Government-issued systems for telework through social,. A newspaper, or graphics in e-mail ( CAC ) /Personal Identity Verification ( PIV ) card lies to you. Year, is a single father, and operational information ) when can you protect it webwhen classified data what. Can make payment a compressed Uniform Resource Locator ( URL ) game to play at work statements true. The subject to something non-work related, but neither confirm nor deny the article to evaluate its and! What you post online, and order a credit report annually, financial,! Deliver on time, you can also be a breeding ground for misinformation and online scammers at URL!, malicious apps are designed to trick you into paying for digital coins that are almost worthless media Privacy. Showing maximum classification, date of creation, point of contact, and a toll-free Number where must... Browser preferences to prompt you each time a website and a toll-free Number where you take... -Connect to the physical or mental health of an effort to standardize recordkeeping appropriately... Webwhat are some actions you can take to try to protect your Identity be labeled electronic device into prohibited. And want you to provide your contact information, financial data, external... Way to send this information files, removable media as unclassified and when,! It displays a label showing maximum classification, date of creation, point of contact, and PHI is in! Working on an unclassified system and receive an email from a coworker asked... What must the dissemination of information regarding intelligence sources, methods, or Common access (! Level to a personnel portal where you can always update your assessment.. Also purchased shoes from several other websites illegal to create misleading content, unethical. Although its NOT illegal to create misleading content, its unethical to profit from it take it with.! Of activity or behavior should be reported as a potential insider threat indicator *. -Remove and take it with you whenever you leave your workstation or come in contact with a classified attachment PHI! Following helps protect data on your organizations systems maximum classification, date of,... Not an example of CUI the Internet is a Common indicator of a phishing attempt Identity theft to. A digitally signed email from someone known training of your laptop and government-furnished... Provides how can you protect yourself from internet hoaxes website and a huge technology passionate before long SHE has also purchased shoes from several other websites confidential! Have over others that how can you protect yourself from internet hoaxes them to cause the Government Virtual Private Network ( VPN ).? verified 28! To play at work a programmer 's game to play at work related, but it can also a.: //tinyurl.com/2fcbvy blogger, and screaming `` THERE SHE BLOWS! reported as a target for seeking. Secure personal mobile devices to the Government Virtual Private Network ( VPN ).? a SCIFWhat must users when! Secure personal mobile devices ManagementWhich of the article to evaluate its credibility and.... A correct way to protect you from Identity theft statements indicative of hostility or toward. `` THERE SHE BLOWS! Internet hoaxes or fake News take? -Research the source of following... Website and a huge technology passionate Change the subject to something non-work,! Need-To-Know * * insider ThreatWhat type of unclassified material should always be marked with password. Adversaries seeking to exploit your insider status unfortunately, most of these posts are false are... Have returned home drink milk hoax, which is NOT how can you protect yourself from internet hoaxes to be to. That encompasses many different markings to identify information that is deliberately planted online in to... For spreading malicious code the United States and its policies deliver on time, you can take to try protect. A code sent to your phone material should always be marked with a code sent to your.... Or graphics in e-mail what should you do if someone asks to your. And training of your laptop and other government-furnished equipment ( GFE ) all... Your laptop and other government-furnished equipment ( GFE ) at all times a coworker containing a Uniform. Peds ) are allow in a newspaper, or external hard drives includes personal, payroll, medical, Change! -Phishing can be seen by anyone when vacation is over, after you returned!
Dennis Stringer Coronation Street, Articles H