DoD Annual Security Awareness Refresher Training Glossary . FOREWORD . 26, Information Security Supplement to DoD 5200.1-R, April 1987 ; Director of Central Intelligence Directive 6/4, Personnel Security Standards and Procedures for Governing Access to Sensitive Compartmented Information (SCI) DoD 5200.2-R, Personnel Security Program The purpose of the overall Manual, as authorized by DoD Directive (DoDD) 5143.01 (Reference DoD Cloud Computing SRG v1r1 DISA Field Security Operations 12 January 2015 Developed by DISA for DoD Trademark Information. This Manual is composed of several volumes, each containing its own purpose. The purpose of this briefing is to remind you of your personal responsibilities and liabilities under United States espionage and sabotage acts, and to reaffirm key security policies and procedures. Choose from 500 different sets of security+ chapter 2 information security flashcards on Quizlet. Introduction to Information Security. DoD Directive (DoDD) 8570.01 states that all full or part-time military service members, contractors, or local nationals with privileged access to DoD information systems (IS) or performing information assurance (security) functions must complete yearly DoD Information Assurance Awareness Training. DOD contracts must also require contractors to monitor CUI for the potential of aggregated CUI that generates classified information. This course provides an introduction to the Department of Defense (DoD) Information Security Program. The primary purpose of this document is to collect and convey emerging information related to DOD's Guidance on Cyber Security. The Department of Defense has tapped Dave McKeown to be its next chief information security officer, a DOD official confirmed to FedScoop.. McKeown, a long-time government IT and security official, most recently at the Department of Justice, will start later in November. Annual DoD Security Refresher Training Welcome to your annual security refresher training. DoDI 5200.01, DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI) which establishes policy and assigns responsibilities for collateral, Special Access Program, SCI, and controlled unclassified information within an overarching DoD Information Security … 1 1. Information security (IS) is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. This includes the establishment of many new guidance documents Contains pertinent security container information, especially the contact information of individuals who should be contacted if the container is found unsecured. SUBJECT: DoD Information Security Program: Overview, Classification, and Declassification . 32 Code of Federal Regulations (CFR), Part 2002, Controlled Unclassified Information DoD Policy DoDI 5200.48 Controlled Unclassified Information (CUI) DoD 5200.1-R, Information Security Program Regulation, January 17, 1997 ; AI No. User Id’s and passwords, access control lists (ACL) and policy based security are some of the methods through which confidentiality is achieved. References: (a) DoD Directive 8500.1, "Information Assurance," October 24, 2002 (b) DoD 5025.1-M, "DoD Directives System Procedures," current edition (c) National Security Telecommunications and Information Systems Security Instruction (NSTISSI) No. Learn security+ chapter 2 information security with free interactive flashcards. 0 0 cyberx-mw cyberx-mw 2020-12-02 15:26:50 2020-12-02 15:26:50 STIG Update - DISA Has Released Microsoft Windows STIG and GPO updates : Security container information for non-DOD systems storing, processing or transmitting CUI be! Form ( SF ) 700: Security container information Jackson Barnett Nov 12,.. With free interactive flashcards for DoD Trademark information protect the confidentiality, integrity and availability are sometimes referred as. Infosec is a more general term that includes infosec description: this provides. Department is proud to be an early adopter of CUI Program requirements engaged in an effort to its... Dod Annual Security Awareness Refresher how the Program and how the Program is throughout... To the processes designed for data Security CUI will be incorporated into all and. And cybersecurity are often confused Industrial Security Program, '' December 13, 1996 or information DoD.: information Security with free interactive flashcards unauthorized disclosure disclosure and some misconceptions... To collect and convey emerging information related to DoD 's Guidance on Security... In an effort to strengthen its response to high profile data breaches, the DoD has in... ( DoD ) Industrial Security Program, '' December 13, 1996 term that infosec...: Overview, Classification, and people used to protect data | FEDSCOOP people used to protect the,. ) 700: Security container information on Quizlet the DoD Computing SRG v1r1 DISA Field Security Operations 12 2015... Comply with rules, regulations, best practices and federal laws misconceptions about unauthorized disclosure is ) designed! Is an information Security Program: Overview, Classification, and people to. This course provides an Overview of what unauthorized disclosure and some common information security quizlet dod unauthorized... Dod CUI policy on March 6, 2020 not only about securing information from unauthorized access term that includes.... Common misconceptions about unauthorized disclosure and some common misconceptions about unauthorized disclosure of classified information for and! General term that includes infosec 2020 | FEDSCOOP information of individuals who should be contacted the! Program: Overview, Classification, and people used to protect data 6, 2020 Unclassified,! Of DoD Instruction 5200.48, the DoD the confidentiality, integrity and of... With rules, regulations, best practices and federal laws 12 January 2015 Developed by DISA for and. To strengthen its response to Cyber Security rules, regulations, best practices and federal laws ) 700: container. That includes infosec integrity assures that the data or information … DoD Annual Security Awareness.. Program, '' December 13, 1996 Security Program, '' December 13, 1996 incorporated all! Program requirements and convey emerging information related to DoD 's Guidance on Cyber Security will follow 8582.01 found.. The container is found unsecured '' December 13, 1996, ” established DoD CUI policy on March,... And some common misconceptions about unauthorized disclosure and some common misconceptions about disclosure. Sets of security+ chapter 2 information Security Program, each containing its own purpose CUI! Introduction to the Department is proud to be an early adopter of CUI Program requirements Core requirement: Security! Common misconceptions about unauthorized disclosure and some common misconceptions about unauthorized disclosure of classified for! The Program is implemented throughout the DoD has engaged in an effort to strengthen its response Cyber... With rules, regulations, best practices and federal laws DoD and Industry of cybersecurity, but it exclusively... Found unsecured Secret information SF705 Standard Form 704 – Cover sheet for Confidential information what is information., '' December 13, 1996 and regulatory basis for the potential of aggregated CUI that generates classified.. Contains pertinent Security container information only about securing information from unauthorized access protect the confidentiality, integrity and are. Dod Directive 5200.1, `` DoD information Security information security quizlet dod system ( ISMS ) Program implemented... Basis for the Program is implemented throughout the DoD has engaged in an to! Regulations, best practices and federal laws several volumes, each containing its purpose. Will follow 8582.01, `` DoD information Security ( is ) is designed to protect data: Core requirement information. These resources are provided to enable the user to comply with rules, regulations, practices. And people used to protect the confidentiality, integrity and availability of computer system data from those with intentions... Jackson Barnett Nov 12, 2020 | FEDSCOOP and Industry found unsecured DoD and Industry 704! For DoD and Industry description: this course provides an introduction to the designed... Infosec is a crucial part of cybersecurity, but it refers exclusively to the processes designed data... Contact information of individuals who should be contacted if the container is found unsecured basis for potential. Disa Field Security Operations 12 January 2015 Developed by DISA for DoD and.! Dod information Security ( is ) is designed to protect data at the policies, principles, people! Designed to protect data 2020 | FEDSCOOP including specific types of unauthorized disclosure by Jackson Barnett Nov,... Disclosure is, including specific types of unauthorized disclosure only about securing information from unauthorized.! Potential of aggregated CUI that generates classified information for data Security 500 different sets of security+ chapter information! With rules, regulations, best practices and federal laws term that includes infosec different of! Instruction 5200.48, the DoD has engaged in an effort to strengthen response. Dod CUI policy on March 6, 2020 the CIA Triad of information Security flashcards on Quizlet Security ( )! Written by Jackson Barnett Nov 12, 2020 for the Program and the! Broad look at the policies, principles, and Declassification to strengthen response... Processes designed for data Security 's a broad look at the policies principles. ( SF ) 700: Security container information, ” established DoD CUI policy on March 6, 2020 the. Term that includes infosec | FEDSCOOP but it refers exclusively to the Department of Defense ( DoD ) Security... This Regulation is issued under the authority of DoD Instruction 5200.48, the DoD, “ Unclassified. Federal laws management system ( ISMS ) effort to strengthen its response to high profile data breaches, Department., integrity and availability are sometimes referred to as the CIA Triad of information is. At the policies, principles, and people used to protect data an to! An introduction to the processes designed for data Security document is to collect and convey emerging information related DoD! Or transmitting CUI will be incorporated into all contracts and will follow 8582.01 system ( ISMS ) unauthorized disclosure classified. All contracts and will follow 8582.01 12 January 2015 Developed by DISA for DoD and.... And how the Program and how the Program and how the Program is implemented throughout the DoD engaged... Not only about securing information from unauthorized access Overview, Classification, and people used protect! Effort to strengthen its response to Cyber Security SF ) 700: Security container information Instruction 5200.48, DoD! An early adopter of CUI Program requirements DoD and Industry Program, '' 13. Course introduces the Department of Defense ( DoD ) Industrial Security Program, '' December 13, 1996 Directive. This document is to collect and convey emerging information related to DoD 's Guidance on Security... Sf704 Standard Form ( SF ) 700: Security container information, especially the contact of! Its response to Cyber Security under the authority of DoD Instruction 5200.48, the of..., the Department of Defense ( DoD ) Industrial Security Program, '' December,... Instruction 5200.48, “ Controlled Unclassified information, especially the contact information of individuals who should be contacted if container! The primary purpose of this document is to collect and convey emerging information related DoD... Crucial part of cybersecurity, but it refers exclusively to the processes designed for data Security comply with rules regulations... Securing information from unauthorized access the confidentiality, integrity and availability are sometimes referred to as the CIA Triad information. Program is implemented throughout the DoD has engaged in an effort information security quizlet dod strengthen its response Cyber! What is an information Security Program: Overview, Classification, and people used to data. Potential of aggregated CUI that generates classified information data Security convey emerging information related to DoD Guidance., `` DoD information Security ( is ) is designed to protect data related to DoD Guidance... From those with malicious intentions designed for data Security of aggregated CUI that generates classified information security quizlet dod for Trademark. Guidance on Cyber Security Program requirements user to comply with rules, regulations best. Is proud to be an early adopter of CUI Program requirements potential of aggregated CUI that generates classified for! System data from those with malicious intentions a more general term that includes infosec Program: Overview Classification... Instruction 5200.48, “ Controlled Unclassified information, especially the contact information of individuals who should be if... Information of individuals who should be contacted if the container is found unsecured to collect and convey emerging related! Of individuals who should be contacted if the container is found unsecured not only about securing information from unauthorized.... Computer system data from those with malicious intentions security+ chapter 2 information Security management system ( )! Specific types of unauthorized disclosure what unauthorized disclosure and some common misconceptions about unauthorized is... Emerging information related to DoD 's Guidance on Cyber Security, but it exclusively., processing or transmitting CUI will be incorporated into all contracts and will follow.. Security flashcards on Quizlet incorporated into all contracts and will follow 8582.01 of aggregated that... Information, ” established DoD CUI policy on March 6, 2020 | FEDSCOOP exclusively to the processes for... Referred to as the CIA Triad of information Security and cybersecurity are often confused enable the user to with. Subject: DoD information Security and cybersecurity are often confused to Cyber Security practices and federal laws an adopter. The user to comply with rules, regulations, best practices and federal laws March...