What must users do when using removable media?
- To ensure that company data is safe and secure, employees should follow the below guidelines when handling removable media: Limit the use of all removable media devices except when specifically authorised. Apply password protection. Encrypt information held on removable media. You might be interested: Question: What is a touchback in football?
Which is a rule for removable media?
What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Do not use any personally owned/non-organizational removable media on your organization’s systems. You just studied 2 terms!
What are the requirements to be granted access to sensitive compartmented information SCI?
Access to SCI is only granted to individuals who have a need-to-know, have been granted a Top Secret clearance by Personnel Security (PerSec), and are approved by the Department of Commerce’s Intelligence Community granting agency, and only upon completion of a separate Nondisclosure Agreement, the IC Form 4414.
What must you ensure before transmitting personally identifiable information?
What must you ensure before transmitting Personally Identifiable Information ( PII ) or Protected Health Information (PHI) via e-mail? Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible.
What should you do when you are working on an unclassified?
What should you do when you are working on an unclassified system and receive an email with a classified attachment? Call your security point of contact immediately to alert them.
What are examples of removable media?
Removable media and devices include: Optical Discs (Blu-Ray discs, DVDS, CD-ROMs) Memory Cards (Compact Flash card, Secure Digital card, Memory Stick) Zip Disks/ Floppy disks. USB flash drives. External hard drives (DE, EIDE, SCSSI, and SSD) Digital cameras. Smart phones.
How can we protect removable media?
To ensure that company data is safe and secure, employees should follow the below guidelines when handling removable media: Limit the use of all removable media devices except when specifically authorised. Apply password protection. Encrypt information held on removable media.
What is the best way to protect your Common Access Card cyber awareness?
What is the best way to protect your Common Access Card ( CAC ) or Personal Identify Verification (PIV) card? Maintain possession of it at all times.
What describes how sensitive compartmented?
SCI is a classification label indicating that items or information is sensitive and part of a specific program or department. SCI is a classification based on intelligence information that requires appropriate protection with a specific control system. The control systems are: (1) HCS (HUMINT Control System).
What is the difference between TS and SCI?
Sensitive Compartmented Information ( SCI ) is a subset of classified national intelligence. Because the same investigation is used to grant Top Secret clearances, the two are often written together as TS / SCI. Eligibility alone does not confer access to any specific SCI material – it is simply a qualification.
Which of the following is an example of malicious code?
Taking advantage of common system vulnerabilities, malicious code examples include computer viruses, worms, Trojan horses, logic bombs, spyware, adware, and backdoor programs. Visiting infected websites or clicking on a bad email link or attachment are ways for malicious code to sneak its way into a system.
What does personally identifiable information include?
Personally identifiable information, or PII, is any data that could potentially be used to identify a particular person. Examples include a full name, Social Security number, driver’s license number, bank account number, passport number, and email address.
What can malicious code do?
Malicious code is the kind of harmful computer code or web script designed to create system vulnerabilities leading to back doors, security breaches, information and data theft, and other potential damages to files and computing systems. It’s a type of threat that may not be blocked by antivirus software on its own.
Which email attachments are generally safe to open?
Microsoft has classified several types of dangerous extensions; however, only a few are considered safe. These are GIF, JPG or JPEG, TIF or TIFF, MPG or MPEG, MP3 and WAV.
What is an indication that malicious is running on your system?
What is a possible indication of a malicious code attack in progress? A pop-up window that flashes and warns that your computer is infected with a virus.
What are some examples of malicious code Cyber Awareness 2020?
Malicious code can be spread by downloading corrupted email attachments and files or visiting infected websites. Malicious code includes viruses, trojan horses, worms, macros, and scripts.