Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Annual Security Refresher Training

SSI Security Training 2012

Erin Mackie

on 23 January 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Annual Security Refresher Training

Information Protection Threat Awareness SECRET CONFIDENTIAL TOP SECRET Physical Security 0 + - = 9 8 7 1 2 3 4 5 6 c Reporting Requirements Course Overview This course will refresh your knowledge in the following areas:

• Threat Awareness
• Physical Security
• Information Protection
• Reporting Requirements Key Points to Remember • If you work in a classified area, the area must be secure at the end of the day. It may need to be opened each day in a similar method.

• Employees are responsible for securing information in their possession and their workspace.

• The reason telecommunications and computer systems are separate is to prevent classified data from being inadvertently introduced into an unclassified environment

• Your Security Representative is always available if you have questions regarding your area Key Physical Security Components • Securing the area

• Office Set-up (e.g. computer and phone placement)

• Visitors

• Badges Protecting both classified and unclassified information is important OPSEC Key Points Know your targets

YOU are the front line of defense against threats

Be aware
Keep your eyes open for threats

Report any suspicious activities to your Security Representative Course Completion Thank you for reviewing this annual security briefing.

Please send me an email with
your name and today's date. This will serve as your course completion certificate.

If you have any questions, please feel free to contact me. Thanks! Annual Security Training Visitors • It is the responsibility of the host to verify that vistors have the appropriate clearance and "Need-to-Know" prior to allowing access.

• Coordinate with Security prior to the visitor's arrival to ensure that all required security clearance paperwork has been received for a classified visit. Phone & Computer
Open and secure communications are available. Prior to making a call or starting a file, take a moment to ensure you are using the right system for your work

Ensure that when combining unclassified terms, emails, items, etc. the item won’t become classified by association or compilation

Sensitive information should be destroyed in a designated manner that prevents its reconstruction, such as shredding, burning or other measures.

Live Conversations
Do not conduct sensitive conversations in public locations or open areas Secure Communications Classifications Original Classification Derivative Classification An initial determination made only by U.S. government officials The responsibility of contractors who incorporate, restate, or generate in new form, information which is already classified by the U.S. government Classification Markings Classification markings should appear on all classified material in a manner that is immediately apparent, these include...

The Correctly Marked Levels (Top Secret, Secret, or Confidential)
Title (unclassified if possible)
Date of origination[
Originating government agency or contractor facility name and address
“Classified By” line must include the name and position, or personal identifier, of the derivative classifier
“Derived From” line must identify the source material that justifies the classification of the information Additional prerequisite for protecting classified information.

If a person has a clearance and they do not have an identified “Need-to-Know”, you should not share information that you are protecting. This prevents unauthorized disclosure of sensitive and classified information. Need-To-Know
Be cautious of what you reveal about your job in online forms (blogs, wikis, message boards and social networking sites).

Hinting or alluding to the fact that you have access to classified information can make you a target for solicitation, viruses, and malicious code.

If you are SCI-briefed:
Your resume must be reviewed prior to publication. See your SCI Security
Representative for resume guidelines. Public Networks
It is important to report all threats to your Security Representative

Remember, any vulnerability, no matter how minor should be reported as soon as possible.

 Elicitation attempts Espionage Terrorism/Sabotage
Any suspicious contacts In addition to knowing the methodologies and when to report, it is also important to know about OPSEC

Operations Security (OPSEC) – to deny adversaries any information about capabilities and/or intentions. This means identify, control, and protect unclassified information related to sensitive activities to reduce vulnerabilities to our information In addition to data on computers, know that adversaries are targeting devices such as smart phones, MP3 players, and mini notebooks to steal secrets, sensitive and economic information.

Vulnerabilities Include:
•Text messages
•Blue tooth
• Applications
• GPS Targets: Cell Phones Erin Van Buren
SSI Assistant Facility Security Officer
Full transcript