Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Annual Security Refresher Training
Transcript of Annual Security Refresher Training
• Threat Awareness
• Physical Security
• Information Protection
• Reporting Requirements Key Points to Remember • If you work in a classified area, the area must be secure at the end of the day. It may need to be opened each day in a similar method.
• Employees are responsible for securing information in their possession and their workspace.
• The reason telecommunications and computer systems are separate is to prevent classified data from being inadvertently introduced into an unclassified environment
• Your Security Representative is always available if you have questions regarding your area Key Physical Security Components • Securing the area
• Office Set-up (e.g. computer and phone placement)
• Badges Protecting both classified and unclassified information is important OPSEC Key Points Know your targets
YOU are the front line of defense against threats
Keep your eyes open for threats
Report any suspicious activities to your Security Representative Course Completion Thank you for reviewing this annual security briefing.
Please send me an email with
your name and today's date. This will serve as your course completion certificate.
If you have any questions, please feel free to contact me. Thanks! Annual Security Training Visitors • It is the responsibility of the host to verify that vistors have the appropriate clearance and "Need-to-Know" prior to allowing access.
• Coordinate with Security prior to the visitor's arrival to ensure that all required security clearance paperwork has been received for a classified visit. Phone & Computer
Open and secure communications are available. Prior to making a call or starting a file, take a moment to ensure you are using the right system for your work
Ensure that when combining unclassified terms, emails, items, etc. the item won’t become classified by association or compilation
Sensitive information should be destroyed in a designated manner that prevents its reconstruction, such as shredding, burning or other measures.
Do not conduct sensitive conversations in public locations or open areas Secure Communications Classifications Original Classification Derivative Classification An initial determination made only by U.S. government officials The responsibility of contractors who incorporate, restate, or generate in new form, information which is already classified by the U.S. government Classification Markings Classification markings should appear on all classified material in a manner that is immediately apparent, these include...
The Correctly Marked Levels (Top Secret, Secret, or Confidential)
Title (unclassified if possible)
Date of origination[
Originating government agency or contractor facility name and address
“Classified By” line must include the name and position, or personal identifier, of the derivative classifier
“Derived From” line must identify the source material that justifies the classification of the information Additional prerequisite for protecting classified information.
If a person has a clearance and they do not have an identified “Need-to-Know”, you should not share information that you are protecting. This prevents unauthorized disclosure of sensitive and classified information. Need-To-Know
Be cautious of what you reveal about your job in online forms (blogs, wikis, message boards and social networking sites).
Hinting or alluding to the fact that you have access to classified information can make you a target for solicitation, viruses, and malicious code.
If you are SCI-briefed:
Your resume must be reviewed prior to publication. See your SCI Security
Representative for resume guidelines. Public Networks
It is important to report all threats to your Security Representative
Remember, any vulnerability, no matter how minor should be reported as soon as possible.
￼￼￼￼￼￼￼￼￼￼￼￼ Elicitation attempts Espionage Terrorism/Sabotage
Any suspicious contacts In addition to knowing the methodologies and when to report, it is also important to know about OPSEC
Operations Security (OPSEC) – to deny adversaries any information about capabilities and/or intentions. This means identify, control, and protect unclassified information related to sensitive activities to reduce vulnerabilities to our information In addition to data on computers, know that adversaries are targeting devices such as smart phones, MP3 players, and mini notebooks to steal secrets, sensitive and economic information.
• GPS Targets: Cell Phones Erin Van Buren
SSI Assistant Facility Security Officer