Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

SFPC Study Guide Questions with Complete Verified Solutions 2024/2025, Study Guides, Projects, Research of Security Analysis

This comprehensive study guide covers information security, personnel security, and classified information management within the Department of Defense (DoD). It explores key executive orders, policies, and procedures governing the DoD's information security program, including proper classification, protection, and downgrading of official information. The guide also delves into the National Industrial Security Program, personnel security program, and security clearance processes. With detailed explanations and verified solutions, this resource aims to equip students with the knowledge and understanding necessary to navigate the complex landscape of information security and personnel security within the DoD context. Whether preparing for exams, seeking lecture notes, or requiring a comprehensive summary, this document offers a valuable resource for university students, particularly those enrolled in courses related to national security, information management, or defense studies.

Typology: Study Guides, Projects, Research

2023/2024

Available from 06/24/2024

TheHub
TheHub 🇺🇸

3.6

(11)

3K documents

1 / 9

Toggle sidebar

Often downloaded together


Related documents


Partial preview of the text

Download SFPC Study Guide Questions with Complete Verified Solutions 2024/2025 and more Study Guides, Projects, Research Security Analysis in PDF only on Docsity! SFPC Study Guide Questions with Complete Verified Solutions 2024/2025 Purpose of DoD IS Program Proper classification, protection, and downgrading of official information that requires protection Executive Order 10290 1951: First program to protect classified Executive Order 13526 2009: Established National Declassification Center; Focuses on greater openness Information Security Oversight Office Oversees and manages IS Program National Security Council (Infosec) Provides overall policy for IS Program DoDI 5200.01 Establishes basic DoD IS Policy DoD 5200.01, Vol 1-4 Guidance on classification management; requirements for marking, handling, and protection of classified In order to classify information it: -Must be owned, produced by, produced for, or under strict control of the USG -Determined that unauthorized disclosure could cause damage to National Security Marking and designating classified information is the responsibility of? Original and Derivative Classifiers Top Secret if divulged Exceptionally Grave Damage Secret if divulged Serious Damage Confidential if divulged Damage Six Steps of Classification 1. If the info official gov't info? 2. Is the info eligible to be class? 3. Is there a potential for damage to nat'l security if unauthorized release occurs? 4. Assign a level of classification 5. Assign a duration of classification 6. Communicate the decision (SCG and marking source doc) Security Classification Guide - Provide derivative classification instructions - Describe elements of info that must be protected - Provide the level and duration of class Derivative Classification Not an authority, but an assumed responsibility Two ways of declassification? Downgrading and declassification Scheduled Declassification Occurs when the instructions by OCA are followed (usually a date or event) Automatic Declassification -Applies to classified that has been determined to have permanent historical value under Title 44 USC -31 Dec of the year 25 dates from OCA Mandatory Declassification Review Requests come in from public Classified Custodial Responsibilities -Protecting information at all times. -Securing info in locked container when not in use. -Verifying a person's need to know/access level -Following safeguarding procedures Approved Storage for Classified 1. GSA-Approved Containers 2. Secure Rooms 3. Vaults SF-705 Confidential Cover Sheet SF-704 Secret Cover Sheet SF-703 TS Cover Sheet Security Violation (InfoSec) Knowing, willful, or negligent action: -Could reasonably be expected to result in unauthorized disclosure -To classify or continue classify information contrary to EO 13526 -Create or continue a SAP contrary to EO 13526 Establishes policy and responsibilities for the DoD Personnel Program DoDM 5200.02 Implements policy, assigns responsibility, and provides procedures for the PSP Bond Amendment (2008) Bars persons from holding a clearance for convictions, drug use, and mental competency. DNI Security Executive Agent Directive (SEAD) National Security Adjudicative Guidlines; establishes criteria for determining eligibility Intelligence Community Directive 704 (ICD 704) Establishes policy governing eligibility for access to SCI Five Elements of the DoD Personnel Security Program 1. Designation 2. Investigation 3. Adjudication 4. Reinvestigation 5. Continuous Evaluation Designation (PERSEC) An assessment of a positions potential impact on national security Investigation (PERSEC) Report that contains information about an individual who has been selected for sensitive duties Adjudication (PERSEC) Judgement concerning security clearance eligibility Two Types of Access Authorizations (PERSEC) 1. Security Clearance (US Citizens) 2. Limited Access Authorization (Non-Citizens Four Types of Civilian Personnel Designations (PERSEC) 1. Special-Sensitive 2. Critical-Sensitive 3. Noncritical-Sensitive 4. Nonsensitive Special-Sensitive Position 1. Require eligibility to SCI 2. Require access to SAPs 3. Special requirements as determined by DoD Dept Head Critical-Sensitive Position 1. Eligibility for access to TS or Q 2. Development or approval of war plans, ops, or critical items 3. Nat'l Security policy making 4. Investigative duties involving CI 5. Adjudicators 6. PERSEC Boards 7. Plans, Policies, Programs that impact DoD Ops 8. COOP 9. Diplomatic Relations 10. CBRNE 11. Control of items over $50 Mil 12. Designated by DoD Head Non-critical Sensitive 1. Eligibility for Secret or L 2. Positions not requiring clearance, but having potential to cause significant or serious damage 3. Positions requiring access to IS involving PII 4. Designated by DoD Head Types of Special Programs (PERSEC) 1. Presidential Support Activities 2. Special Access Programs 3. NATO 4. Nuclear PRP 5. SCI 6. Nuclear Command and Control -- Extremely Sensitive Information (NC3-ESI) 7. Chemical PRP Restricted Data (PERSEC) All information concerning design, manufacture, or use of atomic weapons; production of special nuclear material; use of special nuclear material in production of energy Critical Nuclear Weapon Design Information (CNWDI) - Restricted data classified as TS or S - Includes info about the operation or design of thermo-nuclear or implosion-type fission bombs Security Officer Duties (PERSEC) 1. Determine sensitivity for both access and assignment 2. Prepare and request PSIs 3. Evaluate information for Interim's 4. Operate the CEP 5. Train Pers on PSP requirements 6. Conduct training briefings Four Types of Security Officer Briefings 1. Initial 2. Annual 3. Insider Threat 4. Termination e-QIP Process 1. Security Office initiates 2. Individual completes questionnaire 3. Security office reviews and approves the questionnaire 4. Forwards to the NBIB Four Phases of Security Clearance Eligibility 1. PSI Initiated and Completed 2. PSI forwarded to the DoD CAF 3. DoD CAF reviews the PSI and compares it to national adjudication standards 4. DoD CAF determines whether or not to grant eligbility Three Things Necessary for Access to Classified Info? 1. Eligibility 2. SF 312 3. Need to Know A PSI is an... Inquiry into an individual's background, activities, and personal behavior for the purpose of making a personnel security determination. Privacy Act of 1974 Regulates the collection of information and the use of the collected information Reciprocity (PERSEC) Mutual acceptance of a personnel security clearance eligibility by all government agencies regardless of which agency issued the clearance DISS Defense Information for Security (new JPAS) JPAS Joint Personnel Adjudication System JCAVS Joint Clearance and Access Verification System -Updates security accesses -Allows comm between other offices and CAFs JAMS Joint Adjudication Management System -Standardizes adjudication processes