Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

14 Cards in this Set

  • Front
  • Back
What are the three Security Classification, please define.
Security Classification – Three
Top Secret - Exceptionally grave damage
Secret - Serious damage
Confidential - Damage
Would access to information be given just because the person has the clearance
No,Access is given on a need to know basis
What are two requirements for someone to have access
- Proper clearance
- Official need to know
What are some rules regarding Classified Information and Voice Communication
Voice Communications
- Never discuss classified information on an unsecured telephone line or radio circuit.
Can Classified Material be taken Home if you have the proper Container to take it home in
Stowage and Transport
Classified material may not be removed from the command without permission
What are the Security Areas and how are they defined
Level 1 – No classified material is used or kept their (buffer area)
Level 2 – Classified material is stowed or used in these areas.
Level 3 – Classified material is used in such a manner as mere entry into the area risks compromise
What is the intent of Censorship
Intent is to avoid security violations that might occur through carelessness or lack of judgment in writing letters
What are some ways to prevent being exploitedby a foreign agent
Don’t talk about a sensitive job to people who don’t need to know
Be careful what you say in social situations.
Know how to handle classified material properly
Don’t be careless with carbons and typewriter ribbons used in connection with classified material.
What are some examples of military actions
Operations are military actions, missions, and maneuvers
What does OPSEC stand for and what does it define
Operational security (OPSEC) is term used in the military to define those measures used to prevent an enemy or potential enemy from gathering too much information about our military operations
What are the four main components to OPSEC
Communications security
Electronic security
Operational information security
Physical security
What are the Treat Conditions or "ThreatCon" what do they mean
ThreatCon Normal – no perceived threat
ThreatCon Alfa – General threat
ThreatCon Bravo – Increased and more predictable threat; no target identified.
ThreatCon Charlie - An incident has occurred or intelligence indicates some form of terrorist action is imminent.
ThreatCon Delta – A terrorist attack has occurred, or intelligence indicates terrorist action against a specific target is likely.
What do you do if their is a Bomb Threat
Try to keep the caller on the line and obtain as much information as you can
Write down the exact words of the caller as quickly as you can.
Try to determine the sex, approximate age, and attitude of the caller.
Ask the caller when and where the bomb is to go off, what kind of bomb it is, what it looks like, and where the caller is calling from.
Listen for back ground sounds that might give an indication of the callers location
Note any accent or peculiarity of speech that may help identify the caller
Write on the Telephonic Threat Complaint Form
What are some Defensive actions to reduce bob attack
Strictly comply with and enforce procedures for personnel identification and access control by always carrying your own identification card and, if you are on watch, carefully examine the ID cards of personnel boarding your ship or visiting your command, particularly if you do not recognize them.
Be suspicious of packages if you do not know where they came from.
Be suspicious of articles that are obviously out of place.
Maintain tight control of locks and keys.
Lock spaces that are not in use
Report suspicious personnel and their actions