What action should you take when using removable media in a SCIF cyber awareness?

This course does not have a final exam.

Description: The purpose of the Cyber Awareness Challenge is to influence behavior by focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DOD Information Systems. This training is current, engaging, and relevant to the user. The Cyber Awareness Challenge is the DOD baseline standard for end user awareness training by providing awareness content that addresses evolving requirements issued by Congress, the Office of Management and Budget (OMB), the Office of the Secretary of Defense, and Component input from the DOD Chief Information Officer (CIO) chaired Cyber Workforce Advisory Group (CWAG).

  This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. The training also reinforces best practices to protect classified information, controlled unclassified information (CUI), and personally identifiable information (PII).

A Knowledge Check option is available for users who have successfully completed the previous version of the course. After each selection on the incident board, users are presented one or more questions derived from the previous Cyber Awareness Challenge. If all questions are answered correctly, users will skip to the end of the incident. If any questions are answered incorrectly, users must review and complete all activities contained within the incident.

Course Resources: N/A

Learning Objectives:
This course discusses the following topics:

  • Computer Use
  • Information Security
  • Insider Threat
  • Malicious Code
  • Online Behavior
  • Physical Security
  • Removable Media and Mobile Devices
  • SCI (Sensitive Compartmented Information) and SCIFs (Sensitive Compartmented Information Facility)

Delivery Method: eLearning

Length: 60 Minutes

Target Audience: Authorized users of the Department of Defense (DOD) information systems

Requirements:

  • Clearance Requirements: N/A
  • Attendance Requirements: N/A
  • Exam Requirements: N/A

Prerequisites: N/A

Credits Recommended/Earned:

  • ACE Credit Recommendation: (What's this?): N/A
  • Professional Development Units per SPēD: PDUs are determined by length of course and IAW current Certification Maintenance Guidelines.

System Requirements: Check if your system is configured appropriately to use STEPP.

CDSE courses are intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program.

Devices in a SCIF No personal portable electronic devices (PEDs) are allowed in a SCIF. Government-owned PEDs must be expressly authorized by your agency. When using a government-owned PED: Only connect government-owned PEDs to the same level classification information system when authorized Only use devices of equal or greater classification than the information you are accessing or transmitting Ensure secure device is properly configured and updated Don’t discuss classified information over smartphones Don’t view classified information via device when not in a cleared spaceAs a general rule, there should be no Wi-Fi, Bluetooth, cellular, image capturing, video recording, or audio recording capabilities or wearable devices in the SCIF. Check with your security officer or your agency’s policies. Using Removable Media in a SCIF When using removable media: Users must properly identify and disclose removable media with local Configuration/Change Management (CM) Control and Property Management authorities Users shall comply with site CM policies and procedures Media shall display a label inclusive of maximum classification, date of creation, POC, and CM Control Number Removable Media Risks The risks associated with removable media include: Introduction of malicious code Compromise of systems’ confidentiality, availability, and/or integritySpillage of classified information Potential consequences: Shutdown of systems Compromise of information, systems, programs, and/or assets Loss of mission Loss of life

What action should you take when using removable media in a sensitive compartmented information facility SCIF?

If an incident occurs involving removable media in a sensitive compartmented information facility, what action should you take? Go to find your security point of contact.

When can you use removable media on a Government system cyber awareness?

The emergency use of removable media will be permitted only on Defense Department computers that are in full compliance and possess the necessary hardware required to transfer the data safely. These requirements include using approved procedures and hardware to prevent unauthorized use.

What must users ensure when using removable media such as?

Ensure that all removable media and devices are encrypted. This will render any data useless to unauthorized users should the device be lost or stolen. Never connect found media or devices to a PC. Give any unknown storage device to security or IT personnel.

What must users ensure when using removable media such as a compact disk cyber awareness?

What must users ensure when using removable media such as a compact disk (CD)? It displays a label showing maximum classification, date of creation, point of contact, and Change Management (CM Control Number.