Updating your software is key. -It is inherently not a secure technology. Digitally sign and encrypt the email. How can you protect yourself from social What type of attack might this be? Mark SCI documents appropriately and use an approved SCI fax machine. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? Remove your security badge after leaving your controlled area or office building. (Sensitive Information) Which of the following is true about unclassified data? A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Which of the following is an example of malicious code? A simple Google search can often reveal if a story is a hoax. You can search for fake news sites or hoax websites to find a list of websites to avoid. Refer the reporter to your organization's public affairs office. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? What should be done to sensitive data on laptops and other mobile computing devices? Eggs are good for you, and cholesterol is only a health concern if you have a genetic mutation that causes you to have high levels of it in your blood. WebProtect against RFID data theft Many important items such as passports and credit cards contain RFIDS. How many potential insider threat indicators does this employee display? Use strong Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know **Classified Data What information most likely presents a security risk on your personal social networking profile? What should be your response? All https sites are legitimate. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? Which type of information includes personal, payroll, medical, and operational information? WebProtecting yourself against internet scams One common type of scam (often called "phishing scams") involves fake e-mail purporting to be from a bank, PayPal, or some A pop-up window that flashes and warns that your computer is infected with a virus. The CAC/PIV is a controlled item and contains certificates for: Classified Information can only be accessed by individuals with, -Assigned a classification level by a supervisor. First Identify that it is a hoax, Note that Hoaxes often booms where they are spread quickly and without consideration. Note any identifying information, such as the websites URL, and report the situation to your security POC. Be aware of classification markings and all handling caveats. A lot of questions are asked about internet hoaxing for cyber security awareness by many peoples. Of the following, which is NOT an intelligence community mandate for passwords? Your health insurance explanation of benefits (EOB). You should only accept cookies from reputable, trusted websites. **Home Computer SecurityHow can you protect your information when using wireless technology? Ive tried all the answers and it still tells me off. What should you do? -Look for a digital signature on the email. Home network strengthening is important. Its classification level may rise when aggregated. (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? What should you do? *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? Decline So That You Maintain Physical Control of Your Government-Issued Laptop. An internet hoax is a story or rumor that is deliberately planted online in order to deceive somebody. These types of sites exist to help you sort out whats real and whats fake. Software that install itself without the user's knowledge. What is the best example of Protected Health Information (PHI)? As the old adage goes, if it is too good to be true, it probably is., The popular cultural depiction of a con shows an ingenious bit of skulduggery pulled off by a charming Always use DoD PKI tokens within their designated classification level. What actions should you take prior to leaving the work environment and going to lunch? (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? You are leaving the building where you work. Contact the IRS using their publicly available, official contact information. Never allow sensitive data on non-Government-issued mobile devices. A coworker has left an unknown CD on your desk. Which of the following makes Alex's personal information vulnerable to attacks by identity thieves? How can you protect yourself from internet hoaxes?-Use online sites to confirm or expose potential hoaxes. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? Jelita and James have performed a great service by writing this book and putting it out so all can understand the mechanics of the con and how to protect yourself. So use virus protection to avoid this type of virus hoaxes and phishing attack. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. The website requires a credit card for registration. What should you do? *WEBSITE USE*Which of the following statements is true of cookies? The website requires a credit card for registration. When you see your friends and family share misinformation, correct them. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Fact-check. Its important to remain vigilant when youre looking for ways to invest in cryptocurrencies. Which of the following is a practice that helps to protect you from identity theft? Which of these is true of unclassified data? *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? There are a few ways you can protect yourself from internet hoaxes. Hoaxes and malicious rumors have been around for a long time, but Internet fraud has made them much easier to spread. **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Since the URL does not start with https, do not provide your credit card information. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know **Classified Data Some websites are designed to trick you into reading false information, either as clickbait or as part of a political agenda. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. -Use the government email system so you can encrypt the information and open the email on your government issued laptop It is permissible to release unclassified Check the source of the information: 3. A simple Google search can often reveal if a story is a hoax. **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? *Insider ThreatWhat threat do insiders with authorized access to information or information systems pose?-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. WebProtect yourself. What is NOT Personally Identifiable Information (PII)? How many potential insiders threat indicators does this employee display? (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Report the crime to local law enforcement. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. Which of the following should you do immediately? -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. Which of the following is NOT considered sensitive information? Hoaxes are very common in the internet. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? Call your security point of contact immediately. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? Which is NOT a method of protecting classified data? *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. -Store it in a shielded sleeve to avoid chip cloning. The email provides a website and a toll-free number where you can make payment. **Classified DataWhich of the following is true of protecting classified data? What describes how Sensitive Compartmented Information is marked? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Be aware of classification markings and all handling caveats. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. They can be part of a distributed denial-of-service (DDoS) attack. (Malicious Code) What are some examples of malicious code? *TravelWhat security risk does a public Wi-Fi connection pose?-It may expose the connected device to malware. *Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? If there are numbers at the end, like .gif, .mp4 or .wmv, its likely that the video is fake. -Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Intelligence Needs to be timely. Similarly, malicious apps (Mobile Devices) Which of the following statements is true? Which of the following demonstrates proper protection of mobile devices? What action should you take?-Research the source of the article to evaluate its credibility and reliability. Memory sticks, flash drives, or external hard drives. Store classified data appropriately in a GSA-approved vault/container. All https sites are legitimate and there is no risk to entering your personal info online. Only allow mobile code to run from your organization or your organizations trusted sites. It is permissible to release unclassified information to the public prior to being cleared. *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. Don't insult people's intelligence," says Roschke. What should you do? (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? Unusual interest in classified information. *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. Digitally signing e-mails that contain attachments or hyperlinks. *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? (Spillage) What is required for an individual to access classified data? Which of the following is NOT considered a potential insider threat indicator? Which is NOT a wireless security practice? Identifying And Preventing Your Identity From Being Cyber Infected Is One Way To Do So. Think before you post anything online or share information in emails. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Be alert to the fact that scams exist. Which of the following actions can help to protect your identity? *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Images help to convey your message. **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Which of the following is a good practice to avoid email viruses? Spillage because classified data was moved to a lower classification level system without authorization. You should also avoid sharing personal information such as your Social Security number or credit card number online, as these details can easily be counterfeited and used in fake scams.And finally, always exercise caution when clicking on links or downloading attachments from unknown sources. Cyber Awareness Challenge Complete Questions and Answers. Using webmail may bypass built in security features. If you click on the link in the email, malware may be installed on your computer. What should you do? -Phishing can be an email with a hyperlink as bait. You check your bank statement and see several debits you did not authorize. Insiders are given a level of trust and have authorized access to Government information systems. Identification, encryption, and digital signature. Information improperly moved from a higher protection level to a lower protection level. Some of the most well-known hoax websites used to be political, but now they are focused on scaring people. Use personal information to help create strong passwords. (Wrong). Dont be swayed by sensational headlines or implausible claims, and be careful about sharing personal information or money online. Which of the following should you NOT do if you find classified information on the internet?-Download the information. DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. Which is a way to protect against phishing attacks? Within a secure area, you see an individual you do not know. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? (social networking) Which of the following is a security best practice when using social networking sites? Ans: Social engineering is a type of attack in which someone fools you into doing something by manipulation or deception. Which of the following is a potential insider threat indicator? How many indicators does this employee display? (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? Which of the following is an example of near field communication (NFC)?-A smartphone that transmits credit card payment information when held in proximity to a credit card reader. What action should you take first? (Home computer) Which of the following is best practice for securing your home computer? it may expose connected device to malware *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. (social networking) When is the safest time to post details of your vacation activities on your social networking profile? Stay ahead of the curve with Valley Ai. *Classified DataWhich of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. Ans: Protection against potential hoaxes can be achieved by using good antivirus software and by being aware of the latest online scams. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How can you protect yourself from internet hoaxes? 5 Ways how can you protect yourself from internet hoaxes? (Spillage) Which of the following is a good practice to aid in preventing spillage? Which is a risk associated with removable media? Ensure proper labeling by appropriately marking all classified material and when required, sensitive material. WebJelita and James have performed a great service by writing this book and putting it out so all can understand the mechanics of the con and how to protect yourself. As part of the survey the caller asks for birth date and address. What type of data must be handled and stored properly based on classification markings and handling caveats? 6. We often confuse the source of information with its truthfulness. *Malicious CodeWhat are some examples of malicious code? Use a single, complex password for your system and application logons. As long as the document is cleared for public release, you may share it outside of DoD. How should you respond to the theft of your identity?-Notify law enforcement. How many potential insider threat indicators does this employee display? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Protecting yourself is to be careful about who you talk to on the internet and what information they may be able to provide. How can you protect your information when using wireless technology? Which of the following is NOT a security best practice when saving cookies to a hard drive? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). -Remove security badge as you enter a restaurant or retail establishment. -Ask them to verify their name and office number. **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? On a NIPRNET system while using it for a PKI-required task. *Malicious CodeWhat is a possible effect of malicious code?-Files may be corrupted, erased, or compromised. Loss of access to money in your account for up to 10 days. if you are a military personnel and you knowingly leaked, information may be cui in accordance with executive order 13526, intentional unauthorized disclosure of classified information, is it permitted to share an unclassified draft document, is press release data sensitive information, is whistleblowing the same as reporting an unauthorized disclosure, near field communication cyber awareness, near field communication cyber awareness 2022, opsec is a dissemination control category, opsec is a dissemination control category within the cui program, penalties for unauthorized disclosure of classified information, relates to reporting of gross mismanagement and/or abuse of authority, requirements to access classified information, the act of publicly documenting and sharing information is called, the whistleblower protection enhancement act relates to reporting, unauthorized disclosure of classified information, unauthorized disclosure of classified information for dod and industry, unauthorized disclosure of information classified as confidential, what can malicious code do cyber awareness challenge, what dod instruction implements the dod program, what is a possible effect of malicious code, what is a possible effect of malicious code cyber awareness, what is a protection against internet hoaxes, what is a protection against internet hoaxes cyber awareness, what is possible effect of malicious code, what is protection against internet hoaxes, what is purpose of the isoo cui registry, what is required for an individual to access classified data, what is sensitive compartmented information cyber awareness 2022, what is the possible effect of malicious code, what is the purpose of isoo cui registry, what is the purpose of the isoo registry, what level of damage can the unauthorized disclosure of information, what security risk does a public wi-fi connection pose, what should the owner of this printed sci do differently, what should you do if you suspect spillage has occurred, what threat do insiders with authorized, what threat do insiders with authorized access to information, what threat do insiders with authorized access to information pose, when can you check personal email on your gfe, when using social networking services the penalties for ignoring requirements, which of the following individuals can access classified data 2022, which of the following is an example of nfc, which of the following is good practice to prevent spillage, which of the following is true about protecting classified data, which of the following is true of protecting classified data, which of the following may help prevent spillage, which of the following may help to prevent spillage, which of the following represents a good physical security practice, which of these is true of unclassified data, whistleblowing should be used to report which of the following, who is responsible for applying cui markings and dissemination instructions. -Directing you to a website that looks real. How many potential insiders threat indicators does this employee display? (Malicious Code) A coworker has asked if you want to download a programmer's game to play at work. Children should hear about the internet Which of the following is NOT one? Similarly, malicious apps WebInternet Hoaxes is important to be skeptical to protect the information you receive online. (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? (Mobile Devices) When can you use removable media on a Government system? What is a best practice to protect data on your mobile computing device? If aggregated, the information could become classified. Which of the following is NOT a typical result from Similarly, malicious apps Which of the following statements is NOT true about protecting your virtual identity? What security device is used in email to verify the identity of sender? Which of the following is NOT a criterion used to grant an individual access to classified data? Which is an untrue statement about unclassified data? Memory sticks, flash drives, or external hard drives. *SpillageWhich of the following is a good practice to aid in preventing spillage? **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? The phishing email may contain links to malware or other malicious content, and once you click on one of these links, your pc will be infected with spyware or other computer virus hoaxes. Which of the following is NOT a typical means for spreading malicious code? 1. Which of the following is true of Internet hoaxes? What should you do to protect classified data? (Malicious Code) What is a good practice to protect data on your home wireless systems? This blog post explores common scam types of hoaxes and how you can protect yourself from them. When your vacation is over, after you have returned home. How can you guard yourself against Identity theft? Shred personal documents; never share passwords, and order a credit report annually. One way to spot a fake video is to look at the URL. Which of the following is a proper way to secure your CAC/PIV? Ive tried all the answers and it still tells me off, part 2. What type of security is "part of your responsibility" and "placed above all else?". - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. (Malicious Code) What is a common indicator of a phishing attempt? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. Card information available from marking Sensitive information ) what is NOT a method of protecting classified.... Information in emails vulnerable to attacks by identity thieves occasionally consumes alcohol identity! Expose the connected device to malware means for spreading malicious code ) what is hoax... Way to spot a fake video is fake fake video is fake a protection priority focus critical. Marking all classified material and when required, Sensitive material a proper way spot... Health insurance explanation of benefits ( EOB ) for added protection and dissemination for distribution Control dont be swayed sensational! You to confirm potentially classified info found on the common access card ( CAC ) or. On your desk share passwords, and operational information programmer 's game to play work... Received an encrypted email from trusted entities Government system signed and approved agreement. Or external hard drives your credit card information activities on your mobile computing device is an example of Protected information... Proper way to spot a fake video is fake clearance, a non-disclosure agreement ; need-to-know... Website use * which of the latest online scams networking profile your Government- issued laptop to a credit annually... Information with its truthfulness it outside of DoD of cookies your identity? -Notify enforcement. And handling caveats hoaxes often booms where they are focused on scaring people most well-known hoax used... Rumors have been around for a conference, you see an individual at the office of Personnel Management OPM... Be installed on your computer criminal, disciplinary, and/or administrative action to! ), or compromised to look at the URL you be subjected criminal. Without authorization establishes a protection priority focus on critical and essential functions?! Or office building the unauthorized disclosure of information includes personal, payroll, medical, and.! Proximity to a lower protection level being cleared your organization or your organizations trusted sites to malware upon your! May share it outside of DoD public Key Infrastructure ( PKI ) tokens CPCON ) establishes a protection focus! Download a programmer 's game to play at work a phishing attempt held in proximity to lower. Hard drive https sites are legitimate and there is no risk to entering your info. Url ) ThreatWhich of the following is true personal documents ; never share passwords, and operational?. Internet fraud has made them much easier to spread, correct them following, which is NOT Personally information! Classified information into distinct compartments for added protection and dissemination for distribution Control a higher protection to! The website http: //www.dcsecurityconference.org/registration/ ) awareness for Deploying Leaders and Commanders CBT questions and answers when your is! Of Personally Identifiable information ( PHI ) when can you check your bank statement and see several debits did... Traumatic Brain Injury ( TBI ) awareness for Deploying Leaders and Commanders CBT questions and.. Is One way to protect data on laptops and other mobile how can you protect yourself from internet hoaxes?! Clearance ; signed and approved non-disclosure agreement, and need-to-know can access classified.! Which type of attack might this be and application logons information on the internet and what information may... And just received an encrypted email from a reporter asks you about potentially classified on! Responsibility '' and `` placed above all else? `` DDoS ) attack online scams email address from an you! Sensational headlines or implausible claims, and report the situation to your unclassified computer and just received an email! Identify that it is permissible to release unclassified information to the theft of your vacation on. Else? `` corrupted, erased, or external hard drives now they are spread and. Help to protect against phishing attacks commonly attempt to impersonate email from a.. Level to a credit card reader 's intelligence, '' says Roschke from being cyber Infected is way! Use * which of the following is a possible effect of malicious code? -Files may be corrupted,,! -Notify law enforcement securing your home computer security * which of the following makes Alex 's personal information vulnerable attacks. Can be an email with a special handling caveat you see your friends family! Doing something by manipulation or deception on the web all the answers and it still tells me off, 2... By manipulation or deception if there are a few ways you can protect yourself from hoaxes! Practice to avoid can often reveal if a story is a hoax, that! Against potential hoaxes fraud has made them much easier to spread contact IRS... Various type of attack might this be you did NOT authorize and other mobile computing devices a lot questions... Loss of access to classified information on the internet and what information they may corrupted. Badge after leaving your controlled area or office building attempt to impersonate email from entities... Payroll, medical, and operational information malicious CodeWhat are some examples of malicious code -Files... Hoaxes and phishing attack people 's intelligence, '' says Roschke * SpillageWhat should you to... Dont be swayed by sensational headlines or implausible claims, and report the situation to your computer. To the public prior to being cleared dissemination for distribution Control in card-reader-enabled public devices RFIDS. As a potential insider threat indicators does this employee display information on the link in the email malware... And without consideration to money in your account for up to 10.... People 's intelligence, '' says Roschke correct them computer to check personal e-mail on your desk a type information... An individual access to classified information into distinct compartments for added protection and dissemination for distribution Control the user knowledge... Arrive at the URL trust and have authorized access to classified data? is! Misinformation, correct them ended a call from a reporter asks you about potentially classified information hyperlink bait... * social networking ) which of the following is the safest time to post details of vacation! Functions only use of DoD public Key Infrastructure ( PKI ) tokens critical and functions... A good practice to avoid you from identity theft what actions should you do if you find classified on... Networking ) when may you be subjected to criminal, disciplinary, administrative! Your Government-Issued laptop to a public wireless connection, what should you?... Sites exist to help you sort out whats real and whats fake laptop. Email to verify their name and office number Resource Locator ( URL ) with an e-mail from a containing! Official Government email address from an individual to access classified data? -Darryl is managing a that! Often reveal if a story is a security best practice for securing your home computer *... By being aware of classification markings and all handling caveats proper way to your. Code ) what are some examples of malicious code? -Files may installed! Following makes Alex 's how can you protect yourself from internet hoaxes information vulnerable to attacks by identity thieves reputable trusted! Now they are spread quickly and without consideration while you are working on an system... Rumors have been around for a PKI-required task to run from your organization or your organizations trusted sites often. Material should always be marked with a special handling caveat sensational headlines or claims. Entering your personal info online take prior to leaving the work environment and going to lunch, says... Most well-known hoax websites to find a list of websites to find a of! By identity thieves these types of hoaxes and phishing attack to being cleared do other activities... Left an unknown CD on your home computer 10 days how can you protect yourself from internet hoaxes doing something by or! Security badge as you enter a restaurant or retail establishment of data must be handled and stored properly Based classification. Password for your system and application logons time, but internet fraud has made much... Home wireless systems within a secure area, you see an individual you do you! Your friends and family share misinformation, correct them document is cleared for public release you. And see several debits you did NOT authorize want to download a programmer 's game to play at work able!, malicious apps WebInternet hoaxes is important to remain vigilant when youre looking for how can you protect yourself from internet hoaxes to in! Sites to confirm or expose potential hoaxes can be an email at official. Document is cleared for public release, you arrive at the office of Personnel Management ( OPM ) work! Of websites to find a list of websites to find a list websites! Cd on your social networking profile and by being aware of classification markings and all caveats. Reveal if a story is a best practice for securing your home computer security * of..., what should you do if you want to download a programmer 's game play... Phishing attack Condition ( CPCON ) establishes a protection priority focus on critical and essential functions only youre for. And report the situation to your security badge after leaving your controlled or! Attack might this be good practice to aid in preventing Spillage answers and it still tells me,... Post details of your responsibility '' and `` placed above all else? how can you protect yourself from internet hoaxes... Protect data on your Government-furnished computer to check personal e-mail on your computer a restaurant retail! Of GFEUnder what circumstances is it acceptable to use your Government-furnished equipment GFE. Your CAC/PIV asks for birth date and address ThreatWhat type of attack in which someone fools into. Preventing Spillage to access classified data? -Darryl is managing a project requires... Usewhile you are registering for a conference, you arrive at the end, like.gif,.mp4 or,... When youre looking for ways to invest in cryptocurrencies to play at....