Special Access Program (SAP) Correct Answer: A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required... for information at the same classification level Enhanced security requirements for protecting Special Access Program (SAP) information Correct Answer: 1. Within Personnel Security: • Access Rosters; • Billet Structures (if required); • Indoctrination Agreement; • Clearance based on an appropriate investigation completed within the last 5 years; • Individual must materially contribute to the program in addition to having the need to know; • All individuals with access to SAP are subject to a random counterintelligence scope polygraph examination; • Polygraph examination, if approved by the DepSecDef, may be used as a mandatory access determination; • Tier review process; • Personnel must have a Secret or Top Secret clearance; • SF-86 must be current within one year; • Limited Access; • Waivers required for foreign cohabitants, spouses, and immediate family members. 2. Within Industrial Security: The SecDef or DepSecDef can approve a carve-out provision to relieve Defense Security Service of industrial security oversight responsibilities. 3. Within Physical Security: • Access Control; • Maintain a SAP Facility; • Access Roster; • All SAPs must have an unclassified nickname/ Codeword (optional). 4. Within Information Security: • The use of HVSACO; • Transmission requirements (order of precedence). Principle incident/events required to be reported to DoD counterintelligence (CI) organizations Correct Answer: espionage, sabotage, terrorism, cyber Indicators of insider threats Correct Answer: 1. Failure to report overseas travel or contact with foreign nationals 2. Seeking to gain higher clearance or expand access outside the job scope 3. Engaging in classified conversations without a need to know 4. Working hours inconsistent with job assignment or insistence on working in private 5. Exploitable behavior traits 6. Repeated security violations 7. Attempting to enter areas not granted access to 8. Unexplained affluence/living abov [Show More]
Last updated: 1 year ago
Preview 1 out of 8 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
We Accept:
Connected school, study & course
About the document
Uploaded On
Nov 21, 2022
Number of pages
8
Written in
This document has been written for:
Uploaded
Nov 21, 2022
Downloads
0
Views
85
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·