Dod Information Security Program
74 community-sourced questions and answers. Free — no login.
Executive Order 13526 establishes uniform information security requirements for the Executive Branch.
TRUE
Purpose of the DOD Information Program
Proper classification, protection, and downgrading of official information that requires protection. Declassification of information no longer requiring protection.
A uniform program to govern the classification of information is vital to our national security
TRUE
First Information Security Executive Order
8381
The modern-day Information Security Program has been evolving since
The 1950's and is based on a series of presidential executive orders and presidential decision directives.
Current Executive Order for Information Security
Executive Order 13526, was issued in 2009 . The time had come to revitalize the protection requirements of our classified information.
Provides overall policy for information security program
NSC
Oversees and manages information security program
ISOO
Annual Report to the President
SF-311 through USDI to ISOO
DoD Information Security Program
DoDI 5200.01
Downgrading
Assigning a lower classification level to classified information because the information requires less protection in the interest of national security
Declassification
Changing the status of information from classified to unclassified because the information no longer requires protection in the interest of national security
Declassification systems
Scheduled, Automatic, Mandatory and Systematic
Scheduled declassification
Occurs when the instructions assigned by the OCA are followed to declassify it. Instructions consist of either a: date or event.
Automatic declassification
Occurs through system set up by E.O. 13526. Applies to classified records that have been determined to have permanent historical value under title 44 of the united states code. On December 31 of the year that is 25 years from the date of original classification.
Nine categories of information can be protected longer than
25 years.
Open Storage
The ability to store classified information openly in an area that has been designated for this purpose. Designed to meet safeguarding requirements for a vault or secure working space.
Initial Orientation Briefing
Must be completed prior to access to classified information
Indoctrination Briefing
This briefing must be completed prior to accessing classified information for special access (SAP), or Sensitive Compartmented Information (SCI)
Annual Refresher Briefing
Required to receive annual briefings that reinforce the policies, principles, and procedures covered.
Debriefing / Termination Briefing
When access to classified information is no longer needed
Special Briefing Courier
How to handle classified information in transit, who to contact in case of an emergency while acting as courier.
Special Briefing NATO
NATO briefings are only provided to personnel who have validated need to work with NATO classified information.
Special Briefing NON-DISCLOSURE
For personnel who have had unauthorized exposure to classified information.
Foreign Travel Briefing
Foreign travel briefing can be a little different depending on where you work but are mandatory for SCI and SAP access.
ARRESTATION
Contractors, Individuals orally attest to understanding their responsibility to protect national security. Standard form 312 classified information NON-Disclosure agreement.
ATFP Briefing
Joint Chiefs of Staff assisted by commanders of the combatant command, office of secretary of Defense and military departments.
Top Secret
Grave Damage
Secret
Serious Damage
Confidential
Damage
Derivative Classification
Restating or generating in new form
Original Classification
information requires, in the interest of national security, protect against unauthorized disclosure.
Compilation
Information or classified information at a lower level that when the information is combined or associated reveals an additional factor that qualifies for classification under DoD Policy.
Original Classification Authority OCA
Used to identify individuals specifically authorized in writing to make initial classification decisions.
All paper-based and other materials containing classified information must be properly destroyed so that the information can never be compromised and used to cause damage to our national security.
TRUE
The patent Security act of 1952
The Secretary of Defense, among others, may determine that disclosure of an investigation by granting of a patent would be detrimental to national security.
Inner wrapping
Address the envelope to an official government activity or DoD contractor, office return address, mark highest level of classification,
outer wrapping
insert the inner envelope and seal, Address the envelope to an official government activity or DoD contractor, DO NOT address the individuals name on envelope, return address, DO NOT put any markings that indicate classified.
Top Secret, Secret and Confidential require different methods of transmission
TRUE
Hand Carrying classified information requires different documentation depending on mode of transportation IE commercial airline required a written statement of DD Form 2501.
TRUE
when the document has been sealed within a properly marked inner envelope, you must:
Insert the envelope into the outer envelope
DCS stands for:
Defense Courier Service
Secret information can be sent via USPS express mail
Only when it is the most effective means considering security, time, cost and accountibility
Top Secret information can be sent via UPS
FALSE
Confidential information can be sent via DCS, First class Mail, Registered mail and Certified Mail
TRUE
Hand carrying classified information should only be done as a last resort.
TRUE
Anyone can determine the need for hand carrying classified information.
FALSE
When someone is carrying classified information, written authorization is always required.
TRUE
A DD form 2501 is a Courier authorization card that provides authorization for you to transport classified material within the U.S. and its territories.
FALSE (geographic limitations are determined by the authority issuing the card)
Classified information may never be opened in route
FALSE (except with customs, police)
Security Violation
Knowing or willfully negligent classified information, this MAY or MAY NOT involve compromise of classification.
Security Infraction
Failure to comply E.O. 13526, not double checking your SF 702, not returning a receipt for a classified document.
Actual Compromise
Disclosure of classified information
Potential Compromise
Possible, could exist not sure
Unauthorized Disclosure
Communication for transfer of classified information to an unauthorized recipient
Security Classification Guides (SCG) issued by an OCA
Provide derivative classification instructions i.e. classification level, declassification and downgrading instructions
Examples of Compilation that turn into classified information
budget, staffing and location
Current Executive Order is 13526
TRUE
First umbrella program to protect classified information
E.O. 10290 in 1951
Declassification exemptions of 50 and 75 years for specific categories of information.
E.O. 13526
NSC (National Security Council)
Provides overall policy for information security program.
ISOO
Oversees and manages information security program.
What is national security?
The national defense or foreign relations of the United States
SCG (Security Classification Guide)
Documents issued by the OCA that provide derivative classification instructions.
Compilation 2
Non classified items combined can make it classified. OCA determines the classification.
Downgrading example
example: top secret to secret
WMD
Weapons of mas destruction protection
HUM
Human protection
Custodian
People who are in possession of or who are otherwise charged with safeguarding classified information.
SF-701 activity security checklist
secure and locked areas
SF-702 security container check sheet
open and closing
People who are in possession or who are otherwise charged with safeguarding classified information.
Custodians
Examples of security infractions
not double checking your 702, not returning a receipt for a classified document
Examples of security violations
Not classifying, downgrading or declassifying information properly. Establishing a SAP without proper authority or not closing one when instructed. Making documents incorrectly.
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials