+ All Categories
Home > Documents > Introduction to Security

Introduction to Security

Date post: 09-Feb-2016
Category:
Upload: jeb
View: 62 times
Download: 3 times
Share this document with a friend
Description:
Introduction to Security. Ms. Tommie Abrams Security Branch PERS-534C Wood Hall, Bldg 769, Room 184. Your Security Team. YOU are the key component of all of our security efforts. References. DODD 5205.02 - DOD Operations Security (OPSEC) Program - PowerPoint PPT Presentation
Popular Tags:
34
Introduction to Security Ms. Tommie Abrams Security Branch PERS-534C Wood Hall, Bldg 769, Room 184
Transcript
Page 1: Introduction to Security

Introduction to Security

Ms. Tommie AbramsSecurity Branch

PERS-534CWood Hall, Bldg 769, Room 184

Page 2: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 2 04/22/23

Your Security TeamDaniel Harris Command Security Manager 4-3091

Trisha Dooley EKMS / COMSEC 4-5353

Tommie Abrams Security Awareness Training OfficerAntiterrorism Training Officer Mail Manager

4-3089

David McGhee Mail Clerk 4-3138

Carla Karpen Personnel SecurityTop-Secret Control OfficerNATO Control Officer

4-3082

Daniel Boucher Personnel Security Specialist 4-3084

Theresa Law Personnel Security Technician 4-3088

Page 3: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 304/22/23

References DODD 5205.02 - DOD Operations Security (OPSEC) Program DOD 5220.22M – National Industrial Security Program SECNAVINST 5239.3A - DON Information Assurance (IA) Policy SECNAV M-5510.30 - DON Personnel Security Program SECNAV M- 5510.36 - DON Information Security Program OPNAVINST 5239.1 - DON Information Assurance Manual OPNAVINST 5530.14E - Navy Physical Security & Law Enforcement BUPERSINST 5239.1B - BUPERS Information Systems Security (INFOSEC) Program NAVPERSCOMINST 5510.1 - NPC Security Program NAVPERSCOMINST 5530.1 - NPC Physical Security, Loss Prevention & Anti-Terrorism

Page 4: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 404/22/23

Major Elements

Personnel Security Information Security Computer Security Physical Security Industrial Security Operations Security

Page 5: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 504/22/23

Personnel Security

Page 6: Introduction to Security

YOU are the key component of all of our security efforts 6

04/22/23

Personnel Security

Civilians, military and contractors mustpossess a valid security investigation consistent with the interests of NationalSecurity per SECNAV M-5510.30

Page 7: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 704/22/23

Personnel Security (Con’t) Adjudication Guidelines SECNAV M-5510.30, Appendix G Allegiance to the United

States Foreign influence Foreign preference Sexual behavior Personal conduct Financial considerations Alcohol consumption

Drug involvement Emotional, mental, and

personality disorders Criminal conduct Security violations Outside activities Misuse of Information

Technology

Page 8: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 804/22/23

Information Security

Page 9: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 904/22/23

Access to Classified Information

Appropriate InvestigationAdjudicated for specific level of Classified

information (Top Secret, Secret, Confidential) Approved Access

Authorized by PERS-534 Need to Know

Job Requirement

Page 10: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 1004/22/23

Handling Procedures Store classified diskettes and

removable media in appropriate approved security safes when not in use

Dispose/destroy printed materials and data as prescribed in SECNAV M-5510.36

Do not discuss classified information in an Unclassified/Unsecured environment (Telephone)

Never remove classified information from command without authorization from Command Security Manager

Only use SIPRNET or Secure Fax to transmit classified information

Page 11: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 1104/22/23

Compromise Loss of classified information that cannot be physically

located or accounted for Classified information placed and routed in guard mail

envelopes or on unclassified LAN Classified information not properly controlled and stored Unauthorized disclosure Electronic Spillage (classified information placed on an

unclassified computer system)

Report any loss or compromise of classified information to Command Security Manager at 4-3091 immediately

Page 12: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 1204/22/23

Mailing

SECNAV M-5510.36 provides the procedures for mailing classified information

Any questions call PERS-534

Page 13: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 1304/22/23

Computer Security

Page 14: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 1404/22/23

Computer Security - General Info

BUPERSINST 5239.1B Use of personal computer software or hardware is not

authorized on any Navy system NO desk top modems authorized Use of computer games is prohibited Report security incident to appropriate Information

Assurance Officer (IAO)– virus or classified spillage Use your government computer for Official Business

Only

Page 15: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 1504/22/23

Physical Security

Page 16: Introduction to Security

YOU are the key component of all of our security efforts

Physical Security

Naval Support Activity Mid-South (NSA) is responsible for overall security of the base including:

Protection of propertyProtection of personnelTemporary or permanent debarment

YOU are the key component of all of our security efforts 1604/22/23

Page 17: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 1704/22/23

Physical Security - Safes Ensure only authorized individuals have access to safes

containing classified information Use SF-701, Activity Security Checklist, for spaces

storing classified information Use SF-702, Security Container Check Sheet, when

opening and closing safe Ensure SF-700, Security Container Information form, is

completed and taped inside safe to display authorized personnel with access to safe

Ensure OF-89, Maintenance Record, is taped on the inside of safe

Page 18: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 1804/22/23

Physical Security – Emergency Exits

Do not go out emergency exits unless it is an Emergency

Page 19: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 1904/22/23

Mission Essential – Selection Criteria

Personnel or function is identified as essential by their Department, Staff Office Directorate (SOD), or Special Assistant (SA), vital to the operational readiness or mission effectiveness of the command’s mission. Personnel assigned as essential must be available on demand or on call.

Page 20: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 2004/22/23

Force Protection Conditions (FPCONS)Normal No Known ThreatAlpha General Threat That Possible Terrorist

Activity ExistsBravo There is an Increase/More Predictable Threat

of Terrorist Activity ExistsCharlie An Incident Has Occurred or Intelligence

Received Indicating Terrorist Action Imminent

Delta Attack Has Occurred or When Intel Received That a Terrorist Action Against a Specific Location or Person is Imminent.

Page 21: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 2104/22/23

Force Protection Conditions (FPCONS)NormalAlphaBravo

Normal routine and Random Anti-Terrorism Measures (RAM) exercises being conducted. Added security by NSA at gates

Charlie Requirements of Normal, Alpha and Bravo. NPC will go to a single entrance/exit for

access to NPC buildings, and set a Security/Roving Patrol Watch in each building. Watch will search all parcels and ensure all personnel entering the buildings have swiped their CAC card and entered PIN number for access (no piggy backing)

Page 22: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 2204/22/23

Force Protection Conditions (FPCONS)Delta All measures from previous FPCONs will be

applied. Only essential personnel will report to work. Building Security/Roving Patrol Watch will continue in all buildings with personnel present. All personnel entering NPC buildings will sign in and out. Only those personnel with proper drive-on badges are permitted drive-on base access, all other personnel will park in the area assigned at Mid-South Conference Center for walk-in/shuttle base access.

Page 23: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 2304/22/23

Force Protection Conditions (FPCONS)Delta When FPCON DELTA is set, all NPC

Personnel will be notified or informed via local TV and radio of NSA Mid-South - Open For Essential Personnel Only. NPC personnel are encouraged to call 874-7474 for further information about base closure and openings.For complete information on NPC FPCON measures please refer to NAVPERSCOMINST 5530.1, Physical Security, Loss Prevention, and Anti-terrorism

Page 24: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 2404/22/23

Industrial Security - Contractors

Reference – DoD 5220-22M

Page 25: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 2504/22/23

Operations Security(OPSEC)

Page 26: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 2604/22/23

Definition OPSEC is a risk management tool used to deny

an adversary information generally unclassified but critical/sensitive concerning our intentions and capabilities

What is critical/sensitive information? Information about our activities, intentions and

capabilities, that an adversary needs to gain an advantage

Page 27: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 2704/22/23

Examples

Troop Deployment Weapon Systems Technology Local Exercises Test Schedules

Page 28: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 2804/22/23

Adversaries

International Terrorists Groups Foreign Intelligence Agencies Hackers Other Types of Adversaries

Disgruntled EmployeesDishonest Employees

Page 29: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 2904/22/23

Communication

Internet Cellular Phones Fax Machines Unsecured Communication Lines

Page 30: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 3004/22/23

Rules to Live By

Don’t discuss readiness Issues Don’t discuss specific training exercises Don’t assume the enemy is not trying to

collect information

Page 31: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 3104/22/23

Key Points

Good OPSEC save lives and resources Always use common sense and be aware Review procedures for destruction of

sensitive information

Page 32: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 3204/22/23

Teamwork is Essential

SEC URITY

Page 33: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 3304/22/23

Video Time –

Visit our website NPC Security Website

NOT!

Page 34: Introduction to Security

YOU are the key component of all of our security efforts

YOU are the key component of all of our security efforts 3404/22/23

My Time is Up…Thank You


Recommended