Quick Answer: What Is An Individual’S Personally Identifiable Information Considered Cyber Awareness?

What is the best example of personally identifiable information PII cyber awareness?

Personally identifiable information, or PII, is any data that could potentially be used to identify a particular person.

Examples include a full name, Social Security number, driver’s license number, bank account number, passport number, and email address..

How do you handle personally identifiable information?

10 steps to help your organization secure personally identifiable information against loss or compromiseIdentify the PII your company stores.Find all the places PII is stored.Classify PII in terms of sensitivity.Delete old PII you no longer need.Establish an acceptable usage policy.Encrypt PII.More items…•

Who is responsible for protecting PII?

From a legal perspective, the responsibility for protecting PII may range from no responsibility to being the sole responsibility of an organization. Generally, the responsibility is shared with the organization holding the PII and the individual owner of the data. That said, while you might not be legally responsible.

Which is a good practice to protect classified information cyber awareness?

Which is a good practice to protect classified information? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.

What must you ensure before transmitting personally identifiable information?

What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail? Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible.

What is malicious code cyber awareness?

Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.

What is a common method used in social engineering cyber awareness?

Phishing attacks are the most common type of attacks leveraging social engineering techniques. Attackers use emails, social media, instant messaging and SMS to trick victims into providing sensitive information or visiting malicious URLs in the attempt to compromise their systems.

What is whaling cyber awareness challenge?

A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company, as those that hold higher positions within the company typically have complete access …

What describes how sensitive compartmented information is marked cyber awareness?

SCI is a classification label indicating that items or information is sensitive and part of a specific program or department. The program office, or GCA determines what is SCI and identifies it with proper classification markings. Not everyone will have access to this SCI information.

What are examples of malicious code cyber awareness?

Malicious code includes viruses, trojan horses, worms, macros, and scripts. They can damage or compromise digital files, erase your hard drive and/or allow hackers access to your PC or mobile from a remote location.

Which of the following is the best example of personally identifiable information?

Examples of personally identifiable information (PII) include : Social security number (SSN), passport number, driver’s license number, taxpayer identification number, patient identification number, and financial account or credit card number. Personal address and phone number.

What is the best protection method for sharing personally identifiable information?

What is the best protection method for sharing Personally Identifiable Information (PII)? Digitally sign and encrypt the email.

What is the best example of protected health information?

Health information such as diagnoses, treatment information, medical test results, and prescription information are considered protected health information under HIPAA, as are national identification numbers and demographic information such as birth dates, gender, ethnicity, and contact and emergency contact …

Which is a rule for removable media?

What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Do not use any personally owned/non-organizational removable media on your organization’s systems.

How can you help protect PII against unauthorized use?

Protect e-mails that contain PII (e.g., encryption). Do not upload PII to unauthorized websites (e.g., wikis). Do not use unauthorized mobile devices to access PII. Lock up portable devices (e.g., laptops, cell phones).

What is the best practice while traveling with mobile computing devices?

On-Travel Guidance Maintain positive physical control of devices at all times (Do not leave in hotel safe). Turn off unused wireless communications (e.g., Bluetooth, NFC, Wi-Fi). Disable GPS and location services (unless required). Do not connect to open Wi-Fi networks.

What must you do when emailing personally identifiable information or protected health information?

a. Sending Sensitive PII within or outside of DHS. When emailing Sensitive PII outside of DHS, save it in a separate document and password-protect or encrypt it. Send the encrypted document as an email attachment and provide the password to the recipient in a separate email or by phone.

What describes how sensitive compartmented information is?

Sensitive Compartmented Information (SCI) is a classification label that is put on data and information that is sensitive in nature and belongs to a certain program or department. The data can be derived from multiple sources as Critical Program Information (CPI), analysis data and/or intelligence data.

What is a sensitive compartmented information program?

Sensitive Compartmented Information (SCI) is information about certain intelligence sources and methods and can include information pertaining to sensitive collection systems, analytical processing, and targeting, or which is derived from it.

How should you protect your Common Access Card?

How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? -Store it in a shielded sleeve to avoid chip cloning.

What are some examples of malicious code?

Various classifications of malicious code include viruses, worms, and Trojan horses. Viruses have the ability to damage or destroy files on a computer system and are spread by sharing an already infected removable media, opening malicious email attachments, and visiting malicious web pages.