NETWARCOM Whistleblower

Basic SCI Systems User Course (ONI-SSONAVY)

NETWARCOM.net
Basic SCI Systems User Course (ONI-SSONAVY)
U.S. DOD Computer Network Hackers
Congress Reports / Intelligence Summit
Identity Theft
Spies and Traitors
7 write-ups STOP Re-Enlistment
Article 138 Complaint
3 Hour Argument
Board for the Correction of Navy Records
LINKS - GOVT, DOD, Navy, and NIOCs

This course can be found on Navy Knowledge Online (NKO) Click Here  

Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Question 6 or 6
It is OK to download a file from a commercial website as long as you obtain permission from your supervisor to do so.
Unacceptable
Correct.  Never Download any files from a commercial website to your workstation


Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Question 5 of 6
You should NOT transfer a file from SIPRnet to JWICS unless it is Unavoidable to do so.  Acceptable
Correct. 
Take every precaution to avoid transferring material to a higher domain.  If transfer is Unavoidable, follow Command Procedures to protect the high side from Malicious Code.


Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Question 4 of 6
If your supervisor tasks you to develop a project website, you may use your workstation to do so.  Unacceptable.
Correct.  Do NOT develop any software on the operational network.  Your workstation is part of that network.



Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Question 3 of 6
If you suspect a worm has invaded your computer, turn off and report the incident to your ISSM immediately.  Acceptable.
Correct.  If you suspect a worm, stop working, do NOT touch the infected object, turn the computer off, and report your suspicion immediately.



Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Question 2 of 6
It is safe to open an email attachment if it comes from someone you know.  Unacceptable.
Correct.  Never open an attachment within an email message, even from someone you know.



Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Question 1 of 6
You may install personal software at your workstation as long as it is for purposes of helping you do your work.  Unacceptable.
Correct.  Do NOT install any Unauthorized software on your workstation.




Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Question 1 of 3
If you have used a Writable CD on a workstation on a classified domain, you must sanitize the CD  before reusing it on a lower classification domain.  False.
Correct.
You can NEVER sanitize and Reuse removable Writable Media on a lower classification system once it has been used in a classification system.  You can only reuse it at the same classification level or higher.

Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Question 2 or 3
You must put an appropriate SF-700 label on any CD that contains classified material.  False.
Correct.  Use the SF-700 type label on non-electro-optical media, NOT on CD's.




Click Image
Basic SCI Systems User Course (ONI-SSONAVY)
Click Image

Question 3 of 3
Removable [Writable] Media must be degaussed or destroyed if it is NOT reused at the SAME or higher classification level or the system in which it was used.  TRUE.
Correct NEVER declassify or downgrade the classification of the media.  Reuse it at the same or higher level, or make sure it is degaussed or destroyed.
SSO Navy, Navy SSO, NavySSO

Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

"Our Mission accomplishment has been adversely impacted by CARELESS individuals who fail to adhere to published security standards."  "Employees are reminded that it is YOUR RESPONSIBILITY to understand and follow security standards, ensuring our work environment is NOT compromised or worse, dangerously crippled. 
"There simply are NO excuses for jeopardizing our Mission"
- Director DIA, VADM Jacoby, 28 August, 2003

Click Image
Basic SCI Systems User Course (ONI-SSONAVY)
Click Image

Email Attachment
   * Common source of malicious code
   * Looks innocuous but could be harmful
   * Do NOT open within email
   * If sender known
          1. Save as file
          2. Scan file
* If sender unknown or attachment NOT expected
       1. Cancel
       2. Contact SCI ISSM or SSO

Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Malicious Code

Malicious Code exists in the form of Computer Viruses, Worms, Trojan horses, and logic bombs.




Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Sources of Malicious Code- Do NOT install Unauthorized software or files from Media (DVD, CD, Floppy, etc....,):
* Personal documents          * Audio files
* Images                                    * Games
* Screen savors                       * Open source documents
* Developer's tools


Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Do NOT publish and release information on separate domains

* Prevent Classified Spillage from higher to lower domain

* Prevent Malicious Code Infections on classified domains

* Publish and release on same domain whenever possible

Click Image
Basic SCI Systems User Course (ONI-SSONAVY)
Click Image

Malicious Code can cause:

* Degradation of system performance or functionality

* Loss of information sharing capacity

* Loss or compromise of critical data

And if it is possible to recover from a malicious code attack, the recovery can be very expensive.

Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Low to High Cross Domain transfer

     * Avoid cross domain transfer if possible

     * If NOT possible, Follow Command Procedures



Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

"This is a message really for all the men and women in the United States Government who have access to classified information.  It seems to me that when they see or learn of someone who is handling classified information in a way that is going to put the lives of Men and Women in uniform at risk, they ought to register exactly what kind of person that is.  It's a person who is willing to violate federal criminal statutes, and willing to reveal information that could cost the lives of Men and Women in uniform".
          - Secretary of Defense Donald Rumsfeld   Sept. 12, 2001

Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

There are NO acceptable excuses for putting our national security at RISK
NO excuses for ignoring security practices:
* NOT enough time
* Complex transfer policies and procedures
* Carelessness
NO excuses for ignoring security practices

Obey cross domain transfer policies and procedures    Ask for help SCI ISSM

Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Media Classification

* Classify Writable Media at highest level of system

* Writable Media used in a classified system can NEVER be declassified

* Media must be reused at he SAME classification level

Click Image
Basic SCI Systems User Course (ONI-SSONAVY)

Media Destructions

* Do NOT sanitize (i.e., erase all data from) or declassify media (floppy, CD, DVD, etc...)

* Degauss / destroy media according to Command Procedures


Click Image
Basic SCI Systems User Course (ONI-SSONAVY)
Click Image

Downloading Classified Data to Removable Media

As a general user, you are NOT permitted to download any classified data onto a DVD, CD, floppy disk, or other form removable media.

SSO Navy, Navy SSO, Navysso

This course can be found on Navy Knowledge Online (NKO) Click Here  

Questions or Comments E-mail ig@netwarcom.net

NETWARCOM Whistleblower
Naval Network Warfare Command
NETWARCOM Whistleblower

Naval Network Warfare Command Whistleblower