Preview

SSD2 Module 1 Notes

Good Essays
Open Document
Open Document
31209 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SSD2 Module 1 Notes
MODULE 01 NOTES
SOP- STANDARD OPERING PROCEDURE
Determine the SOP purpose and target audience for distribution.
Uniforms
Your reference will be Local Policy, AR 670-1
Leaves and Passes
Your reference will be AR 600-8-10
Motor Stables
Your reference will be DA Pam 750-1
Key Control
Your reference will be AR 190-51, 190-11, 735-5
References
Citations must be accurate and thorough-title, type, number, and date of publication; online links if appropriate; and identifying information for correspondence or meetings.
Purpose
A brief statement that outlines the purpose of the SOP, describing its function, applicability, and objective.
Summary
A few sentences summarizing the content. Though placed near the beginning, it should be composed last.
Scope
To whom the SOP applies, and possibly under what conditions or circumstances.
Definitions
Sometimes needed to explain terms new to readers or to interpret acronyms.
Responsibilities
Brief, descriptive sentences telling exactly who is responsible to ensure what outcomes or provide what resources.
Procedures
An orderly system of specific actions taken to carry out an assignment including: who, what, when, how, and why regarding tasks to be performed, as well as expected outcomes.
Files
Any additional information needed to clarify procedures in the SOP, if necessary.
Top Secret
You will apply a TOP SECRET classification to an SOP in which the unauthorized disclosure of its contents could reasonably be expected to cause exceptionally grave damage to the nation 's national security.
Secret
You will apply a SECRET classification to an SOP in which the unauthorized disclosure of its contents could reasonably be expected to cause serious damage to national security.
Top Secret
You will apply a TOP SECRET classification to an SOP in which the unauthorized disclosure of its contents could reasonably be expected to cause exceptionally grave damage to the nation 's national security.
Secret
You will apply a SECRET classification to an SOP

You May Also Find These Documents Helpful

  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    Confidential- This is the lowest classification level of information obtained by the government. It is defined as information that would "damage" national security if publicly disclosed, again, without the proper authorization.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The data classification policy is intended to provide a framework for classifying a company’s data based on its level of sensitivity. Data classification entails analyzing the data an organization retains, determining its importance and value, and then assigning it to a category. Data is classified to help determine baselines for security controls in that will be implemented to protect the data.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    EGT1 Task 3

    • 1565 Words
    • 7 Pages

    An opening paragraph (introduction) of about 25-40 words in length and provides the most important and interesting news.…

    • 1565 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    2. Using the seminar case; list some of the security breaches being practiced by the employees at the agency.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is4550 Week5 Assignment1

    • 282 Words
    • 3 Pages

    your organization as management is thinking about this as a possible response to recent security…

    • 282 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Specific Purpose: To get the audience to: protect themselves from the National Security Agency, keep their information safe.…

    • 1052 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Threat identification. That is, give a detailed description of the incident and how it is an HS concern.…

    • 715 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Public organizations, generally providing essential services such as health, education, social services, policing. They are responsible to central government and those who run them are accountable to the public (Taylor and Wilkinson, 2012). The nature of their funding (taxpayers) requires them to prove their responsibility with the public money. Their HR department tend to be large and able to provide HR specialist support in different areas. Because of…

    • 2759 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    form 1

    • 430 Words
    • 2 Pages

    The form also speaks about Vishing as a classified remote exploit because it exploits the security vulnerability without prior access to the system. When attackers take advantage of an exploit one of their first goals is to gain administrator or superuser, one of the programs they use is called coreflood, is a superuser and a records keystrokes and capture screen information including passwords.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    * Prioritize classified risks, threats, and vulnerabilities according to the defined qualitative risk assessment scale…

    • 719 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Pam 5c

    • 55363 Words
    • 222 Pages

    This document is issued for the information of such persons who need to know its contents in the course of their official duties. Any person finding this document should hand it into a British Forces unit or to a British police station for its safe return to the MINISTRY OF DEFENCE, D MOD SY, LONDON SW1A 2HB, with particulars of how and where found. THE UNAUTHORIZED RETENTION OR DESTRUCTION OF THIS DOCUMENT COULD BE AN OFFENCE UNDER THE OFFICIAL SECRETS ACTS OF 1911–1989.…

    • 55363 Words
    • 222 Pages
    Powerful Essays
  • Better Essays

    Sensitive Item Essay

    • 1269 Words
    • 6 Pages

    Sensitive items can be defined but not limited to Identification card, weapons, Communication Security (COMSEC) filling devises, classified documents, social security numbers, bank account information, etc. Anything that can be used by any opposing forces or criminals, to gain the up hand, counter attack, weaken forces, harm allies, gain access to protected areas, gain vital information, compromise operational security etc. Operational Security is important to maintain at all times. People will tend to get relaxed while not in a combat operation area. This is very dangerous due to the fact that opposing forces and spies know that this happens and are on a constant mission to obtain any ability to gather information or access areas that are normally not available to them. In an article posted by The Washington Post on 26 August 2010; “The most significant breach of U.S. military computers was caused by a flash drive inserted into a laptop on a post in the Middle East in 2008. The article states that a malicious code was placed on the drive by a foreign intelligence agency, there is uploaded it’s self into the military’s computer network. Deputy Defense Secretary William Lynn stated; “The code spread…

    • 1269 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Security Clearance Info

    • 8089 Words
    • 33 Pages

    The Defense Industrial Security Clearance Office (DISCO) is part of the Defense Security Service (DSS), an…

    • 8089 Words
    • 33 Pages
    Powerful Essays
  • Good Essays

    one or more known instances of working and fully implemented attacks is classified as an…

    • 653 Words
    • 4 Pages
    Good Essays

Related Topics