Preview

The Importance of Securing Sensitive Items

Good Essays
Open Document
Open Document
879 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Importance of Securing Sensitive Items
Sensitive items are anything that is considered classified or a mission essential item. These items can include protective gear, maps, or a piece of paper designating patrol routes. The importance of securing sensitive items comes down to maintaining accountability for operation security, mission success and a soldiers over all readiness. The habits of exercising security and accountability of a soldiers items allow the soldier and their team to operate to the highest standards or have items be accessed by an opposing adversary creating loss of overall mission success.

Operational security is a process that denied critical information to an adversary. If one were to obtain the information presented it could be used against friendly forces. Utilizing all assets to maintain and secure sensitive items and classified information promote proper operational security and soldier readiness. Not securing items of sensitive nature acquire the risk of loss by being intercepted by unauthorized persons. All personnel should maintain accountability of all sensitive material to allow full utilization by themselves and anyone involved with the mission and still maintain operational security. Operational security can be compromised through the loss of sensitive items due to loss of equipment used for operational planning, or items used for support missions. Depending on the sensitive item that is being classified it could fall under a different level of security as it is deemed by the U.S. Government. The levels included in the term classified (withheld from general circulation for reasons of national security) are RESTRICTED (public disclosure could have undesirable effects or do some harm), CONFIDENTIAL (unauthorized disclosure could damage national security e.g. compromise information that indicates the strength of armed forces or disclosure of technical information about weapons), SECRET (unauthorized disclosure could seriously damage national security) and TOP SECRET

You May Also Find These Documents Helpful

  • Good Essays

    This essay is written in accordance with the corrective measures given by the issued red chit. In this essay, I will discuss a few of the many important points of why a police officer should make sure his/her equipment is secure.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    Confidential- This is the lowest classification level of information obtained by the government. It is defined as information that would "damage" national security if publicly disclosed, again, without the proper authorization.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Dave Jensen has soap, dental floss, foot powder, and vitamins. Mitchell Sanders has condoms, brass knuckles, and the unit's radio. Norman Bowker brings a diary. Kiowa carries a volume of the New Testament and moccasins. Rat Kiley brings his medical kit, brandy, comic books, and M&M's candy. In my opinion, the speaker offers additional detail about selected items; for instance, the poncho Ted Lavender carries will later be used by his fellow militaries to carry his dead body. Also, author details at great length what all the men carry: standard gear, weapons, tear gas, explosives, ammunitions, entrenching tools, starlight scopes, grenades, flak jackets, boots, rations, and the Army newsletter. They also carry their grief, terror, love, and longing, with poise and dignity. The writer extended catalog of items creates a picture in the reader's mind that grows incrementally. Lastly, I think O'Brien's technique also allows each character to be presented with a history and an exclusive place within the collection of…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Safeguarding Case Study

    • 378 Words
    • 2 Pages

    Therefore, it is Chris’s duty as a teaching assistant to follow the procedures regarding suspected abuse.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Principles of safeguarding

    • 1405 Words
    • 6 Pages

    b. Sexual abuse: is the forcing of undesired sexual behaviour by one person upon another…

    • 1405 Words
    • 6 Pages
    Good Essays
  • Good Essays

    It is important to keep track of sensitive items and documents for many reasons that could hinder you and/ or your comrades. I myself left my Military Identification Card behind during a weight and tape test. But many other things can be left behind and compromise your security, operations, life, or the lives of others.…

    • 877 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Principles of Safeguarding

    • 2832 Words
    • 12 Pages

    Sexual abuse – Loss of sleep, unexplained change in behaviour, soreness, tore stained or bloody underwear, sexual diseases or pregnancy.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Securing Military Gear

    • 5047 Words
    • 21 Pages

    The definition of sensitive items is anything that considered classified or a mission essential item. They range anywhere from protective wear, maps, patrol routes, nods (night vision goggles) or simply your weapon. The meaning of securing your sensitive items mainly is maintaining accountability for opsec (operation security), mission success and a soldiers overall readiness. If an item is lost and the enemy gets his/her hands on that item it could compromise the mission at hand or give them intelligence on the items we as soldiers use each day. Using habits and exercising the securing of sensitive items will make it possible for the soldier and his or her team to operate at the top performance. Operational security is process that denied valuable information to an enemy. If an enemy were to obtain the presented it could be used against our forces. Not securing sensitive items increases the risk of loss by being intercepted by unauthorized personnel. Every soldier must maintain accountability and positive control of all sensitive material to allow full use by them and anyone involved with the mission at hand while still maintaining operational security. Operational security can be compromised through the loss of sensitive items due to loss of equipment used for operational planning, or items used for support missions. Also depending on the type of sensitive item that is being classified it could fall under a different level of security as it is deemed so by the U.S. Government. The levels included in the term classified are restricted (public disclosure could have undesirable effects or do some harm), confidential (unauthorized disclosure could damage national security example would be compromising information that indicates the strength of armed forces or disclosure of technical information about weapons), secret (unauthorized disclosure could seriously damage national security) and top secret (unauthorized disclosure could…

    • 5047 Words
    • 21 Pages
    Good Essays
  • Good Essays

    Securing sensitive items

    • 542 Words
    • 3 Pages

    In the military most people think when they hear the term "sensitive items" they will think of thing such as weapons, security codes, classified information, ect. However most things in the military are considered to some degree a "sensitive item". . Which if they ended up falling into the hands of the enemy could cause minor or major damage to our nations national security and possibly endanger the lives of those both at home and deployed across the world.…

    • 542 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    |contain highly sensitive information about the services users. Sharing confidential information may make the service user feel |…

    • 9981 Words
    • 40 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    P2: Describe how physical security measures can help keep systems secure Physical security measures are actions, which are only taken by an organisation or a private individual to keep every single piece of software and hardware in an undoubtable safe position. However, these measures are most of the times used to make the best protection as it can be from physical actions. It can be anything from small locks to more technical devices like biometric scanners or CCTV. Bigger number of systems if not every single one is secured with anti-virus software and firewalls but they would absolutely not be helpful if someone would enter the right room and delete or do any other damage to data. Nowadays, there is a lot of different measures available.…

    • 1153 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    While both of the above elements of the question complement each other, without understanding the main purpose of security management, which is in itself is multifaceted in nature, and ideally to be successful should be employed throughout all aspects of a business, as can be seen…

    • 1598 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Security

    • 257 Words
    • 2 Pages

    Defining National Security VS Personal Privacy is a matter of looking at the basic nature of each. From research collected there is a consensus that we need balance. Too much of one hurts the other and vise versa. There are a couple of articles that range from Civil Liberties to the birth of public right to know that support the overall claim. Talks about the effects of censorship in different situations like war and peace will help prove that a balance needs to be forged. The problem here isn’t the definition of personal vs national security, but the survival of each in light of each other. There is history in our nation that explains why impinging on privacy may not be in the best interest of national security or of an individual. Also we will look at when it is appropriate for national security to impinge on personal privacy. You can’t have both without upsetting the balance of all. The claim is that too much national security will limit or demolish personal privacy. Also the same for too much personal privacy or liberty will limit or demolish security. So the question would be “does less personal privacy increase National Security?” My thesis is that too much National Security can destroy a government from the inside out by invading privacy. Democracy can’t trample on freedoms given the people for fear that a democracy no longer exists. “As Lee Strickland (2005) indicates, that ‘Civil liberties are not an obstacle; they’re a vital part of our strength.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays