Transcription of THE iWATCH INITIATIVE - cyssprogram.com
{{id}} {{{paragraph}}}
iWATCH , OPSEC and Information security Awareness TrainingObjectivesFollowing completion of this module, participants will be able to: Develop a greater understanding of the iWATCH INITIATIVE and their roles as contractors working in a government facility Develop a greater awareness of OPSEC and the identified strategies for properly securing and maintaining personal information on Child and Youth Program participants Identifying the best strategies for safe-guarding government equipment, information and reportsTHE iWATCH INITIATIVE The iWATCH InitiativeAs a result of recent attacks and breeches from outside sources to obtain confidential government information, the Army implemented the iWATCH INITIATIVE .
Examples of Suspicious Activities • Unfamiliar individuals sketching or taking picture of specific building layouts • Unfamiliar individuals asking in-depth questions related to security forces and/or
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}
Security Threats and Suspicious Packages, Security Threats and Suspicious Packages - Policy and Procedure, Handling and Processing Mail Safely, Alaska, Packages, Suspicious, Traffic Monitoring using, Security, GUIDELINES ONACCESS CONTROL, SCREENING, New York City, Food Defense Plan, Food Defense Plan Security, Analysis of advanced issues in mobile security, AIR FORCE, Hospital Disaster Preparedness Awareness, Hospital Disaster Preparedness . Awareness Training