SPED
Latest uploads at SPED. Looking for notes at SPED? We have lots of notes, study guides and study notes available for your school.
-
168
- 0
-
11
All courses for SPED
-
SPED 167
Latest notes & summaries SPED
![Latest Preview Thumbnail](/docpics/3623256/652c4b845979e_3623256_121_171.jpeg)
Describe the purpose of 5200.08-R The regulation implements DoD policies 
and provides minimum standards for the 
physical protection of DoD personnel, 
installations, operations, and related 
resources. 
List the nine capabilities a 
security system must provide to 
achieve Security-in-Depth • Deter 
• Detect 
• Identify 
• Track 
• Assess 
• Record 
• Communicate 
• Delay
- Exam (elaborations)
- • 27 pages's •
-
SPeD•SPeD
Preview 3 out of 27 pages
Describe the purpose of 5200.08-R The regulation implements DoD policies 
and provides minimum standards for the 
physical protection of DoD personnel, 
installations, operations, and related 
resources. 
List the nine capabilities a 
security system must provide to 
achieve Security-in-Depth • Deter 
• Detect 
• Identify 
• Track 
• Assess 
• Record 
• Communicate 
• Delay
![Latest Preview Thumbnail](/docpics/3623254/652c4b7ed4a60_3623254_121_171.jpeg)
SPeD is an abbreviation for? Security Professional Education Development 
SPed is a certification program of what agency? Department of Defense 
Security Fundamentals Professional Certification (SFPC) The individual understands 
foundational security concepts, principles, and practices. (Core Certification for SPed) 
Security Asset Protection Professional Certification (SAPPC) The Individual applies 
foundational security concepts, principles, and practices. (Core Certification for SPed) 
Securi...
- Exam (elaborations)
- • 16 pages's •
-
SPeD•SPeD
Preview 3 out of 16 pages
SPeD is an abbreviation for? Security Professional Education Development 
SPed is a certification program of what agency? Department of Defense 
Security Fundamentals Professional Certification (SFPC) The individual understands 
foundational security concepts, principles, and practices. (Core Certification for SPed) 
Security Asset Protection Professional Certification (SAPPC) The Individual applies 
foundational security concepts, principles, and practices. (Core Certification for SPed) 
Securi...
![Latest Preview Thumbnail](/docpics/3623251/652c4b7669cf8_3623251_121_171.jpeg)
Which two lamp types last the longest? 1. Induction 
2. Solid state 
What term is used for measuring output of light (lumens) compared to power input (watts)? 
Lamp efficacy 
What term refers to the need for lamps to be as efficient as possible to save costs and energy? 
Lamp efficacy 
When "light source" or "bulb" is used, what is referring to? A lamp 
True or false? Creating stripes on walls with lighting inhibits natural recognizable breaks in 
outlines or silhouettes that help security f...
- Exam (elaborations)
- • 5 pages's •
-
SPeD•SPeD
Preview 2 out of 5 pages
Which two lamp types last the longest? 1. Induction 
2. Solid state 
What term is used for measuring output of light (lumens) compared to power input (watts)? 
Lamp efficacy 
What term refers to the need for lamps to be as efficient as possible to save costs and energy? 
Lamp efficacy 
When "light source" or "bulb" is used, what is referring to? A lamp 
True or false? Creating stripes on walls with lighting inhibits natural recognizable breaks in 
outlines or silhouettes that help security f...
![Latest Preview Thumbnail](/docpics/3623248/652c4b6e6e99d_3623248_121_171.jpeg)
Special Access Program (SAP) A program established for a specific class of classified 
information that imposes safeguarding and access requirements that exceed those normally 
required for information at the same classification level 
Enhanced security requirements for protecting Special Access Program (SAP) information 1. 
Within Personnel Security: 
• Access Rosters; • Billet Structures (if required); • Indoctrination Agreement; • Clearance based 
on an appropriate investigation compl...
- Exam (elaborations)
- • 17 pages's •
-
SPeD•SPeD
Preview 3 out of 17 pages
Special Access Program (SAP) A program established for a specific class of classified 
information that imposes safeguarding and access requirements that exceed those normally 
required for information at the same classification level 
Enhanced security requirements for protecting Special Access Program (SAP) information 1. 
Within Personnel Security: 
• Access Rosters; • Billet Structures (if required); • Indoctrination Agreement; • Clearance based 
on an appropriate investigation compl...
![Latest Preview Thumbnail](/docpics/3623243/652c4b607b865_3623243_121_171.jpeg)
Scenario: When designing a new multi-story government Special Access Program Facility 
(SAPF), the architect provided identical drawings for two three-story buildings to the security 
officer. One drawing is for a building on the installation to be occupied only by contracting 
Company X. The other is for the command headquarters building on the installation. The design 
reveals floor-to-ceiling windows on the second floor for the main conference rooms and front 
office staff. The drawings indic...
- Exam (elaborations)
- • 10 pages's •
-
SPeD•SPeD
Preview 2 out of 10 pages
Scenario: When designing a new multi-story government Special Access Program Facility 
(SAPF), the architect provided identical drawings for two three-story buildings to the security 
officer. One drawing is for a building on the installation to be occupied only by contracting 
Company X. The other is for the command headquarters building on the installation. The design 
reveals floor-to-ceiling windows on the second floor for the main conference rooms and front 
office staff. The drawings indic...
![Latest Preview Thumbnail](/docpics/3623240/652c4b57e4927_3623240_121_171.jpeg)
When designing a new multi-story government Special Access Program Facility (SAPF), the 
architect provided identical drawings for two three-story buildings to the security officer. One 
drawing is for a building on the installation to be occupied only by contracting Company X. The 
other is for the command headquarters building on the installation.The design reveals floor-to- 
ceiling windows on the second floor for the main conference rooms and front office staff. The 
drawings indicate a park...
- Exam (elaborations)
- • 18 pages's •
-
SPeD•SPeD
Preview 3 out of 18 pages
When designing a new multi-story government Special Access Program Facility (SAPF), the 
architect provided identical drawings for two three-story buildings to the security officer. One 
drawing is for a building on the installation to be occupied only by contracting Company X. The 
other is for the command headquarters building on the installation.The design reveals floor-to- 
ceiling windows on the second floor for the main conference rooms and front office staff. The 
drawings indicate a park...
![Latest Preview Thumbnail](/docpics/3623235/652c4b45e3588_3623235_121_171.jpeg)
Security Infraction This event cannot reasonably be expected to and does not result in the 
loss, compromise, or suspected compromise of classified information 
DoD Manual 5200.01, Volumes 1-4 The manual that governs the DoD Information Security 
Program 
E.O. 13526 The executive order that governs the DoD Information Security Program 
32 CFR Parts 2001 & 2003, "Classified National Security Information; Final Rule" The 
Information Security Oversight Office (ISOO) document that governs the DoD...
- Exam (elaborations)
- • 18 pages's •
-
SPeD•SPeD
Preview 3 out of 18 pages
Security Infraction This event cannot reasonably be expected to and does not result in the 
loss, compromise, or suspected compromise of classified information 
DoD Manual 5200.01, Volumes 1-4 The manual that governs the DoD Information Security 
Program 
E.O. 13526 The executive order that governs the DoD Information Security Program 
32 CFR Parts 2001 & 2003, "Classified National Security Information; Final Rule" The 
Information Security Oversight Office (ISOO) document that governs the DoD...
![Latest Preview Thumbnail](/docpics/3623232/652c4b3da90f9_3623232_121_171.jpeg)
SSBI Initial investigation for military, contractors, and civilians: 
· Special-Sensitive positions 
· Critical-Sensitive positions1 
· LAA 
· Top Secret clearance eligibility 
· IT-I duties 
ANACI Initial investigation for civilians: 
· Noncritical-Sensitive positions 
· Confidential and Secret clearance eligibility · IT-II duties 
NACLC Initial National Agency Check with Law and Credit for military and contractors: 
· Secret or Confidential clearance eligibility 
· All military acces...
- Exam (elaborations)
- • 8 pages's •
-
SPeD•SPeD
Preview 2 out of 8 pages
SSBI Initial investigation for military, contractors, and civilians: 
· Special-Sensitive positions 
· Critical-Sensitive positions1 
· LAA 
· Top Secret clearance eligibility 
· IT-I duties 
ANACI Initial investigation for civilians: 
· Noncritical-Sensitive positions 
· Confidential and Secret clearance eligibility · IT-II duties 
NACLC Initial National Agency Check with Law and Credit for military and contractors: 
· Secret or Confidential clearance eligibility 
· All military acces...
![Latest Preview Thumbnail](/docpics/3623228/652c4b326335e_3623228_121_171.jpeg)
Principle incident/ 
events required to be reported to DoD counterintelligence (CI) organizations espionage, 
sabotage, terrorism, cyber 
Indicators of insider threats 1. Failure to report overseas travel or contact with foreign 
nationals 
2. Seeking to gain higher clearance or expand access outside the job scope 
3. Engaging in classified conversations without a need to know 
4. Working hours inconsistent with job assignment or insistence on working in private 
5. Exploitable behavior traits 
...
- Exam (elaborations)
- • 38 pages's •
-
SPeD•SPeD
Preview 4 out of 38 pages
Principle incident/ 
events required to be reported to DoD counterintelligence (CI) organizations espionage, 
sabotage, terrorism, cyber 
Indicators of insider threats 1. Failure to report overseas travel or contact with foreign 
nationals 
2. Seeking to gain higher clearance or expand access outside the job scope 
3. Engaging in classified conversations without a need to know 
4. Working hours inconsistent with job assignment or insistence on working in private 
5. Exploitable behavior traits 
...
![Latest Preview Thumbnail](/docpics/3623224/652c4b26ddd16_3623224_121_171.jpeg)
Responsibilities of the Government SAP Security Officer/Contractor Program Security Officer 
(GSSO/CPSO) From Revision 1 Department of Defense Overprint to the National Industrial 
Security Program Operating Manual Supplement - 1 April 2004: 
• Possess a personnel clearance and Program access at least equal to the highest level of Program 
classified information involved. 
• Provide security administration and management for his/her organization. 
• Ensure personnel processed for access to...
- Exam (elaborations)
- • 7 pages's •
-
SPeD•SPeD
Preview 2 out of 7 pages
Responsibilities of the Government SAP Security Officer/Contractor Program Security Officer 
(GSSO/CPSO) From Revision 1 Department of Defense Overprint to the National Industrial 
Security Program Operating Manual Supplement - 1 April 2004: 
• Possess a personnel clearance and Program access at least equal to the highest level of Program 
classified information involved. 
• Provide security administration and management for his/her organization. 
• Ensure personnel processed for access to...