Search results
Results From The WOW.Com Content Network
There are three levels of DoD security clearances: [3] TOP SECRET – Information of which the unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. SECRET – Information of which the unauthorized disclosure could reasonably be expected to cause serious damage to the national security.
Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: Confidential, Secret, and Top Secret. Each level of classification indicates an increasing degree of sensitivity.
A United States security clearance is an official determination that an individual may access information classified by the United States Government.Security clearances are hierarchical; each level grants the holder access to information in that level and the levels below it.
The purpose of classification is to protect information. Higher classifications protect information that might endanger national security.Classification formalises what constitutes a "state secret" and accords different levels of protection based on the expected damage the information might cause in the wrong hands.
National Security Clearances are a hierarchy of levels, depending on the classification of materials that can be accessed—Baseline Personnel Security Standard (BPSS), Counter-Terrorist Check (CTC), Enhanced Baseline Standard (EBS), Security Check (SC), enhanced Security Check (eSC), Developed Vetting (DV), enhanced Developed Vetting (eDV), and STRAP.
Authorized Classification and Control Markings Register Version 1.2, 12 May 2008; DCID 3/29, Controlled Access Program Oversight Committee, 2 June 1995; DOD 5220.22-M, National Industrial Security Program Operating Manual (NISPOM), 28 February, 2006; DODD 5200.1-R, Information Security Program, January 1997
The security policy must be explicit, well-defined, and enforced by the computer system. Three basic security policies are specified: [6] Mandatory Security Policy – Enforces access control rules based directly on an individual's clearance, authorization for the information and the confidentiality level of the information being sought.
ICPG 704.1, Personnel Security Investigative Standards and Procedures Governing Eligibility for Access to Sensitive Compartmented Information and Other Controlled Access Program Information, 2 October 2008; Intelligence Community Authorized Classification and Control Markings Register and Manual v5.1, 30 March 2012