Preview

SSD2 Module 1 Notes

Good Essays
Open Document
Open Document
31209 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SSD2 Module 1 Notes
MODULE 01 NOTES
SOP- STANDARD OPERING PROCEDURE
Determine the SOP purpose and target audience for distribution.
Uniforms
Your reference will be Local Policy, AR 670-1
Leaves and Passes
Your reference will be AR 600-8-10
Motor Stables
Your reference will be DA Pam 750-1
Key Control
Your reference will be AR 190-51, 190-11, 735-5
References
Citations must be accurate and thorough-title, type, number, and date of publication; online links if appropriate; and identifying information for correspondence or meetings.
Purpose
A brief statement that outlines the purpose of the SOP, describing its function, applicability, and objective.
Summary
A few sentences summarizing the content. Though placed near the beginning, it should be composed last.
Scope
To whom the SOP applies, and possibly under what conditions or circumstances.
Definitions
Sometimes needed to explain terms new to readers or to interpret acronyms.
Responsibilities
Brief, descriptive sentences telling exactly who is responsible to ensure what outcomes or provide what resources.
Procedures
An orderly system of specific actions taken to carry out an assignment including: who, what, when, how, and why regarding tasks to be performed, as well as expected outcomes.
Files
Any additional information needed to clarify procedures in the SOP, if necessary.
Top Secret
You will apply a TOP SECRET classification to an SOP in which the unauthorized disclosure of its contents could reasonably be expected to cause exceptionally grave damage to the nation 's national security.
Secret
You will apply a SECRET classification to an SOP in which the unauthorized disclosure of its contents could reasonably be expected to cause serious damage to national security.
Top Secret
You will apply a TOP SECRET classification to an SOP in which the unauthorized disclosure of its contents could reasonably be expected to cause exceptionally grave damage to the nation 's national security.
Secret
You will apply a SECRET classification to an SOP

You May Also Find These Documents Helpful

  • Better Essays

    TM 9 1015 252 10 M119A2

    • 61728 Words
    • 488 Pages

    and that the information will be provided substantially the same degree of security afforded it by the Department of Defense of the United…

    • 61728 Words
    • 488 Pages
    Better Essays
  • Satisfactory Essays

    |contain highly sensitive information about the services users. Sharing confidential information may make the service user feel |…

    • 9981 Words
    • 40 Pages
    Satisfactory Essays
  • Good Essays

    Insecure information can lead to violation of an individual’s human civil rights that may results in neglect/or physical, sexual, emotional or financial harm.…

    • 981 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    Confidential- This is the lowest classification level of information obtained by the government. It is defined as information that would "damage" national security if publicly disclosed, again, without the proper authorization.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Threat identification. That is, give a detailed description of the incident and how it is an HS concern.…

    • 715 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Public organizations, generally providing essential services such as health, education, social services, policing. They are responsible to central government and those who run them are accountable to the public (Taylor and Wilkinson, 2012). The nature of their funding (taxpayers) requires them to prove their responsibility with the public money. Their HR department tend to be large and able to provide HR specialist support in different areas. Because of…

    • 2759 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Pam 5c

    • 55363 Words
    • 222 Pages

    This document is issued for the information of such persons who need to know its contents in the course of their official duties. Any person finding this document should hand it into a British Forces unit or to a British police station for its safe return to the MINISTRY OF DEFENCE, D MOD SY, LONDON SW1A 2HB, with particulars of how and where found. THE UNAUTHORIZED RETENTION OR DESTRUCTION OF THIS DOCUMENT COULD BE AN OFFENCE UNDER THE OFFICIAL SECRETS ACTS OF 1911–1989.…

    • 55363 Words
    • 222 Pages
    Powerful Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    * Prioritize classified risks, threats, and vulnerabilities according to the defined qualitative risk assessment scale…

    • 719 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Price, D. (1999). Questions and answers about security categorization. Retrieved February 5, 2003, from http://www.postcardsfromprison.com/research/catsecfq.htm…

    • 2731 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    2. Using the seminar case; list some of the security breaches being practiced by the employees at the agency.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is4550 Week5 Assignment1

    • 282 Words
    • 3 Pages

    your organization as management is thinking about this as a possible response to recent security…

    • 282 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Clearance Info

    • 8089 Words
    • 33 Pages

    The Defense Industrial Security Clearance Office (DISCO) is part of the Defense Security Service (DSS), an…

    • 8089 Words
    • 33 Pages
    Powerful Essays
  • Satisfactory Essays

    form 1

    • 430 Words
    • 2 Pages

    The form also speaks about Vishing as a classified remote exploit because it exploits the security vulnerability without prior access to the system. When attackers take advantage of an exploit one of their first goals is to gain administrator or superuser, one of the programs they use is called coreflood, is a superuser and a records keystrokes and capture screen information including passwords.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    one or more known instances of working and fully implemented attacks is classified as an…

    • 653 Words
    • 4 Pages
    Good Essays

Related Topics