Preview

The Importance of Securing Sensitive Items

Good Essays
Open Document
Open Document
879 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Importance of Securing Sensitive Items
Sensitive items are anything that is considered classified or a mission essential item. These items can include protective gear, maps, or a piece of paper designating patrol routes. The importance of securing sensitive items comes down to maintaining accountability for operation security, mission success and a soldiers over all readiness. The habits of exercising security and accountability of a soldiers items allow the soldier and their team to operate to the highest standards or have items be accessed by an opposing adversary creating loss of overall mission success.

Operational security is a process that denied critical information to an adversary. If one were to obtain the information presented it could be used against friendly forces. Utilizing all assets to maintain and secure sensitive items and classified information promote proper operational security and soldier readiness. Not securing items of sensitive nature acquire the risk of loss by being intercepted by unauthorized persons. All personnel should maintain accountability of all sensitive material to allow full utilization by themselves and anyone involved with the mission and still maintain operational security. Operational security can be compromised through the loss of sensitive items due to loss of equipment used for operational planning, or items used for support missions. Depending on the sensitive item that is being classified it could fall under a different level of security as it is deemed by the U.S. Government. The levels included in the term classified (withheld from general circulation for reasons of national security) are RESTRICTED (public disclosure could have undesirable effects or do some harm), CONFIDENTIAL (unauthorized disclosure could damage national security e.g. compromise information that indicates the strength of armed forces or disclosure of technical information about weapons), SECRET (unauthorized disclosure could seriously damage national security) and TOP SECRET

You May Also Find These Documents Helpful

  • Good Essays

    Dave Jensen has soap, dental floss, foot powder, and vitamins. Mitchell Sanders has condoms, brass knuckles, and the unit's radio. Norman Bowker brings a diary. Kiowa carries a volume of the New Testament and moccasins. Rat Kiley brings his medical kit, brandy, comic books, and M&M's candy. In my opinion, the speaker offers additional detail about selected items; for instance, the poncho Ted Lavender carries will later be used by his fellow militaries to carry his dead body. Also, author details at great length what all the men carry: standard gear, weapons, tear gas, explosives, ammunitions, entrenching tools, starlight scopes, grenades, flak jackets, boots, rations, and the Army newsletter. They also carry their grief, terror, love, and longing, with poise and dignity. The writer extended catalog of items creates a picture in the reader's mind that grows incrementally. Lastly, I think O'Brien's technique also allows each character to be presented with a history and an exclusive place within the collection of…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Securing Military Gear

    • 5047 Words
    • 21 Pages

    The definition of sensitive items is anything that considered classified or a mission essential item. They range anywhere from protective wear, maps, patrol routes, nods (night vision goggles) or simply your weapon. The meaning of securing your sensitive items mainly is maintaining accountability for opsec (operation security), mission success and a soldiers overall readiness. If an item is lost and the enemy gets his/her hands on that item it could compromise the mission at hand or give them intelligence on the items we as soldiers use each day. Using habits and exercising the securing of sensitive items will make it possible for the soldier and his or her team to operate at the top performance. Operational security is process that denied valuable information to an enemy. If an enemy were to obtain the presented it could be used against our forces. Not securing sensitive items increases the risk of loss by being intercepted by unauthorized personnel. Every soldier must maintain accountability and positive control of all sensitive material to allow full use by them and anyone involved with the mission at hand while still maintaining operational security. Operational security can be compromised through the loss of sensitive items due to loss of equipment used for operational planning, or items used for support missions. Also depending on the type of sensitive item that is being classified it could fall under a different level of security as it is deemed so by the U.S. Government. The levels included in the term classified are restricted (public disclosure could have undesirable effects or do some harm), confidential (unauthorized disclosure could damage national security example would be compromising information that indicates the strength of armed forces or disclosure of technical information about weapons), secret (unauthorized disclosure could seriously damage national security) and top secret (unauthorized disclosure could…

    • 5047 Words
    • 21 Pages
    Good Essays
  • Satisfactory Essays

    Safeguarding Case Study

    • 378 Words
    • 2 Pages

    Therefore, it is Chris’s duty as a teaching assistant to follow the procedures regarding suspected abuse.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Physical Security

    • 272 Words
    • 2 Pages

    This paper is to outline Riordan Manufacturing’s existing Information Security Systems, determine their weaknesses, and develop solutions to those weaknesses by addressing security issues in the areas of physical, network, data, and the web.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This essay is written in accordance with the corrective measures given by the issued red chit. In this essay, I will discuss a few of the many important points of why a police officer should make sure his/her equipment is secure.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In this paper, I will give the Department of Defense (DoD) definition of accountability and responsibility while explaining the importance of maintaining positive physical security of a Common Access Card (CAC) which is a piece of the “intelligence puzzle” and vital to Operational Security (OPSEC). The paper will give examples of how the lack of positive security of a CAC can, not only, diminish a soldier’s ability to perform daily tasks, but also limit their access to information pertinent to the mission at hand.…

    • 743 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It is important to keep track of sensitive items and documents for many reasons that could hinder you and/ or your comrades. I myself left my Military Identification Card behind during a weight and tape test. But many other things can be left behind and compromise your security, operations, life, or the lives of others.…

    • 877 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Securing sensitive items

    • 542 Words
    • 3 Pages

    Another basic sensitive item that all soldiers are assigned is their gear. Most soldiers probably still remember their drill sergeants telling then to never leave their gear behind. If during a firefight you shouldn't just leave an empty magazine on the ground or leave you battle buddies weapon on the ground because he was wounded. You should always take it with you if possible, the reason being is because if no matter how small or insignificant it may seem every piece of gear we're issued can be turned against us. Something like a pistol might not seem like much but if your team member is wounded and you leave something like an AT-4 behind it could be fired at a convoy and then turned into an IED.…

    • 542 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Physical Security

    • 2606 Words
    • 11 Pages

    Risk assessment and physical security survey of any building is critical in order minimize to the venerability of being put to risk due to failure to install or put the necessary mechanism to curb such potential. There is a need for thorough analysis on the risk assessment and physical survey on implementation of practices, principles and procedures in installation security measures.…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    |contain highly sensitive information about the services users. Sharing confidential information may make the service user feel |…

    • 9981 Words
    • 40 Pages
    Satisfactory Essays
  • Good Essays

    P2: Describe how physical security measures can help keep systems secure Physical security measures are actions, which are only taken by an organisation or a private individual to keep every single piece of software and hardware in an undoubtable safe position. However, these measures are most of the times used to make the best protection as it can be from physical actions. It can be anything from small locks to more technical devices like biometric scanners or CCTV. Bigger number of systems if not every single one is secured with anti-virus software and firewalls but they would absolutely not be helpful if someone would enter the right room and delete or do any other damage to data. Nowadays, there is a lot of different measures available.…

    • 1153 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    While both of the above elements of the question complement each other, without understanding the main purpose of security management, which is in itself is multifaceted in nature, and ideally to be successful should be employed throughout all aspects of a business, as can be seen…

    • 1598 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Security

    • 257 Words
    • 2 Pages

    Defining National Security VS Personal Privacy is a matter of looking at the basic nature of each. From research collected there is a consensus that we need balance. Too much of one hurts the other and vise versa. There are a couple of articles that range from Civil Liberties to the birth of public right to know that support the overall claim. Talks about the effects of censorship in different situations like war and peace will help prove that a balance needs to be forged. The problem here isn’t the definition of personal vs national security, but the survival of each in light of each other. There is history in our nation that explains why impinging on privacy may not be in the best interest of national security or of an individual. Also we will look at when it is appropriate for national security to impinge on personal privacy. You can’t have both without upsetting the balance of all. The claim is that too much national security will limit or demolish personal privacy. Also the same for too much personal privacy or liberty will limit or demolish security. So the question would be “does less personal privacy increase National Security?” My thesis is that too much National Security can destroy a government from the inside out by invading privacy. Democracy can’t trample on freedoms given the people for fear that a democracy no longer exists. “As Lee Strickland (2005) indicates, that ‘Civil liberties are not an obstacle; they’re a vital part of our strength.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays