Loading [MathJax]/extensions/tex2jax.js

Why did Sarah report the request to submit a paper …

Computers and Technology Questions

Why did Sarah report the request to submit a paper on satellite technology? (Select all that apply) A. To verify that she can submit all requested information. B. It is her company’s responsibility to decline the request. C. This request could be an adversary’s attempt to collect information. D. Only her company can submit the requested information.

Short Answer

Sarah should first verify submission information to prevent accidental disclosure of sensitive data, assess potential risks associated with the request, and ultimately report it to the appropriate authorities to protect national security. This includes checking the type of information requested, identifying the requester, and documenting all related correspondence.

Step-by-Step Solution

Step 1: Verify Submission Information

Before proceeding with the request, Sarah must ensure that she can submit all the required information. This step is crucial because it helps prevent the accidental disclosure of any classified or sensitive information. Sarah should verify the following items:

  • Check the type of information requested.
  • Assess whether any data is classified.
  • Review the submission guidelines thoroughly.

Step 2: Identify Potential Risks

Sarah should recognize that the request might serve as an opportunistic move by an adversary attempting to gather sensitive information. Understanding this risk helps to bolster her vigilance in handling the request. She should consider:

  • Who is making the request?
  • What specific information is being sought?
  • The potential implications of sharing this information.

Step 3: Report and Protect National Security

Given the serious nature of the request, Sarah must report it to the appropriate authorities. This action is essential for safeguarding national security and ensuring that no sensitive technology falls into the wrong hands. To effectively handle the situation, she should:

  • Document all correspondence related to the request.
  • Submit a report to her supervisor or security office.
  • Follow up to ensure appropriate measures are taken.

Related Concepts

Classified Or Sensitive Information

Data that is protected from unauthorized access, which could harm national security or individual privacy if disclosed

Risks

Potential threats or negative consequences associated with sharing sensitive information, especially from adversaries seeking to exploit vulnerabilities

National Security

The protection and preservation of a nation’s safety, sovereignty, and interests from external or internal threats, often involving sensitive information and technologies.