Introduction to Information Security IF011.16
What are the steps of the Information Security Program lifecycle?
Classification, safeguarding, dissemination, declassification, and destruction
Which volumes of DODM 5200.01 provide guidance and direction on classification management, marking, protection, and handling requirements for classified information?
Volume 1, 2, 3
Unauthorized disclosure could reasonably be expected to cause serious damage to our national security
Secret
Unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to our national security
Top Secret