Cyber intrusions are any unauthorized acts of criminal intent by using electronic materials such as laptops, personal computers, and wireless devices via hacks and bits of malicious code to obtain classified and unclassified information.
Suspicious Indicators
Countermeasures
The following is a list of suspicious indicators related to network activity and cyber intrusions:
– Unauthorized system access attempts
– Unauthorized system access to or disclosure of information
– Any acts that interrupt or result in a denial of service
– Unauthorized data storage or transmission
– Unauthorized hardware and software modifications
– E-mails received from unknown senders (that include social engineering attempts such as phishing)
The following countermeasures can be taken by cleared defense contractors to guard against this collection method:
– Comply with the measures in your company’s Technology Control Plan (TCP)
– Conduct frequent computer audits
– Do not rely on firewalls to protect against all attacks
– Report intrusion attempts
– Avoid responding to any unknown request and report these requests
– Disconnect computer system temporarily in the event of a severe attack
PCL employees might encounter additional security procedures and/or duties applicable to their job.
Examples include the following: