Introduction to Information Security IF011.16

What are the steps of the Information Security Program lifecycle?

Classification, safeguarding, dissemination, declassification, and destruction

Which volumes of DODM 5200.01 provide guidance and direction on classification management, marking, protection, and handling requirements for classified information?

Volume 1, 2, 3

Unauthorized disclosure could reasonably be expected to cause serious damage to our national security

Secret

Unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to our national security

Top Secret