.
Air publication for information management of air
Air publication for Information management
Air publication for general management
Air publication for Information exploitation
Information management
Information exploitation
Information governance
Information assurance
Information Damage
Information Power
Information provider
Information technology
Information systems
Data
Information
Knowledge
Wisdom
Power
Records
Cloud
Skill
Data Protection Act
Freedom of Information Act
Public Records Act
Official Secrets Act
Regulation of Investigatory powers Act
Information management Act
Data Knowledge Act
Freedom of records Act
JSP for information management
JSP for Information management in an air environment
JSP for Information assurance
JSP for Infomation gathering
Data about data
Data about information
Data about records
Data about metadata
Legally held and used
Correctly labelled and stored
Readily available in a helpful format to those who should have access to it
Securely protected from those who should not have access to it
Preserved for an appropriate period of time
Monitored and audited when required
Easy to access
Ready to use by anyone
Easy to edit
Easy to delete/remove
Official
Official sensitive
Secret
Top Secret
Personal
Commercial
Locsen
Confidential
Company
Colsec
Group
Partial
Sensitive
Location
Author
Weather conditions
Time of day
Data
File Contents
Amount of people
Password
A finished log of data that tells a story or has long or short term value to an organisation
A finished log of data that tells a story or has long term value to an organisation
A finished log of Information that tells a story or has long term value to an organisation
A finished log of infomation that tells a story or has short term value to an organisation
Documents
CD’s
DVD’s
USB’s
Letters
PC files
Spoken information
File transfer through PC
Bluetooth
MODNET Documents
If the file is 1 inch thick
If it contains 100 enclosures
If the file has been opened for 5 years
If nothing has been added to the file for 1 year
Action on the subject has come to an end
If the file has been tampered with
If someone wants the file destroyed
If the file is dropped
If the folder isn't spoken about for 3 years
If the file starts with the letter "B"
TNA,TNT,BDFL
TMT,TNT,BDFL
TMN,TNT,BDFL
TMA,TNT,BDFL
Usually ISA’s (CPL’s and SAC’s)
Usually ISA’s (CPL’s and SGT’s)
Usually ISO’s (CPL’s and SAC’s)
Usually ISO's (CPL’s and SGT’s)
ISA
ISO
SIO
IMGR
MOD's private network
Defending Networks
Defending networks using Antivirus software
An intranet for Cypto purposes
A cloud-based information collaboration tool used for multiple purposes.
A server-based information collaboration tool used for website creation.
A cloud-based information collaboration tool used for website creation.
A server-based information collaboration tool used for multiple purposes.
Document Library
Form Library
Wiki Page Library
Picture Library
Links
Announcements
File explorer
Internet
Browser
O365
Microsoft Word
Non, major, major/minor
Small, Minor, major
Non major, major, minor
Minor, non minor, major
Data with meaning/context
Data without context/meaning
Data about data
Data about Information
SIO
IMGR
ISA
ISO
Nothing
Declare as record
Delete if not needed
Send to review board
Wait!
Here's an interesting quiz for you.