3. Security Flashcards
(81 cards)
OPSEC
Operations Security - Process you use to protect your information
Steps of OPSEC (5)
- Identification of critical info (identify the assets that would cause you the most harm if exposed)
- Analysis of threats (analyze any threats related to each critical info)
- Analysis of vulnerabilities (analyze the vulnerabilities int he protections you’ve put in place to secure your info assets. HOW YOU INTERACT W/ ASSETS)
- Assessment of risks (what issues you need to address in the rest of the ops sec process. RISK OCCURS WHEN YOU HAVE A MATCHING THREAT AND VULNERABILITY)
- Application of COUNTERMEASURES (when you construct countermeasures for a risk, you need to mitigate either the threat or the vulnerability at a min)
Laws of OPSEC - Kurt Haase (3)
- Know the threats “If you don’t know the threat, how do you know what to protect?”
- Know what to protect (determine critical info)
- Protect the information
Purple Dragon
Code study during the Vietnam War. Coined the term OPSEC
Competitive Intelligence
Conducting intelligence gathering and analysis to support business decisions
Competitive Counterintelligence
Managing info gathering activities directed at an organization
OpSEC Support Staff (IOSS)
Provide multiple agencies w/ a wide variety of security awareness and trainings
Social engineering attacks
manipulate people to gain info/access to facilities
HUMINT
Human Intelligence - gathered by talking to people, torture, tricking people w/ scams
OSINT
Open Source Intelligence - info collected from publicly available sources
Metadata
Data about data found in almost any file
Ex forensic tool: EnCase
EXIF data
Image/video file metadata
Shodan
Search engine of service banner which are metadata that the server sends back to the client.
Web based search engine that looks for info saved on internet connected devices.
FTP
File Transfer Protocol
GEOINT
Geospatial info from satellites
MASINT
Measurement and signature from sensors
RADINT
Radar info
TECHINT
Technical info about equipment, tech, and weapons
FININT
Financial info about financial dealings
CYBINT/DNINT
Cyber/Digital Network info from comp systems/networks
Pretexting
Social engineering attack that utilizes credible scenarios to lure people into disclosing sensitive info
Phishing
Social engineering technique that uses electronic communications to carry out an attack that is broad in nature
Tailgating
Following someone through an access control point
Malware
Application that makes unauthorized changes to a device