Operations Security Flashcards

1
Q

What are the five steps to the US government operations security process?

A
  1. Identification of critical information
  2. Analysis of threats
  3. Analysis of vulnerabilities
  4. Assessment of risks
  5. Application of countermeasures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe step one of US government operations security process.

A

ID of critical information
ID assets that would cause you the most harm if exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe step 2 of the US government operations security process.

A

Analysis of threats
Evaluate harm cause if critical information were exposed and who might exploit that exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When should the analysis of threats be repeated?

A

For each:
item of critical information
party that might take advantage of it
use they might make of that information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the third step of US government operations security process.

A

Analysis of vulnerabilities
Analyze vulnerabilities in the protections you’ve put in place to secure your information
Look at how you interact with these assets and what areas an attacker might target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are countermeasures?

A

Measure to mitigate risk.
Need to mitigate either threat or vulnerability at a minimum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the first law of operations security?

A

If you don’t know the threat, how do you know what to protect?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the second law of operations security?

A

If you don’t know what to protect, how do you know you are protecting it?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the third law of operations security?

A

If you are not protecting [the information], … THE DRAGON WINS!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who wrote the laws of operations security?

A

Kurt Haase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is Sun Tzu relevant to operations security?

A

Wrote Art of War
Had operations security principles in it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is George Washington relevant to operations security?

A

Small items can have importance when used in combination
Need to keep intelligence operations secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is the Vietnam War relevant to operations security?

A

Study, Purple Dragon, to stop info leak
Coined term “operations security” (OPSec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is competitive intelligence?

A

Conducting intelligence gathering and analysis to support business decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly