4.1 Operations Security (OPSEC) Flashcards

1
Q

Why is it important to identify your critical information?

A

So you are applying the right level of opsec to critcal info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the first law of OPSEC?

A

By Kurt Haase, “ If you don’t know the threat, how do you know what to protect?”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the second law of OPSEC?

A

If you don’t know what to protect, how do you know you are protecting it?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the third law of OPSEC?

A

By Kurt Haase, “If you are not protecting [the information]…..the dragon wins!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of the IOSS?

A

Training and OPSEC Awareness - Interagency OPSEC Support Staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What part did George Washington play in the creation of operations security?

A

Understood that when small pieces of seemingly useless information is combined, it can become dangerous. (name, address, social sec number).
-Also understood importance of secrecy and establishing an intelligence gathering program, which he started.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the operations security process, what is the difference between assessing threats and assessing vulnerabilities?

A

Vulnerabilities are the gaps in infrastructure that a threat(or malicious event) could occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why might you want to use information classification?

A

This process helps to know what you have to protect, so you can actually protect it. Relates to the second Law and 1st step of the OPSEC cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When you have cycled through the entire operations security process, are you finished?

A

No this is an iterative process that takes repeating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

From where did the first formal OPSEC methodology arise?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the origin of operations security?

A

-During the Vietnam War - military realized spies were relaying troop movement. A survey was conducted to determine information lost and determined vulnerability. Coined OPSEC.
-Also Sun Tzu in the Art of War provides earliest OPSEC principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define competitive intelligence?

A

-Used in Business industry
-Gathering and analyzing intelligence to assist business decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define competitive counterintelligence?

A

Opposite of competitive intelligence - employing OPSEC principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operations security (OPSEC) is a risk management process that involves the ___________ of critical information, analysis of ___________and _________, _________assessments, and the application of _________. It aims to protect sensitive information from _________ and __________.

A

identification; threats and vulnerabilities; risk ; countermeasures

unauthorized access and disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Haas’s Laws of OPSEC underline the fundamental principles such as…(2 statements.

A

“If you don’t know the threat, how do you know you’re secure?” and “Security is a state of mind.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

-Finding potential threats and vulnerabilities is called?
-Assessing the level and impact of risks is called?
-Applying countermeasures to reduce risks is called?

A
  • Risk Identification:
  • Risk Analysis:
  • Risk Mitigation:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Identify the Layers of a Defense-in-Depth Strategy (3x)

A

Physical Controls: Access controls, surveillance cameras.
Logical Controls: Firewalls, encryption.
Administrative Controls: Policies, employee training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Compare Abilities of Physical, Logical, and Administrative Controls. What are each best for?

A
  • Physical: Best for deterring unauthorized physical access.
  • Logical: Effective for securing data and networks.
  • Administrative: Helpful for creating a security-aware culture.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Categorize Cybersecurity Principles According to Area of Impact
* Data Protection:
* Network Security:
* User Authentication:

A
  • Data Protection: Encryption, backups.
  • Network Security: Firewalls, VPNs. * User Authentication: MFA, strong passwords.
20
Q

What kind of attack does Encrytion mitigate?

A

Interception

21
Q

What type of attack do Firewalls protect against?

A

Mitigate interruption

22
Q

What do digital signatures mitigate?

A

fabrication and modification.

23
Q

Classify Attacks According to Cybersecurity Concept Violated- Phishing

A

Violates user authentication.

24
Q

Classify Attacks According to Cybersecurity Concept Violated- DDoS

A

Violates availability

25
Q

Classify Attacks According to Cybersecurity Concept Violated- Data Breach

A

Confidentiality

26
Q

Identify Cybersecurity Concepts that Protect Critical Information (3x)

A
  • Data Encryption * Firewalls * Multi-factor Authentication
27
Q

Identify Types of Assets or Resources that Can be Secured

A
  • Hardware: Servers, workstations. * Software: Applications, databases. * Data: Files, intellectual property.
28
Q

Categorize Security Principles According to Type of Asset Needing Protection - Software

A

Logical Controls

29
Q

Categorize Security Principles According to Type of Asset Needing Protection - Hardware

A

Physical Controls

30
Q

Categorize Security Principles According to Type of Asset Needing Protection - data

A

logical and administrative controls

31
Q

Classify Threats and Attacks According to CIA Triad
* Interception:

A
  • Interception: Targets confidentiality.
32
Q

Classify Threats and Attacks According to CIA Triad
* Interruption:

A
  • Interruption: Targets availability.
33
Q

Classify Threats and Attacks According to CIA Triad
* Modification:

A
  • Modification: Targets integrity.
34
Q

Classify Threats and Attacks According to CIA Triad
* Fabrication:

A
  • Fabrication: Targets both integrity and authenticity
35
Q

Categorize Control Mechanisms
* Physical Controls

A
  • Physical Controls: Mitigate risks of unauthorized physical access.
36
Q

Categorize Control Mechanisms
* Logical Controls

A
  • Logical Controls: Mitigate risks of data breaches.
37
Q

Categorize Control Mechanisms
* Administrative Controls

A
  • Administrative Controls: Mitigate risks of human error.
38
Q

Align Types of Attacks to the Legs of the CIA Triad * Violates confidentiality.

A

Interception:

39
Q

Align Types of Attacks to the Legs of the CIA Triad* : Violates availability.

A

Interruption

40
Q

Align Types of Attacks to the Legs of the CIA Triad* : Violates integrity.

A

Modification

41
Q

Align Types of Attacks to the Legs of the CIA Triad* : Violates integrity and can lead to false data becoming available.

A

Fabrication

42
Q

What is a threat?

A

Identification of what harm to the company can occur if important information is released.

43
Q

What describes risk assessment?

A

Risk occurs when there is a matching threat and vulnerability. A risk assessment determines which risks require concern during the operations security process.

44
Q

What is the responsibility of the Cybersecurity and Infrastructure Security Agency (CISA).

A

Lead the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure.

45
Q
A
46
Q
A
47
Q
A