7) Operations Security Flashcards

1
Q

A formal methodology of operations security.

A

OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk can be higher when ___ services are used for computing operations.

a) competitive intelligence
b) auditing
c) OPSEC
d) cloud computing

A

d) cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process we use to protect our information.

A

OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OPSEC is the process we use to protect our information. What does OPSEC stand for?

A

Operations security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Chinese military general who lived in the sixth century BC and wrote The Art of War, a text that shows early examples of operations security principles.

A

Sun Tzu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The codename of a study conducted to discover the cause of an information leak during the Vietnam War. It’s now a symbol of OPSEC.

A

Purple Dragon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of intelligence gathering and analysis in order to support business decisions.

A

Competitive intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the five steps of the operations security process.

A

1) Identification of critical information
2) Analysis of threats
3) Analysis of vulnerabilities
4) Assessment of risks
5) Application of countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Haas’ Laws of Operations Security: The First Law

A

If you don’t know the threat, how do you know what to protect?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Haas’ Laws of Operations Security: The Second Law

A

If you don’t know what to protect, how do you know you are protecting it?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Haas’ Laws of Operations Security: The Third Law

A

If you are not protecting it, the dragon wins!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refers to services that are hosted, often over the Internet, for the purpose of delivering easily scaled computing services or resources.

A

Cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The first step in the OPSEC process, and arguably the most important: to identify the assets that most need protection and will cause us the most harm if exposed.

A

Identification of critical information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The second step in the OPSEC process: to look at the potential harm or financial impact that might be caused by critical information being exposed, and who might exploit that exposure.

A

Analysis of threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The third step in the OPSEC process: to look at the weakness that can be used to harm us.

A

Analysis of vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The fourth step in the OPSEC process: to determine what issues we really need to be concerned about (areas with matching threats and vulnerabilities.

A

Assessment of risks

17
Q

The fifth step in the OPSEC process: to put measures in place to mitigate risks.

A

Application of countermeasures

18
Q

The study that was conducted to discover the cause of the information leak during the Vietnam War was codenamed ___ and is now considered a symbol of OPSEC.

A

Purple Dragon

19
Q

The process of intelligence gathering and analysis to support business decisions is known as ___.

A

competitive intelligence

20
Q

Haas’ second law of operations security, “If you don’t know what to protect, how do you know you are protecting it?,” maps to what step in the operations security process.

A

Identification of critical information

21
Q

You are leaving for an extended vacation and want to take steps to protect your home. You set a timer to turn lights and the TV on and off at various times throughout the day, suspend the mail delivery, and arrange for a neighbor to come in and water the plants. What step in the operations security process do these actions demonstrate?

A

Application of countermeasures

22
Q

During what phase of the operations security process do we match threats and vulnerabilities?

A

Assessment of risks