7) Operations Security Flashcards
A formal methodology of operations security.
OPSEC
Risk can be higher when ___ services are used for computing operations.
a) competitive intelligence
b) auditing
c) OPSEC
d) cloud computing
d) cloud computing
The process we use to protect our information.
OPSEC
OPSEC is the process we use to protect our information. What does OPSEC stand for?
Operations security
A Chinese military general who lived in the sixth century BC and wrote The Art of War, a text that shows early examples of operations security principles.
Sun Tzu
The codename of a study conducted to discover the cause of an information leak during the Vietnam War. It’s now a symbol of OPSEC.
Purple Dragon
The process of intelligence gathering and analysis in order to support business decisions.
Competitive intelligence
Name the five steps of the operations security process.
1) Identification of critical information
2) Analysis of threats
3) Analysis of vulnerabilities
4) Assessment of risks
5) Application of countermeasures
Haas’ Laws of Operations Security: The First Law
If you don’t know the threat, how do you know what to protect?
Haas’ Laws of Operations Security: The Second Law
If you don’t know what to protect, how do you know you are protecting it?
Haas’ Laws of Operations Security: The Third Law
If you are not protecting it, the dragon wins!
Refers to services that are hosted, often over the Internet, for the purpose of delivering easily scaled computing services or resources.
Cloud computing
The first step in the OPSEC process, and arguably the most important: to identify the assets that most need protection and will cause us the most harm if exposed.
Identification of critical information
The second step in the OPSEC process: to look at the potential harm or financial impact that might be caused by critical information being exposed, and who might exploit that exposure.
Analysis of threats
The third step in the OPSEC process: to look at the weakness that can be used to harm us.
Analysis of vulnerabilities