C836 Ch.7 Flashcards

1
Q

Operations security (OPSEC)

A

The process we use to protect our information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sun Tzu

A

A Chinese military general who lived in the sixth century BC and wrote The Art of War, a text that shows early examples of operations security principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Purple Dragon

A

The codename of a study conducted to discover the cause of an information leak during the Vietnam War; is now a symbol of OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Competitive intelligence

A

The process of intelligence gathering and analysis in order to support business decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the five steps of the operations security process

A
  1. Identification of critical information
  2. Analysis of threats
  3. Analysis of vulnerabilities
  4. Assessment of risks
  5. Application of countermeasures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Haas’ Laws of Operations Security: The First Law

A

If you don’t know the threat, how do you know what to protect?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Haas’ Laws of Operations Security: The Second Law

A

If you don’t know what to protect, how do you know you are protecting it?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Haas’ Laws of Operations Security: The Third Law

A

If you are not protecting it, the dragon wins!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud computing

A

Refers to services that are hosted, often over the Internet, for the purposes of delivering easily scaled computing services or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identification of critical information

A

The first step in the OPSEC process, and arguably the most important: to identify the assets that most need protection and will cause us the most harm if exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Analysis of threats

A

The second step in the OPSEC process: to look at the potential harm or financial impact that might be caused by critical information being exposed, and who might exploit that exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Analysis of vulnerabilities

A

The third step in the OPSEC process: to look at the weaknesses that can be used to harm us

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Assessment of risks

A

The fourth step in the OPSEC process: to determine what issues we really need to be concerned about (areas with matching threats and vulnerabilities)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application of countermeasures

A

The fifth step in the OPSEC process: to put measures in place to mitigate risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly