Chapter 7 Flashcards

1
Q

OPSEC

A

Operations Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security and risk management process that prevents sensitive information from getting into the wrong hands

A

Operations Security (OPSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The five Operations Security Processes

A
  1. Identification of Critical Information
  2. Analysis of Threats
  3. Analysis of Vulnerabilities
  4. Assessment of Risks
  5. Application of Countermeasures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This Operations Security Process is to identify the most critical information assets

A

Identification of Critical Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Operations Security Process is the most important step?

A

Identification of Critical Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Operations Security Process is to look at what harm or financial impact might be caused by critical information being exposed, and who might exploit the exposure?

A

Analysis of Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Weaknesses that can be used to harm us

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Operations Security Process it to look at how you interact with assets and what areas an attacker might target to compromise them?

A

Analysis of Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______ occurs when there is a matching threat and vulnerabilities

A

Risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Operations Security Process is to decide what issues are needed to be addressed?

A

Assessment of Risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Operations Security Process is to put measures in place to mitigate risks?

A

Application of Countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who created the Laws of Operations Security?

A

Kurt Haase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three Laws of Operations Security?

A
  1. Know the Threat
  2. Know What to Protect
  3. Protect the Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the first law of the Laws of Operations Security?

A

Know the Threat
If you don’t know the threat, how do you know what to protect?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the second law of the Laws of Operations Security?

A

Know what to Protect
If you don’t know what to protect, how do you know you are protecting it?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the third law of the Laws of Operations Security?

A

Protect the Information
If you are not protecting “it”, The Dragon Wins