Chapter 7 Flashcards

1
Q

What does OPSEC stand for?

A

Operations security, known in military and government circles as OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is OPSEC?

A

a process that we use to protect our information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the use of _______ to protect data is only a small portion of the entire operations security process

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to George Washington (OPSEC):

A

The foundation of OPSEC is the focus on unclassified data that when correlated becomes data that should be classified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Competitive intelligence?

A

The process of intelligence gathering and analysis in order to support business decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Competitive counterintelligence?

A

Protecting a company against the competitive intelligence collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 5 steps of OPSEC?

A

1) Identify Critical Information
2) Analyze Threat
3) Analyze Vulnerability
4) Assess Risk
5) Apply Countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identification of critical information involves…

A

Identify the most critical information assets, which may depend on the organization or business type (We need to protect those assets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Analysis of Threats:

A

1) A threat is something that has the potential to cause us harm
2) What harm or financial impact might be caused by critical information being exposed, and who might exploit the exposure
3) Each critical item of information must be analyzed•Consider each competitor and use of our information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Example of a Software company (analyze threat):

A

Critical information: our source code

Threats: exposure to attackers (may create fake license keys) and competitors (may copy our features)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Analysis of vulnerabilities:

A

Vulnerabilities are weaknesses that can be used to harm our information assets

Thus, we will be looking at how the processes that interact with these assets are conducted, and where we might attack in order to compromise them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Example of a Software company (vulnerabilities):

A

oIt is possible to access, copy, delete, or alter the source code without any authorization, but accessing OS or Net

oNo policies on how the source code should be stored and protected

oNo infrastructure or skills to determine the damage in the case of a compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Assessment of risks:

A

Risk occurs when we have a matching threat and vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Example of a Software company (assessment of risk):

A

Treat: our source code might be exposed to our competitors or attackers

Vulnerability: Poor set of security controls

These two matching issues create risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Application of countermeasures:

A

To mitigate risk we may deploy countermeasures

Atleast we need to mitigate either the threat or the vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Example of a Software company (Application of countermeasures):

A

Threat: our source code might be exposed to our competitors or attackers

Vulnerability: Poor set of security controls

Countermeasures: not much on threats but put measures in place to mitigate the vulnerability

We may improve access control and corresponding access policy

17
Q

The entire OPSEC process is _____

A

iterative

Consider environment and factors cgange

18
Q

We may introduce an additional step in the OPSEC process:

A

an evaluation of the effectiveness of our countermeasures

19
Q

Haas’ First Law:

A

First law: “If you don’t know the threat, how do you know what to protect?”

You need to know both the actual and potential threats that your critical data may face

Thus, matches with the 2ndstep of OPSEC process

Each item of information may have a unique set of threats and may have multiple threats, each from a different source

Threats may be location dependent because of corresponding laws and access control policies

20
Q

Haas’ Second Law:

A

Second Law: “If you don’t know what to protect, how do you know you are protecting it?”

We need to evaluate our information assets to determine what exactly we might consider to be our critical information

Thus, matches to the first step in the operations security process

In the vast majority of government environments, identification and classification of information is mandated

For example, document or file can have a label such as classified, top secret, and so forth

The practice of information classification is not common outside government organizations

21
Q

Haas’ Third Law:

A

“If you are not protecting it (the information), . . . THE DRAGON WINS!”

This law is an overall reference to the necessity of the operations security process

Security breach could be the result of simple carelessness and noncompliance with the most basic security measures and due diligence

Example: oData breach occurred at Stanford University in 2013 simply because the sensitive data was on an unencrypted laptop

22
Q

Operations security in our personal lives

A

When we are away from home for a couple of weeks, we have have following indicators that the house is unoccupied and vulnerable:

No lights on at night

Told everyone on Facebook we were going

Posts to twitter while we are on vacation about what we are doing

No noise coming from the house when we would normally be home

Newspapers building up in the driveway or stopped

Mail building up in the mailbox

No car in the driveway

No people coming and going•We may take some security measures to protect our assets.

23
Q

Personal Information Protection

A

o Exposing geographical location to social media oIs not a good practice from security perspective
(•Personal information may flow across the networks)

o We may always not have control where our information will be exposed
(•We may try to monitor or follow the updates of our information)
(•Report any breaches to respective authority)
(•Revise security measures and policies)
(•In my opinion: we can follow OPSEC process to protect our personal information)

24
Q

The operational security principles can be found…

A

In the writings of Sun Tzu in the sixth century BC, in the words of George Washington, in writings from the business community, and in formal methodologies from the US government

25
Q

Sheer volume of our personal information moves through a variety of systems and networks and…

A

we need to identify critical information and planning out measures to protect it

26
Q

The Laws of OPSEC was developed by

a. George Washington
b. Sun Tzu
c. Benjamin Franklin
d. Kurt Haas

A

d.Kurt Haas

27
Q

Are steps of operation security process useful for protecting personal data?

a. Yes
b. No
c. They are not relevant.

A

a.Yes

28
Q

When do we deploy countermeasures?

a. After identification of information leakage
b. After identification of critical information
c. After locating risks
d. None of the above

A

c.After locating risks

29
Q

What is the purpose of competitive intelligence?

a. Supports business decisions
b. Support artificial intelligence
c. Provides intelligence in battle
d. All of the above

A

a.Supports business decisions

30
Q

What is the first law of OPSEC?

A

Answer: “If you don’t know the threat, how do you know what to protect?”

31
Q

Why might we want to use information classification?

A

Answer: Information classification is important to identify critical information

32
Q

Why we need to go through the OPSEC process more than once?

A

Answer: OPSEC process is an iterative process, which needs more than one cycle to accommodate any changes in environments, policies, and other factors

33
Q

A ____ is something that has the potential to cause us harm

A

threat

34
Q

_________ are weaknesses that can be used to harm our information assets

A

Vulnerabilities