Chapter 7 Flashcards
What does OPSEC stand for?
Operations security, known in military and government circles as OPSEC
What is OPSEC?
a process that we use to protect our information
the use of _______ to protect data is only a small portion of the entire operations security process
encryption
According to George Washington (OPSEC):
The foundation of OPSEC is the focus on unclassified data that when correlated becomes data that should be classified
What is Competitive intelligence?
The process of intelligence gathering and analysis in order to support business decisions
What is Competitive counterintelligence?
Protecting a company against the competitive intelligence collection
What are the 5 steps of OPSEC?
1) Identify Critical Information
2) Analyze Threat
3) Analyze Vulnerability
4) Assess Risk
5) Apply Countermeasures
Identification of critical information involves…
Identify the most critical information assets, which may depend on the organization or business type (We need to protect those assets)
Analysis of Threats:
1) A threat is something that has the potential to cause us harm
2) What harm or financial impact might be caused by critical information being exposed, and who might exploit the exposure
3) Each critical item of information must be analyzed•Consider each competitor and use of our information
Example of a Software company (analyze threat):
Critical information: our source code
Threats: exposure to attackers (may create fake license keys) and competitors (may copy our features)
Analysis of vulnerabilities:
Vulnerabilities are weaknesses that can be used to harm our information assets
Thus, we will be looking at how the processes that interact with these assets are conducted, and where we might attack in order to compromise them
Example of a Software company (vulnerabilities):
oIt is possible to access, copy, delete, or alter the source code without any authorization, but accessing OS or Net
oNo policies on how the source code should be stored and protected
oNo infrastructure or skills to determine the damage in the case of a compromise
Assessment of risks:
Risk occurs when we have a matching threat and vulnerability
Example of a Software company (assessment of risk):
Treat: our source code might be exposed to our competitors or attackers
Vulnerability: Poor set of security controls
These two matching issues create risk
Application of countermeasures:
To mitigate risk we may deploy countermeasures
Atleast we need to mitigate either the threat or the vulnerability