Operations Security (OPSEC) Flashcards

1
Q

Identification of Critical Information, Analysis of Threat, Analysis of Vulnerabilities, Assessment of Risks, Application of Countermeasures

Operations Security (OPSEC)

A

FIVE STEP OPSEC PROCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Info in need of protection and analyzes how that Information may be inadvertently compromised

EEFI - Essential Elements of Friendly Information - personnel rosters, unmarked vehicles, equipment, frequencies, capabilities

Operation/mission sensitive information - current operations, suspects, informants, warrants, location of operations, surveillance

Identification of Critical Information, Analysis of Threat, Analysis of Vulnerabilities, Assessment of Risks, Application of Countermeasures

Operations Security (OPSEC)

A

IDENTIFICATION OF CRITICAL INFORMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intent and Capability

Ways to gather - communication, imagery, trash, open-source, human, computer accessing

Identification of Critical Information, Analysis of Threat, Analysis of Vulnerabilities, Assessment of Risks, Application of Countermeasures

Operations Security (OPSEC)

A

ANALYSIS OF THREAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To use the information that has been collected in attempt to utilize the information against us

Critical information posted on the internet, non-secure communication

Identification of Critical Information, Analysis of Threat, Analysis of Vulnerabilities, Assessment of Risks, Application of Countermeasures

Operations Security (OPSEC)

A

ANALYSIS OF VULNERABILITIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Determined the threat, vulnerability and impact

Identification of Critical Information, Analysis of Threat, Analysis of Vulnerabilities, Assessment of Risks, Application of Countermeasures

Operations Security (OPSEC)

A

ASSESSMENT OF RISKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Effectively negate an adversary’s ability to exploit vulnerabilities, simple and straightforward procedural adjustments eliminate or minimize the generation of indicators

Procedural changes, deception, background checks, physical security, perception management, speed of execution, stopping the mission, any other actions that protect the vital information, such as training and awareness

Individual countermeasures - limiting web page access, shredding sensitive documents, sanitizing bulletin boards, monitoring public conversations, DO NOT use email to discuss sensitive operations

Identification of Critical Information, Analysis of Threat, Analysis of Vulnerabilities, Assessment of Risks, Application of Countermeasures

Operations Security (OPSEC)

A

APPLICATION OF COUNTERMEASURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly