OPSEC Flashcards

1
Q

What are the 5 steps of the OPSEC process?

A
  1. Identification of critical information
  2. Analysis of the threat
  3. Analysis of vulnerabilities
  4. assessment of risks
  5. Application of countermeasures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is Critical Information?

A

Information in need of protection and analyzes how that information may be inadvertently compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

when analyzing the threat what do you need to know about your adversary?

A

their intent and capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OPSEC addresses the capabilities of the adversary:

A

To use the information that has been collected

in an attempt to utilize the information against us.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of vulnerabilities include:

A

Critical information posted on the internet.

Non-secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk is determined by analyzing what three factors:

A

Threat
Vulnerability
Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are countermeasures?

A

Countermeasures effectively negate an adversary’s ability to exploit vulnerabilities.
Simple and straightforward procedural adjustments eliminate or minimize the generation of indicators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly