OPSEC Flashcards

1
Q

An information-related capability that preserves friendly essential secrecy by using a process to identify, control, and protect critical information and indicators.

A

Operations Security (OPSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any entity with goals counter to your own.

A

Adversary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adversary with the capability and intent to undertake action detrimental to mission success.

A

Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exists when the adversary is capable of collecting critical information and/or indicators, correctly analyzing them, and acting quickly enough to impact friendly objectives.

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Specific facts about friendly activities, intentions, capabilities, or limitations an adversary seeks in order to gain a military, diplomatic, economic, or technological advantage.

A

Critical Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the five-step OPSEC Process

A
  1. Identify Critical Information
  2. Analyze Threats
  3. Analyze Vulnerabilities
  4. Assess Risks
  5. Apply OPSEC Countermeasures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Five-step OPSEC Process

  • Information that an organization has determined is valuable to an adversary.
  • This information will vary based on the organization’s role.
  • It is best identified by the personnel responsible for planning and executing the organization’s mission.
A

Identify Critical Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Five-step OPSEC Process

  • Threat information is necessary to develop appropriate countermeasures.
  • The threat analysis includes identifying potential adversaries and their associated capabilities and intentions to collect, analyze, and exploit information and indicators.
A

Analyze Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Five-step OPSEC Process

  • An OPSEC vulnerability exists when the adversary is capable of collecting critical information to exploit our vulnerabilities.
A

Analyze Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Five-step OPSEC Process

  • Assessing the adversary’s ability to exploit vulnerabilities that would lead to the exposure of critical information and the potential impact it would have on the mission.
A

Assess Risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Five-step OPSEC Process

  • Countermeasures are implemented after a risk assessment is conducted and the amount of risk is deemed unacceptable. These countermeasures should mitigate the risk or reduce the risk to an acceptable level.
A

Apply OPSEC Countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly