Section 17B--Operations Security Flashcards
Which security process uses a cycle to identify, analyze, and control critical information that applies to all activities used to prepare, sustain, or employ forces during all phases of operations?
Operations security (OPSEC)
What is the active defense or exploitation of operational profiles at a given military installation?
Signature management
What is accomplished by implementing measures to deny adversary collection of critical information?
Defense of operational profiles
Each functional activity generates its own set of more-or-less unique signatures and associations. What is the sum of these signatures and associations?
The activity’s profile
What is used to map the local operating environment and capture process points that present key signatures and profiles with critical information value?
Profiling process