Section 4 Flashcards
Operations security process
- identification of critical information
- analysis of threats
- analysis of vulnerabilities
- assessment of risks
- application of countermeasures
The process of intelligence gathering and analysis to support business decisions.
competitive intelligence
first law: know the threats
- if you don’t know the threat, how do you know what to protect?
second law: know what to protect
if you don’t know what to protect, how do you know you are protecting it
third law: protect the information
if you are not protecting the information, the dragon wins
Which term refers to the practice of managing information gathering activities directed at an organization?
competitive counterintelligence
What is the responsibility of the Interagency OpSec Support Staff (IOSS)?
Provide multiple agencies with a wide variety of security awareness and training.
Which type of social engineering attack utilizes credible scenarios to lure people into disclosing sensitive information?
pretexting
What does endpoint protection help reduce?
malware
Which part of a security awareness program locks down sensitive information before exiting?
clean desk policy