12 Questions
What is the purpose of the operations security process?
To protect our information from unauthorized access
What is the correct sequence of operations security practices?
Identify assets, threats analysis, and countermeasures
What is the consequence of applying the same level of security to everything?
We may be overprotecting some things that are not of high value and under protecting things of much greater value
What are the three main items of information that constitute an identity?
A name, an address, and an identity number
Why is it important to identify assets before putting countermeasures in place?
To ensure that we are not directing our efforts toward the information assets that are actually the most critical items to protect
What is the primary goal of the operations security methodology?
To provide a framework for protecting information
What is the main focus of OPSEC?
Unclassified data that when correlated becomes sensitive
What is the primary goal of the operations security process?
To identify and protect only critical information assets
What is an example of a critical information asset for a soft drink company?
Secret recipe
What is the first step in the operations security process?
Identify what information we have that needs protection
What is the purpose of the operations security process?
To protect critical information assets from unauthorized access
What is the primary adversary in the business world?
A competitor
Learn about the operations security process that protects information, including what to disclose on social media and what to share with friends and family. Practice your OPSEC skills with this quiz.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free