operations security vulnerability

operations security vulnerability
A condition in which friendly actions provide operations security indicators that may be obtained and accurately evaluated by an adversary in time to provide a basis for effective adversary decisionmaking.

Military dictionary. 2000.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Operations security — A Modern Day OPSEC Poster Operations security (OPSEC) is a process that identifies critical information to determine if friendly actions can be observed by adversary intelligence systems, determines if information obtained by adversaries could be …   Wikipedia

  • operations security measures — Methods and means to gain and maintain essential secrecy about critical information. The following categories apply. a. action control The objective is to eliminate indicators or the vulnerability of actions to exploitation by adversary… …   Military dictionary

  • vulnerability — In information operations, a systematic examination of an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security… …   Military dictionary

  • Security controls — are safeguards or countermeasures to avoid, counteract or minimize security risks. To help review or design security controls, they can be classified by several criteria, for example according to the time that they act, relative to a security… …   Wikipedia

  • Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… …   Wikipedia

  • Intelligence cycle security — This article is part of a series under the intelligence cycle management, and deals with protection of the intelligence cycle. For a hierarchical list of articles, see the intelligence cycle management hierarchy. National intelligence programs,… …   Wikipedia

  • Core Security Technologies — Core Security Type Private Industry Computer Security Vulnerability Management Security Consulting Services Founded 1996 Headquarters …   Wikipedia

  • 39th Information Operations Squadron — The 39th Information Operations Squadron (39 IOS) is the U.S. Air Force s Information Operations schoolhouse, part of the Air Force Cyber Command (Provisional). FacilitiesThe schoolhouse teaches the Information Operations Integration Course,… …   Wikipedia

  • Domain Name System Security Extensions — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”