Operations Security
Across
- 2. should only be work onsite (seatbelt on _______ off)
- 4. What is the abbreviation of the list that shows the commands critical information
- 9. What you should do to your anti-virus software
- 11. ___________ of scientific an tecnical information (RSTI) approval is needed to obtain a distribution statement
- 13. Making changes to reduce your vulnerability to adversaries
- 14. Profiles on social media used to get your attention
- 16. "Computer1234" is a bad example of this
- 18. _________ information is what OPSEC protects
- 21. What potential harm from bad OPSEC practices is called
- 22. OPSEC is a __________ effort
- 23. __________ tweets sink fleets
- 25. Emails that contain PII, FOUO or critical informaation senders must do this
Down
- 1. posting pictures of this could put your family at risk
- 3. The number of steps in the OPSEC process
- 5. What a weakness in our practices or defense is called
- 6. This marks your photos with longitude and latitude information
- 7. What you should not take with your smartphone or camera anywhere onsite
- 8. An adversary is considered a ________
- 10. The kind of email account you can't use to conduct government business
- 12. These settings should be used on social media
- 13. A threat must have intent and ________ to do harm to the United States to be considered a threat
- 15. An option to protect your credit
- 17. the most commonly used social media platform by adversaries to target government employees and contractors
- 19. What should you remove when you walk away from your NMCI computer
- 20. The Freedom of Information Act is for what type of information
- 24. How to destroy all FOUO documents