Operations Security

12345678910111213141516171819202122232425
Across
  1. 2. should only be work onsite (seatbelt on _______ off)
  2. 4. What is the abbreviation of the list that shows the commands critical information
  3. 9. What you should do to your anti-virus software
  4. 11. ___________ of scientific an tecnical information (RSTI) approval is needed to obtain a distribution statement
  5. 13. Making changes to reduce your vulnerability to adversaries
  6. 14. Profiles on social media used to get your attention
  7. 16. "Computer1234" is a bad example of this
  8. 18. _________ information is what OPSEC protects
  9. 21. What potential harm from bad OPSEC practices is called
  10. 22. OPSEC is a __________ effort
  11. 23. __________ tweets sink fleets
  12. 25. Emails that contain PII, FOUO or critical informaation senders must do this
Down
  1. 1. posting pictures of this could put your family at risk
  2. 3. The number of steps in the OPSEC process
  3. 5. What a weakness in our practices or defense is called
  4. 6. This marks your photos with longitude and latitude information
  5. 7. What you should not take with your smartphone or camera anywhere onsite
  6. 8. An adversary is considered a ________
  7. 10. The kind of email account you can't use to conduct government business
  8. 12. These settings should be used on social media
  9. 13. A threat must have intent and ________ to do harm to the United States to be considered a threat
  10. 15. An option to protect your credit
  11. 17. the most commonly used social media platform by adversaries to target government employees and contractors
  12. 19. What should you remove when you walk away from your NMCI computer
  13. 20. The Freedom of Information Act is for what type of information
  14. 24. How to destroy all FOUO documents