OPSEC
Operations Security - Process you use to protect your information
Steps of OPSEC (5)
Laws of OPSEC - Kurt Haase (3)
Purple Dragon
Code study during the Vietnam War. Coined the term OPSEC
Competitive Intelligence
Conducting intelligence gathering and analysis to support business decisions
Competitive Counterintelligence
Managing info gathering activities directed at an organization
OpSEC Support Staff (IOSS)
Provide multiple agencies w/ a wide variety of security awareness and trainings
Social engineering attacks
manipulate people to gain info/access to facilities
HUMINT
Human Intelligence - gathered by talking to people, torture, tricking people w/ scams
OSINT
Open Source Intelligence - info collected from publicly available sources
Metadata
Data about data found in almost any file
Ex forensic tool: EnCase
EXIF data
Image/video file metadata
Shodan
Search engine of service banner which are metadata that the server sends back to the client.
Web based search engine that looks for info saved on internet connected devices.
FTP
File Transfer Protocol
GEOINT
Geospatial info from satellites
MASINT
Measurement and signature from sensors
RADINT
Radar info
TECHINT
Technical info about equipment, tech, and weapons
FININT
Financial info about financial dealings
CYBINT/DNINT
Cyber/Digital Network info from comp systems/networks
Pretexting
Social engineering attack that utilizes credible scenarios to lure people into disclosing sensitive info
Phishing
Social engineering technique that uses electronic communications to carry out an attack that is broad in nature
Tailgating
Following someone through an access control point
Malware
Application that makes unauthorized changes to a device