Mining glossary
- AML (Anti-Money Laundering)
- ASIC
- Atomic swap
- Austrian School of Economics
- Batching
- Bitcoin Address
- Bitcoin Client
- Bitcoin Core
- Bitcoin Improvement Proposal (BIP)
- Bitcoin Network
- Block
- Block Header
- Block Height
- Block Reward
- Blockchain
- BTC
- Bubble
- Chain Reorganization
- Coinbase Transactions
- CoinJoin
- Confirmation
- Cryptocurrency Mixer
- Cryptography
- DAO (Decentralized Autonomous Organization)
- DCA (Dollar-Cost Averaging)
- DEX (Decentralized Exchange)
- Difficulty of Bitcoin
- Digital Signature
- Distributed Ledger
- Don’t Trust, Verify
- Double Spend
- Dust
- DYOR (Do Your Own Research)
- Encryption Algorithm
- Exchange
- Exchange Volume
- Extended Public Key (xPub)
- Fear of Missing Out (FOMO)
- Fiat
- Flippening
- FORK
- FUD
- Genesis Block
- Graphics Processing Unit (GPU)
- Halving
- Hard Fork
- Hash
- Hash Rate
- Hashing
- HODL
- Hyperbitcoinization
- Inflation
- Initial Block Download (IBD)
- Intrinsic Value
- Know your customer (KYC)
- Layer 2
- Light Client
- Lightning Network
- Margin Trading
- Market Depth
- Mempool
- Miner
- Mining
- Mining Pool
- Mt. Gox
- Multisignature
- NFT (Non-Fungible Token)
- Nocoiner
- Node
- Nonce
- Not Your Keys, Not Your Coins
- Off Chain
- On Chain
- Operations Security (OPSEC)
- Orphaned Block
- Payment Channel
- Peer-To-Peer (P2P)
- Precoiner
- Private Key
- Proof of Keys
- Proof of Work (PoW)
- Protocol
- Public Key
- Public Key Cryptography
- QR Code
- Recovery Seed Phrase
- Rekt
- Sat
- Satoshi Nakamoto
- Schnorr Signature
- Segregated Witness (SegWit)
- SHA-256
- Shitcoin
- Sidechain
- Signature
- Smart Contracts
- Soft Fork
- Testnet
- To The Moon
- Transaction
- Transaction Fee
- Unconfirmed Transaction
- Unspent Transaction Output (UTXO)
- UTXO Set
- Virgin Bitcoin
- Wallet
- XBT
- Zero Confirmation Transaction
- Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK)
Operations Security (OPSEC) - what is it?
Operations Security (OPSEC) is an acronym that denotes a specific algorithm of actions to maintain a given level of security.
In any electronic system, it is important to ensure the security of data storage and use and to prevent unauthorized use and theft. One of the processes that exists today as a security tool is OPSEC. It is used not only in cryptocurrency but also in other areas with electronic databases.
OPSEC milestones
To prevent leakage of classified information and valuable data, a certain sequence of actions is followed:
- designation of critical data - a clear list of data is compiled that could potentially be of interest to attackers and lead to system failure or theft of unique, valuable information;
- analytics of the risk and threat landscape - narrow specialists make forecasts regarding who may potentially be interested in the information;
- analysis of vulnerable components - an expert assessment is carried out to identify potential technical weaknesses in the digital system, which could trigger a data leak;
- analytics regarding the probability of exploiting weaknesses - at this stage, all threats and dangers are ranked by degree of danger.
At the final stage, solutions are developed, countermeasures are created, and they can change dynamically as the system is technically modernized.