OPSEC Flashcards
What are the 5 steps of the OPSEC process?
- Identification of critical information
- Analysis of the threat
- Analysis of vulnerabilities
- assessment of risks
- Application of countermeasures
what is Critical Information?
Information in need of protection and analyzes how that information may be inadvertently compromised.
when analyzing the threat what do you need to know about your adversary?
their intent and capabilities
OPSEC addresses the capabilities of the adversary:
To use the information that has been collected
in an attempt to utilize the information against us.
Examples of vulnerabilities include:
Critical information posted on the internet.
Non-secure communication.
Risk is determined by analyzing what three factors:
Threat
Vulnerability
Impact
what are countermeasures?
Countermeasures effectively negate an adversary’s ability to exploit vulnerabilities.
Simple and straightforward procedural adjustments eliminate or minimize the generation of indicators.