Got OPSEC? You’d better!
An area we all need to concentrate on.
Let’s look at that definition again: “An analytical process used to deny an adversary critical information about our planning process and operations.”
It really is as simple as this:
- What information do you want to protect?
- Who wants your information?
- How is your information vulnerable?
- What is the risk for your information?
- How can you protect your information?
The OPSEC process consists of five steps. The text book answer is that they are not in any particular order, but personally I like the following:
- Analyze the Threat.
- Identify Critical Information
- Analyze Your Vulnerabilities.
- Assess the Risk.
- Apply OPSEC Countermeasures.
Analyze the Threat
Who are our enemies and what are they capable of? Are your enemies street criminals, identity theft scam artists, the Mafia, burglars, armed robbers, and/or terrorists? A person living in Atlanta would have a different set of threats (street criminals…
View original post 90 more words