The Art and Practice of OPSEC, by T.H.

Got OPSEC? You’d better!

The way I see things ...

An area we all need to concentrate on.

Let’s look at that definition again: “An analytical process used to deny an adversary critical information about our planning process and operations.”

It really is as simple as this:

  • What information do you want to protect?
  • Who wants your information?
  • How is your information vulnerable?
  • What is the risk for your information?
  • How can you protect your information?

The OPSEC process consists of five steps. The text book answer is that they are not in any particular order, but personally I like the following:

  1. Analyze the Threat.
  2. Identify Critical Information
  3. Analyze Your Vulnerabilities.
  4. Assess the Risk.
  5. Apply OPSEC Countermeasures.

opsec2

Analyze the Threat

Who are our enemies and what are they capable of? Are your enemies street criminals, identity theft scam artists, the Mafia, burglars, armed robbers, and/or terrorists? A person living in Atlanta would have a different set of threats (street criminals…

View original post 90 more words

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s