5 Step Opsec Process

Question: Identification of critical information

Answer: - The information that an adversary would need in order to degrade services, disrupt operations, and impact the reputation of an organization.

Question: What are the OPSEC five steps?

Answer: 1. Identification

2. Analysis of threats

3. Analysis of vulnerabilities

4. Assessment of risks

5. Application of appropriate countermeasures

Question: Identification of critical information (Step 1)

Answer: The information that an adversary would need in order to degrade services, disrupt operations, and impact the reputation of an organization.

Question: Examples for step 1

Answer: - Core network infrastructure

  • Information security capability

  • - Business information

  • - Business critical applications

  • - Employee information

  • - Intellectual property

  • Question: Business information

  • Answer: Mergers and acquistion

Donation Page

Support Our Work

Do you appreciate the value this website provides? If so, please consider donating to help keep it running. Your donation will go a long way in helping us continue to provide the same quality of content and services. Every bit helps, and your support is greatly appreciated. Thank you for your generosity.