I Hate CBT's

View Original

5 Step Opsec Process

Question: Identification of critical information

Answer: - The information that an adversary would need in order to degrade services, disrupt operations, and impact the reputation of an organization.

Question: What are the OPSEC five steps?

Answer: 1. Identification

2. Analysis of threats

3. Analysis of vulnerabilities

4. Assessment of risks

5. Application of appropriate countermeasures

Question: Identification of critical information (Step 1)

Answer: The information that an adversary would need in order to degrade services, disrupt operations, and impact the reputation of an organization.

Question: Examples for step 1

Answer: - Core network infrastructure

  • Information security capability

  • - Business information

  • - Business critical applications

  • - Employee information

  • - Intellectual property

  • Question: Business information

  • Answer: Mergers and acquistion