5 Step Opsec Process
Question: Identification of critical information
Answer: - The information that an adversary would need in order to degrade services, disrupt operations, and impact the reputation of an organization.
Question: What are the OPSEC five steps?
Answer: 1. Identification
2. Analysis of threats
3. Analysis of vulnerabilities
4. Assessment of risks
5. Application of appropriate countermeasures
Question: Identification of critical information (Step 1)
Answer: The information that an adversary would need in order to degrade services, disrupt operations, and impact the reputation of an organization.
Question: Examples for step 1
Answer: - Core network infrastructure
Information security capability
- Business information
- Business critical applications
- Employee information
- Intellectual property
Question: Business information
Answer: Mergers and acquistion