1. Identify critical information.
2. Analyze threats.
3. Analyze vulnerabilities.
4. Assess risk.
5. Apply OPSEC measures.
this step identifies the information that must be protected
5
5
1. Identify critical information.2. Analyze threats.3. Analyze vulnerabilities.4. Assess risk.5. Apply OPSEC measures.
In the OPSEC process the step involving identifying critical and sensitive data is designed to identify adversary collection capabilities. This is the first of five steps in the process.
Identification of critical information
1) Identification of critical information 2) Analysis of threats 3) Analysis of vulnerabilities 4) Assessment of risk 5) Application of appropiate countermeasures
analyze vulnerabilities
analyze vulnerabilities
Five step process and OPSEC SOP
Apply OPSEC countermeasures
assessment
OPSEC is the five-step risk-management process used by military and security professionals to protect sensitive information that adversaries could use.