1) Identification of critical information
2) Analysis of threats
3) Analysis of vulnerabilities
4) Assessment of risk
5) Application of appropiate countermeasures
Apply OPSEC countermeasures
assessment
assessment
assessment
Five step process and OPSEC SOP
Access riskTrue
Access riskTrue
In which step of the OPSEC process do you select and implement tentative OPSEC measures?
Number two
Number two
Analyze vulnerabilities is the step in the OPSEC process that requires you to look through the eyes of the adversary.
To determine what needs protection.