To determine what needs protection.
OPSEC as a capability of Information Operations
Apply OPSEC countermeasures
assessment
Access riskTrue
Access riskTrue
OPSEC as a capability of Information Operations
Apply OPSEC countermeasures
assessment
In the OPSEC process the step involving identifying critical and sensitive data is designed to identify adversary collection capabilities. This is the first of five steps in the process.
assessment
assessment
Five step process and OPSEC SOP
Access riskTrue
Access riskTrue
In which step of the OPSEC process do you select and implement tentative OPSEC measures?
Number two
Number two