Number two
Vulnerability Critical info Indicators Threats
Action control, Countermeasures, Counteranalysis
vulnerability
Good OPSEC principles are identifying critical information, analyzing the threat, discovering vulnerabilities, assessing the risk, and employing the necessary protective measures. By following these principles you prevent personal information from being stolen.
Vulnerability
adversary intelligence systems
adversary intelligence systems
Intelligence
Intelligence
Intelligence
OPSEC stands for Operations Security. The elements of a threat are analyzed by OPSEC and are used to determine if the adversary is capable both operationally and technically to carry out the threat. Other elements analyzed include the motivation and intentions of the adversary.
Analyze vulnerabilities is the step in the OPSEC process that requires you to look through the eyes of the adversary.
Adversary.
OPSEC is the correct answer.
In the OPSEC process the step involving identifying critical and sensitive data is designed to identify adversary collection capabilities. This is the first of five steps in the process.
Identify critical information is the step in the OPSEC process that requires you to look at your operation through the eyes of the adversary.