To determine what needs protection.
Apply OPSEC countermeasures
OPSEC as a capability of Information Operations
assessment
Access riskTrue
Access riskTrue
Apply OPSEC countermeasures
OPSEC as a capability of Information Operations
In the OPSEC process the step involving identifying critical and sensitive data is designed to identify adversary collection capabilities. This is the first of five steps in the process.
assessment
assessment
assessment
Five step process and OPSEC SOP
Access riskTrue
Access riskTrue
In which step of the OPSEC process do you select and implement tentative OPSEC measures?
Number two
Number two