Which of the following are the process steps of OPSEC?

Which of the following are the process steps of OPSEC?
Each correct answer represents a part of the solution. Choose all that apply.

Which of the following are the process steps of OPSEC?
Each correct answer represents a part of the solution. Choose all that apply.

A.
Analysis of Vulnerabilities

B.
Display of associated vulnerability components

C.
Assessment of Risk

D.
Identification of Critical Information

Explanation:
The OPSEC process has five steps which are as follows.
1.Identification of Critical Information. Identifying information vitally needed by an adversary, which
focuses the remainder of the OPSEC process on protecting vital information, rather than attempting
to protect all classified or sensitive unclassified information.
2.Analysis of Threats. The research and analysis of intelligence, counter-intelligence, and open
source information to identify likely adversaries to a planned operation.
3.Analysis of Vulnerabilities. Examining each aspect of the planned operation to identify OPSEC
indicators that could reveal critical information and then comparing those indicators with the
adversary’s intelligence collection capabilities identified in the previous action.
4.Assessment of Risk. Firstly, planners analyze the vulnerabilities identified in the previous action
and identify possible OPSEC measures for each vulnerability. Secondly, specific OPSEC measures are
selected for execution based upon a risk assessment done by the commander and staff.
5.Application of Appropriate OPSEC Measures. The command implements the OPSEC measures
selected in the assessment of risk action or in the case of planned future operations and activities
includes the measures in specific OPSEC plans.
Answer option B is incorrect. Display of associated vulnerability components is not a valid step of the
OPSEC process.



Leave a Reply 0

Your email address will not be published. Required fields are marked *