First page Back Continue Last page Summary Graphics
Organizational Efforts
Example: operations security
- Applies to a specific operation
5 Steps:
- 1) Critical information for your success
- What would the enemy what to know
- 2) Analyze threats and methods
- 3) Identify vulnerabilities (direct and indirect)
- 4) Assess risks (Threat & Vulnerability=> rank)
- 5) Apply countermeasures
- More security / Deceptions
Notes: