ANSWERS | GRADED A+| 2025/2026 LATEST UPDATE
Step One: ID of Critical Info.- Operational / Mission Sensitive Info * Current operations
* Suspects
* Informants
* Warrants
* Location of operations
* Surveillance
Step Two: Analysis of Threat- Two Elements of a Threat * Intent - Does an adversary intend
to gain our sensitive / critical information?
* Capability - Is the adversary capable of gaining the information?
Step Two: Analysis of Threat- What to ask? * Who wants the sensitive information?
* Is there more than one adversary?
* What is their objective?
* What will they do to get to your sensitive information?
* What methods will they use to get it?
Step Two: Analysis of Threat- Ways Criminals Gather Information * Communications
* Imagery
, * Trash
* Open Source
* Human
* Computer Accessing
Step Three: Analysis of Vulnerabilities- OPSEC addresses the capabilities of the adversary...
To use the information that has been collected
in an attempt to utilize the information against us.
Step Three: Analysis of Vulnerabilities- What to ask? * How is the information vulnerable?
* How is the information protected?
* Is the information properly protected?
Step Three: Analysis of Vulnerabilities- Examples of vulnerabilities include: * Critical
information posted on the internet.
* Non-secure communication.
Step Four: Assessment of Risks- Risk is determined by analyzing three factors: * Threat
* Vulnerability
* Impact