Email this Article Email   

CHIPS Articles: The Five-Step Process for OPSEC (video)

The Five-Step Process for OPSEC (video)
By U.S. Navy - December 18, 2015
We've all heard the phrase "Loose lips sink ships". To keep that from happening, follow the operation security five-step process.

"So the five steps are identifying critical information one of the first things anyone should know is what information is important to them.

The second step is identifying who the threat is or what the threat is, it could be a particular adversary or a thief in your neighborhood.

The third step is taking a look at that critical information and who that threat is and understanding where you are vulnerable to that.

The fourth step is identifying what type of risk you have associated with those particular things like your critical information.

And the fifth step is applying measures or counter measures to mitigate those particular risks.

For more information about operation security visit the operation security Facebook page.

Download video with Jim Magdalenski, Director, Naval OPSEC Team.

<a href="http://www.navy.mil/media/download/151217_2ahu_w.1.mp4" alt='Link will open in a new window.' target='whole'>Download video</a> with Jim Magdalenski, Director, Naval OPSEC Team.
Download video with Jim Magdalenski, Director, Naval OPSEC Team.
Related CHIPS Articles
Related DON CIO News
Related DON CIO Policy
CHIPS is an official U.S. Navy website sponsored by the Department of the Navy (DON) Chief Information Officer, the Department of Defense Enterprise Software Initiative (ESI) and the DON's ESI Software Product Manager Team at Space and Naval Warfare Systems Center Pacific.

Online ISSN 2154-1779; Print ISSN 1047-9988