12

i Security (OPSEC) Operations Security (OPSEC) i An information protection mindset ... exploit us. Would you mail it to this man? If the answer is “no”, DON’T GIVE IT AWAY

  • Upload
    votu

  • View
    224

  • Download
    2

Embed Size (px)

Citation preview

3/19/12 UNCLASSIFIED 2

iOperations Security (OPSEC)

iAn information protection mindset

iAnswers the questions: – Who are the bad guys?

– What do they want from me (us)?

– How do they get it?

– How can you help stop them?

3/19/12 UNCLASSIFIED 3

hEnemies

hCompetitors

hTerrorists

hCriminals

hInsiders

3/19/12 UNCLASSIFIED 4

Information the adversary needs to

prevent our success.

3/19/12 UNCLASSIFIED 5

iOur limitations

iSpecific operations plans

– Who, what, when, where, how

iOur personnel & their families

iOur security process

3/19/12 UNCLASSIFIED 7

iWe give it to them! (“Vulnerabilities”)

– Conversations in public areas

– Using cell phones for business

– Web pages

– Email

– Social Networking

3/19/12 UNCLASSIFIED 8

hCommunications intercept

hSocial Engineering

hInternet

hElicitation

hEspionage

3/19/12 UNCLASSIFIED 9

i“Countermeasures”

– Protected communications

– Web page policies

– Be alert

– Be suspicious

– Be aware

3/19/12 UNCLASSIFIED 10

iConsider the threat when you:

– Use the phone

– Answer stranger’s questions

– Discuss work in public places

– Engage in social networking

iPractice good security

iShred all paper

Anything that effectively

negates or reduces an

adversary’s ability to

exploit us.

Would you mail it to this man?

If the answer is “no”, DON’T GIVE IT AWAY

IN OPEN SOURCES!!!

3/19/12 UNCLASSIFIED 12