Provided by OSPA (www.opsecprofessionals.org) Operations Security (OPSEC)

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
THE FOLLOWING MINI PRESENTATION ON OPSEC IS TAKEN FROM A US AIR FORCE BRIEFING. ALTHOUGH THIS IS A MILITARY PRESENTATION, IT PROVIDES A GOOD OVERVIEW OF.
Open Source Intelligence (OSINT) OSINT and TRASHINT This presentation is the sole property of OSPA. Distribution is limited to OSPA members registered.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
NEW YORK NATIONAL GUARD FAMILY PROGRAMS Offered & presented by CW2 Walker Family Programs OPSEC Program Manager.
TLO 2: Action: Plan operational security. Intermediate-level training.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
UNCLASSIFIED. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Randy Marchany VA Tech Computing Center
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
1 Business Continuity. 2 Continuity strategy Business impact Incident response Disaster recovery Business continuity.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
Enterprise Risk ManagementSeptember 2010Miami, FL © 2010 Enterprise Risk Management Information Security- Facing the Risks in Electronic Channels and Social.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
SEC835 Database and Web application security Information Security Architecture.
Following the terrorist attack on September 11, 2001 the President declared a national emergency … Secretary of Defense Donald Rumsfeld cautioned on the.
Presented by the 1st Information Operations Command.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name)
Operational Security PCC. VII-F.1.
Section Eleven: Threat Awareness and Defensive Measures Note: All classified markings contained within this presentation are for training purposes only.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
OPSEC and Geospatial Information. Five step process Our operations from an adversary point of view Compilation Indicators Operations Security.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Where is the fax machine? The fax machine is next to the telephone on the desk. The plants are on the filing cabinet, cupboard and table. Where are the.
South Wales Cyber Security Cluster A networking group with a purpose Membership Open to anyone with an interest in Cyber Security.
By Creighton Linza for IT IS Introduction  Search Engine  an information retrieval system that searches its database for matches based on a query.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Intro to Computer Security For COP3502, Intro to Computer Science Lecture 1 1.
Operational Security Awareness
OPSEC for Families. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Information Security Awareness Program. Agenda  What is Information Security?  Why is Information Security important?  Education Data Breach  Appropriate.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Insider Threat Awareness
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Information Systems Security
Security Of Information Systems
ISSeG Integrated Site Security for Grids WP2 - Methodology
Team 1 – Incident Response
Operations Security (OPSEC) For New Hires
Security Risk Profiles – Tips and Tricks
Responding to Intrusions
Staying Austin College
Cyber Crimes Chunlian QU 9/18/2018.
Cybersecurity Awareness
Command Indoctrination Operations Security DD MMM YY
CRITICAL INFRASTRUCTURE CYBERSECURITY
Operations Security (OPSEC)
CMD LOGO Operations Security (OPSEC) Assessment in-brief Presenter
Overall Classification of this Briefing is UNCLASSIFIED
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name) Provided by OSPA (
Keeping Our Data Secure
Command Indoctrination Operations Security DD MMM YY
Presentation transcript:

Provided by OSPA ( Operations Security (OPSEC)

OPSEC… What is it? Why do we need it? The 5-step OPSEC process The OPSEC 2-step

What is OPSEC? Simply, a process designed to protect sensitive unclassified information And a way to keep our sensitive/critical information out of the hands of the “bad guys”

What is an OPSEC Indicator?

Why do we need OPSEC? You tell me… Situations and examples: –Company phone directory –TrashInt –Visitor Authentication

The 5 Steps of OPSEC 1.Identify Critical Information 2.Analyze Threats 3.Analyze Vulnerabilities 4.Assess Risk 5.Apply Countermeasures

The OPSEC 2-step What do you need to protect? How do you protect it?

What do we need to protect? Personal information (PII) OUO Business strategy Network systems

How do we protect it? Be aware of potential unauthorized personnel Ask to see badge Secure information (e.g. locked desk or file cabinet) Log out or lock computer Be aware of your surroundings on the telephone Verify the source when asked for information on the telephone or by

“The number of known adversaries conducting research on information attacks is increasing rapidly and includes intelligence services, criminals, industrial competitors, hackers and disgruntled or disloyal insiders.” -George Tenet Former Director, CIA

REMEMBER Remember what to protect Remember how to protect it And remember that protecting this information is YOUR responsibility!