Critique this discusion assignment-Chris
Critique this discusion assignment-Chris
What is operations security (OPSEC)?
- OPSEC is defined as, “a systematic and proven process intended to deny to potential adversaries information about capabilities and intentions by identifying, controlling, and protecting generally unclassified evidence of the planning and execution of sensitive activities” (CNSS, 2015).
- The OPSEC process involves five steps:
- Identification of critical information – Identifying critical information that could be of value to an adversary. Once you have identified critical information, you can proceed with the remainder of the process on that information.
- Analysis of threats – Analyzing the threats in order to determine who likely adversaries may be. This is done by researching and analyzing intelligence, counterintelligence, and any other public information related to what you are trying to protect.
- Analysis of vulnerabilities – This analysis focuses on anything that may potentially expose critical information to the adversary.
- Assessment of risks – Once vulnerabilities have been identified, the risk from that vulnerability needs to be evaluated. Risks, once identified, can be managed and remediated.
- Application of appropriate countermeasures – Appropriate measures should be taken to remediate the risk posed by the vulnerability (Messier, 2013).
2. Why does Sifers-Grayson need OPSEC?
- OPSEC measures are intended to prevent intelligence gatherers from learning anything about the corporation except what you want the public to know (Halibozek, Kovacich, & Jones, 2007).
- Companies regularly try to gather information about their competitors to figure out their strengths and weaknesses to improve their own competitive position (Halibozek et al., 2007).
- Employing OPSEC will help protect Sifers-Grayson information by making it more difficult for unauthorized persons to gain access (Halibozek et al., 2007).
- The theft of private company information and data could lead to the loss of government contracts.
3. How is Sifers-Grayson vulnerable?
- Wireless signals are broadcast over the air using well known frequencies, making it more susceptible to interference and interception (Gibson, 2011).
- The use of unsecure communications makes it more susceptible to theft and interception.
- Radio frequency signals can be spoofed and hijacked, allowing control to be taken.
- Calls over cellular signals can be intercepted through a variety of methods, allowing someone to listen in on calls.
"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.
Discount Code: CIPD30
Click ORDER NOW..


