SlideShare a Scribd company logo
Provided by OSPA (www.opsecprofessionals.org) Vulnerabilities and Indicators The OPSEC Process
Definitions Indicator Points to vulnerability or critical information􀂄 Vulnerability Weakness the adversary can exploit to get to critical information
Indicators Pathways or detectable activities that lead to specific information that, when looked at by itself or in conjunction with something else, allows an adversary to obtain sensitive information or identify a vulnerability
Profiles and Signatures Adversaries look for Patterns and Signatures to establish a Profile Patterns are the way things are done, arranged, or have occurred Signatures are the emissions that are the result of, or caused by, what is or was done Profiles are collected on all our activities, procedures and methodologies
Vulnerability Areas Operations Physical Environment Personnel Finance Administrative Logistics Public Affairs Family
Common Vulnerabilities Discussion of sensitive information in unsecured areas. Lack of policy/enforcement Cameras Cell Phones Internet Usage Shredding Training/Awareness
Stereotyped Operations Same Time Same Place Same People Same Route Same Way PREDICTIBILITY
Examples of Vulnerabilities Publications Press Releases Unencrypted Email Organization Website Non-Secure Telephone
Examples of Vulnerabilities  Trash Employee Turnover Employee Mistakes Lack of Good Passwords Exhibits and Conventions
Communication Vulnerabilities Radios Cell Phones Telephones Facsimiles (Fax) Computers
Common Vulnerabilities Government Reliance on Commnercial Backbone Domestic Overseas Few Government-Owned Systems
Cell Phones Incorporate a wide-spectrum of technologies Analog/ Digital Wireless Sound Recording  PDA Camera Streaming video Computing/ Internet And more
Cell Phones Asset vs Vulnerability The Good: Convenience “ Reach out and touch someone” Access to Commercial Numbers Coordination Outside radio Range/ Frequency The Bad and the Ugly Multiple Technical Vulnerabilities Typically Unsecure
Common Vulnerabilities Computers Access Control Auditing Regulations/ Policy User Training Passwords Systems Accreditation
Common Vulnerabilities Associated Computer Concerns Email Sniffer Cookies Virus/ Spyware Web Logs (“Blogs”) Instant Messaging (“IM”) Personal Data Assistants (“PDAs”)
Areas of Vulnerability Administration Financial Logistics Operations
Administrative Memos Schedules Travel Orders Advance Plans Annual Reviews Org Charts Job Announcements Management Reports
Financial Projections Justifications Financial Plans Special Purchases Budget and Contracts Supplemental Requests
Logistics Unusual Equipment Volume or Priority Requisitions Boxes Labeled With the Name of an Operation or Mission etc
Operations VIP Visits Schedules Stereotyped Activities Increased Mission-Related Training Abrupt Changes in Normal Operation
EVEN MORE Indicators and Vulnerabilities Family Personnel Public Affairs Physical Environment Procedures and Reports
Where Are the Indicators?
Indicators Presence of specialized Equipment Increase (or Decrease) in activity Sudden Changes in Procedure Unique Convoy Configuration Staging of Cargo or  Vehicles
Information of Intelligence Value Collectible Observable
Collectible Can be physically collected or intercepted Examples: Dumpster diving, cordless/cell phone interception, email, open source
Observable What you can see What you can smell What you can hear
Why train for OPSEC? ( A real Exercise)
What is our greatest Weakness? OURSELVES!
Questions? “ In wartime, the truth is so precious that it must be protected by a bodyguard of lies.” Winston Churchill

More Related Content

PPTX
OPSEC Snapshot
PDF
Social Media Safety Tips
PDF
Overview of the Cyber Kill Chain [TM]
PDF
OWASP Top 10 - 2017
PPTX
Social Engineering
PPTX
Cyber security Information security
PPTX
The Zero Trust Model of Information Security
OPSEC Snapshot
Social Media Safety Tips
Overview of the Cyber Kill Chain [TM]
OWASP Top 10 - 2017
Social Engineering
Cyber security Information security
The Zero Trust Model of Information Security

What's hot (20)

PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PPTX
Cyber Threat Modeling
PPTX
Introduction to penetration testing
PDF
INTRODUCCION CIBERSEGURIDAD
PPTX
Cybersecurity Training
PPSX
Security Awareness Training
PDF
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
PPTX
Build an Information Security Strategy
PPTX
Cyber security
PDF
Threat Intelligence
PPT
Information security management
PPTX
Phishing ppt
PPTX
Cyber threat intelligence: maturity and metrics
PDF
Cyber Threat Intelligence
PPTX
Social engineering
PDF
2023-it-roadmap-for-cybersecurity-techcnical
PDF
Addressing the cyber kill chain
PPT
Cyber security for an organization
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PPTX
Cyber kill chain
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber Threat Modeling
Introduction to penetration testing
INTRODUCCION CIBERSEGURIDAD
Cybersecurity Training
Security Awareness Training
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Build an Information Security Strategy
Cyber security
Threat Intelligence
Information security management
Phishing ppt
Cyber threat intelligence: maturity and metrics
Cyber Threat Intelligence
Social engineering
2023-it-roadmap-for-cybersecurity-techcnical
Addressing the cyber kill chain
Cyber security for an organization
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cyber kill chain
Ad

Viewers also liked (20)

PPTX
Social Media Cyber Security Awareness Briefing
PDF
Army Social Media Presentation
PPT
General Awareness On Cyber Security
PPT
Conley Group Operational Security Presentation
ODP
Cyber security awareness
PPTX
Cyber security
PPTX
05 application security fundamentals - part 2 - security mechanisms - autho...
PPTX
Date security security principles
PPTX
Situational awareness
PPTX
Global privacy research
ODP
Catch-me if you can - TOR tricks for bots, shells and general hacking
ODP
NSA-Proof communications (mostly)
PPTX
Opsec & sns for distro (no vid)
KEY
PPT
Opsec for families
PDF
Reducing attack surface on ICS with Windows native solutions
PPTX
Cyber 101 for smb execs v1
PDF
Social Media OPSEC
PDF
Navy Command Facebook Assessment and Worksheet (March 2015)
PPT
OPSEC for Kids
Social Media Cyber Security Awareness Briefing
Army Social Media Presentation
General Awareness On Cyber Security
Conley Group Operational Security Presentation
Cyber security awareness
Cyber security
05 application security fundamentals - part 2 - security mechanisms - autho...
Date security security principles
Situational awareness
Global privacy research
Catch-me if you can - TOR tricks for bots, shells and general hacking
NSA-Proof communications (mostly)
Opsec & sns for distro (no vid)
Opsec for families
Reducing attack surface on ICS with Windows native solutions
Cyber 101 for smb execs v1
Social Media OPSEC
Navy Command Facebook Assessment and Worksheet (March 2015)
OPSEC for Kids
Ad

Similar to OPSEC Vulnerabilities And Indicators (20)

PPT
20110414 ARMA Twin Cities Inventorying Electronic Records
PPT
SOC presentation- Building a Security Operations Center
PPT
M014 Confluence Presentation 08 15 06
PPT
Information Leakage - A knowledge Based Approach
PPT
Safe shipley 2 upload
PPT
Physical Security Assessment
PPT
Building a Data Quality Program from Scratch
PPTX
Secutity Risk+Assessment+Methodology.pptx
PPT
080312 Ict Hub Risk Management
PPT
October 3rd Briefing, Transformation
PPT
David Whitaker: Managing Your Vendors
PPT
Security Consulting Methodology
PPT
What Every Organization Should Log And Monitor
PPT
Taking Transactions Mobile
PPTX
Delivering Digital Excellence with Global Compliance and Integrity
PPTX
Kristina Podnar - Delivering Digital Excellence with Global Compliance and In...
PPTX
SharePoint Governance and Compliance
PPTX
SharePoint Governance and Compliance
PPT
Keeping Score on Testing
DOCX
Question 1Discuss why those in the human resource development po.docx
20110414 ARMA Twin Cities Inventorying Electronic Records
SOC presentation- Building a Security Operations Center
M014 Confluence Presentation 08 15 06
Information Leakage - A knowledge Based Approach
Safe shipley 2 upload
Physical Security Assessment
Building a Data Quality Program from Scratch
Secutity Risk+Assessment+Methodology.pptx
080312 Ict Hub Risk Management
October 3rd Briefing, Transformation
David Whitaker: Managing Your Vendors
Security Consulting Methodology
What Every Organization Should Log And Monitor
Taking Transactions Mobile
Delivering Digital Excellence with Global Compliance and Integrity
Kristina Podnar - Delivering Digital Excellence with Global Compliance and In...
SharePoint Governance and Compliance
SharePoint Governance and Compliance
Keeping Score on Testing
Question 1Discuss why those in the human resource development po.docx

More from Department of Defense (20)

PDF
Invasive species commanders_guide
PDF
DoD Cyber Strategy
PDF
Department of Defense Strategy for Operating in Cyberspace
PDF
Endangered Species Bulletin - Spring 2011
PDF
National Security Space Strategy
PDF
Strengthening Our Military Families - Meeting America's Commitment January 2011
PDF
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
PPTX
Social Media Overview
PPTX
How To Tweet
PPTX
Getting Started With Twitter
PPTX
Tips And Tools For YouTube
PPTX
Customizing Your YouTube Channel
PPTX
YouTube Uses In The Field
PDF
Army Official Social Media Policy
PDF
ONR Innovation Newsletter
PPTX
Getting Started With You Tube
PPTX
Creative Ways To Use And Manage Facebook Pages
PPTX
Designing Your Facebook Page
PPTX
Getting Started With Facebook
PPTX
Staying Safe Online For Kids
Invasive species commanders_guide
DoD Cyber Strategy
Department of Defense Strategy for Operating in Cyberspace
Endangered Species Bulletin - Spring 2011
National Security Space Strategy
Strengthening Our Military Families - Meeting America's Commitment January 2011
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
Social Media Overview
How To Tweet
Getting Started With Twitter
Tips And Tools For YouTube
Customizing Your YouTube Channel
YouTube Uses In The Field
Army Official Social Media Policy
ONR Innovation Newsletter
Getting Started With You Tube
Creative Ways To Use And Manage Facebook Pages
Designing Your Facebook Page
Getting Started With Facebook
Staying Safe Online For Kids

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PPTX
Institutional Correction lecture only . . .
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Classroom Observation Tools for Teachers
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Complications of Minimal Access Surgery at WLH
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
master seminar digital applications in india
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
RMMM.pdf make it easy to upload and study
Institutional Correction lecture only . . .
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Module 4: Burden of Disease Tutorial Slides S2 2025
Classroom Observation Tools for Teachers
human mycosis Human fungal infections are called human mycosis..pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
TR - Agricultural Crops Production NC III.pdf
VCE English Exam - Section C Student Revision Booklet
Complications of Minimal Access Surgery at WLH
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
102 student loan defaulters named and shamed – Is someone you know on the list?
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Final Presentation General Medicine 03-08-2024.pptx
master seminar digital applications in india
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf

OPSEC Vulnerabilities And Indicators

  • 1. Provided by OSPA (www.opsecprofessionals.org) Vulnerabilities and Indicators The OPSEC Process
  • 2. Definitions Indicator Points to vulnerability or critical information􀂄 Vulnerability Weakness the adversary can exploit to get to critical information
  • 3. Indicators Pathways or detectable activities that lead to specific information that, when looked at by itself or in conjunction with something else, allows an adversary to obtain sensitive information or identify a vulnerability
  • 4. Profiles and Signatures Adversaries look for Patterns and Signatures to establish a Profile Patterns are the way things are done, arranged, or have occurred Signatures are the emissions that are the result of, or caused by, what is or was done Profiles are collected on all our activities, procedures and methodologies
  • 5. Vulnerability Areas Operations Physical Environment Personnel Finance Administrative Logistics Public Affairs Family
  • 6. Common Vulnerabilities Discussion of sensitive information in unsecured areas. Lack of policy/enforcement Cameras Cell Phones Internet Usage Shredding Training/Awareness
  • 7. Stereotyped Operations Same Time Same Place Same People Same Route Same Way PREDICTIBILITY
  • 8. Examples of Vulnerabilities Publications Press Releases Unencrypted Email Organization Website Non-Secure Telephone
  • 9. Examples of Vulnerabilities Trash Employee Turnover Employee Mistakes Lack of Good Passwords Exhibits and Conventions
  • 10. Communication Vulnerabilities Radios Cell Phones Telephones Facsimiles (Fax) Computers
  • 11. Common Vulnerabilities Government Reliance on Commnercial Backbone Domestic Overseas Few Government-Owned Systems
  • 12. Cell Phones Incorporate a wide-spectrum of technologies Analog/ Digital Wireless Sound Recording PDA Camera Streaming video Computing/ Internet And more
  • 13. Cell Phones Asset vs Vulnerability The Good: Convenience “ Reach out and touch someone” Access to Commercial Numbers Coordination Outside radio Range/ Frequency The Bad and the Ugly Multiple Technical Vulnerabilities Typically Unsecure
  • 14. Common Vulnerabilities Computers Access Control Auditing Regulations/ Policy User Training Passwords Systems Accreditation
  • 15. Common Vulnerabilities Associated Computer Concerns Email Sniffer Cookies Virus/ Spyware Web Logs (“Blogs”) Instant Messaging (“IM”) Personal Data Assistants (“PDAs”)
  • 16. Areas of Vulnerability Administration Financial Logistics Operations
  • 17. Administrative Memos Schedules Travel Orders Advance Plans Annual Reviews Org Charts Job Announcements Management Reports
  • 18. Financial Projections Justifications Financial Plans Special Purchases Budget and Contracts Supplemental Requests
  • 19. Logistics Unusual Equipment Volume or Priority Requisitions Boxes Labeled With the Name of an Operation or Mission etc
  • 20. Operations VIP Visits Schedules Stereotyped Activities Increased Mission-Related Training Abrupt Changes in Normal Operation
  • 21. EVEN MORE Indicators and Vulnerabilities Family Personnel Public Affairs Physical Environment Procedures and Reports
  • 22. Where Are the Indicators?
  • 23. Indicators Presence of specialized Equipment Increase (or Decrease) in activity Sudden Changes in Procedure Unique Convoy Configuration Staging of Cargo or Vehicles
  • 24. Information of Intelligence Value Collectible Observable
  • 25. Collectible Can be physically collected or intercepted Examples: Dumpster diving, cordless/cell phone interception, email, open source
  • 26. Observable What you can see What you can smell What you can hear
  • 27. Why train for OPSEC? ( A real Exercise)
  • 28. What is our greatest Weakness? OURSELVES!
  • 29. Questions? “ In wartime, the truth is so precious that it must be protected by a bodyguard of lies.” Winston Churchill