Operational Security

From EVE University Wiki
Jump to: navigation, search
This article should be cleaned up or improved. The reason is: unspecified

NOT SANCTIONED --Kyrlin dishai 18:03, 12 September 2010 (UTC)

OPERATIONAL SECURITY

The purpose of Operational Security (OPSEC) is to reduce the vulnerability of Ivy League from collection and exploitation of information. OPSEC applies to all activities that prepare, sustain, or employ members at any time.

OPSEC Definition

OPSEC is a process of identifying, analyzing and controlling critical information indicating friendly actions associated with Ivy League operations and other activities to:

  • Identify those actions that can be observed by enemy intelligence systems.
  • Determine what specific indications could be collected, analyzed, and interpreted to derive critical information.
  • Select and execute measures that eliminate, or reduce to an acceptable level, vulnerabilities.

Roles and Responsibilities

Director of Intelligence:

develop and integrate OPSEC into their planning to ensure critical information and indicators are identified; Integrate OPSEC into strategy, operational and tactical planning and execution, indoctrination, support activities, contingency, combat and peacetime operations and training, and communications; identify risk, threats, and vulnerablities

Ivy League Leadership:

insure ILN Officers' compliance, take needed steps (upto and including removal from Ivy League) to discipline repeat offenders; identify risks, threats, and vulnerablities

ILN Officers:

Understand the risks to the operation; insure compliance of individual members; report to Ivy League Leadership all members that repeatedly violate OPSEC standards, or single incidents of sever magnitude; identify threats and vulnerabilities

Ivy League Members:

comply with OPSEC procedures; report to ILN officers individals whom violate OPSEC standards; identify threats and vulnerablities


OPSEC PROCESS

General

OPSEC is accomplished using a six-step process:

  • 1) Identify critical information
  • 2) Analyze threats
  • 3) Analyze vulnerabilities
  • 4) Assess risk
  • 5) Apply OPSEC measures
  • 6) There is no six

Although these steps are normally applied in a sequential manner during deliberate or crisis action planning, dynamic situations may require any step to be revisited at any time.

Identify Critical Information


Analyze Threats


Analyze Vulnerabilities


Assess Risk


Apply OPSEC Measures


OPSEC ASSESSMENTS

Assessments are performed to achieve two specific purposes: to provide information and data into the OPSEC risk analysis process and to gauge the overall effectiveness of the program.

The CEO, Ivy League Directors, and ILN Leadership will conduct random assessments using undisclosed procedures, then take needed steps to correct any problems found.



This information was extrapolated, in-part, from The United States Air Force OPSEC Program Then it was edited because this is a game.