StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Operational Security - Assignment Example

Cite this document
Summary
The operations security process seeks to analyze information and assess any form of potential threats (Tipton & Krause, 2003). Several law enforcement agencies have…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Operational Security
Read Text Preview

Extract of sample "Operational Security"

Operations Security Provide an example of a law enforcement agency in the United s that has implemented effective operational security (OPSEC) procedures since 9/11? Operations security (OPSEC) is a term that traces its origin from the jargons used in the US military. The operations security process seeks to analyze information and assess any form of potential threats (Tipton & Krause, 2003). Several law enforcement agencies have successfully adapted OPSEC procedures. The FBI has adapted the OPSEC procedures to supplement their security planning (Tipton & Krause, 2003).

The FBI falls under Homeland Security, which was tasked to ensure nothing like 9/11 attacks happens in the United States again. The bureau has been effective in implementing OPSEC procedures to aid in threat assessment and detection. What were the OPSEC procedures? Operations security systems focus on fighting terrorism using proactive measures instead of reactive measures. The FBI has implemented all the steps, which has boosted the fighting against terrorism. The starting step in the OPSEC process is the identification of critical information that an enemy might need to attack.

The identification of critical information aids in protecting the most important information. Second, an analysis of all the threats should be performed. Threat analysis entails research and comprehensive of intelligence, open source information and counterintelligence (Andress, 2011). They might help in determining the potential threats. The third step in the operation security process is the analysis of vulnerabilities. It involves assessing the entire operation with the aim of identifying any OPSEC indicators that could reveal sensitive information.

The intelligence obtained at this stage is compared with what the enemy’s intelligence is capable. Information on the capability of the enemy’s intelligence was determined during threat analysis. Risk assessment is the next after analysis of vulnerabilities. The operation planners work around the clock to identify the vulnerabilities that have been identified. They come up with OPSEC measures to each identified vulnerability. OPSEC measures are selected for application. The final process in operations security is the application of relevant measures.

The command is expected to implement the measures that were identified during risk assessment. It can also entail the implementation of OPSEC measures that are found in implementation plans.Describe what problems you envision the lack of an effective OPSEC program could hold for a local, county, state, tribal, or federal law enforcement agency. The lack of an efficient operation security program puts the law enforcement agencies at an enormous risk. Information and communication are critical factors when it comes to the effective functioning of any law enforcement agencies.

As a result, terrorist tend to target communication networks that belong to law enforcement agencies. The aim is to ensure communication is impossible. The presence of an OPSEC would ensure that law enforcement agencies could protect their communication network. Improper planning and inadequate analysis might lead to mistakes that cost lives. Operations security program ensures law enforcement officers are taught to analyze threats and come up with valid conclusions (Baker, 2005). Threat analysis is very importance since it gives a law enforcement agency a chance to be proactive.

The program encourages proactive measures, which are effective in preventing terrorist attacks. Reactive measures can lead to the manipulation of a security agency. The use of intelligence analysts helps in assessing a threat and determining the best solution. It would not be possible without the establishment of an OPSEC program. An OPSEC program ensures law enforcement agencies perform at their best whether it is local, state, county or federal level.ReferencesAndress, J. (2011). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice.

Burlington: Elsevier Science.Baker, T. E. (2005). Introductory Criminal Analysis. Pearson Custom Pub.Tipton, H. F., & Krause, M. (2003). Information "Security Management Handbook. CRC Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Operational Security Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Operational Security Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/psychology/1677692-operational-security
(Operational Security Assignment Example | Topics and Well Written Essays - 500 Words)
Operational Security Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/psychology/1677692-operational-security.
“Operational Security Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/psychology/1677692-operational-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Operational Security

Information Sensitivity and Protection of Data

In addition, one of very important features of the BIDMC security and privacy policy is to improve and optimally augment the overall working and Operational Security of the corporate confidential/ownership data and details.... This paper presents an overview of information security and privacy policies of three different organizations.... This paper will proficiently assess some of the main aspects of information security and privacy management for the specified organizations....
3 Pages (750 words) Essay

Examination of Major Epistemological Constraints

The main aim for this secrecy was to intensify Operational Security and eliminate any prospects of external... Examination of Major Epistemological Constraints Name: Instructor: Task: Date: Examination of Major Epistemological Constraints Epistemology is one of the most discussed areas in terms of learning and development....
12 Pages (3000 words) Essay

Reasons of the Exponential Increase in Franchising Business

hellip; This exponential growth is a result of various benefits offered by franchising strategy such as success rates, security in operations, immediate boosts in sales due to brand power and increased credibility.... Franchising – Just Dogs Name University EXECUTIVE SUMMARY The franchising business is one of those business domains that have seen an exponential increase in the last 2 decades....
4 Pages (1000 words) Research Paper

Operations security and production controls

The organization that I work for has well defined rules to regulate Operational Security and production controls.... The Operational Security in the firm is maintained by both uniformed personnel members of the staff who are directly associated with ongoing projects.... … The concept of security should encompass both the concepts of physical as well as intangible materials like information which can be orally compromised.... One of the most important instructions that the security personnel adhere to, is that access to specific areas of the company is need based rather than designation based....
4 Pages (1000 words) Essay

Social Marketing, Sustainability and Racism in Australia

Therefore, it is imperative that organization takes account of their network for security threats and for this hire a security expert who guides the management on how to secure organization's network and… In addition, it is yet vital and significant to maintain exceptional security in a networked structure.... The security management can involve the handling and implementation of the security measures for the securing of network and corporate business information....
15 Pages (3750 words) Essay

Security Plan for the Department of Homeland Security

The Operational Security... Physical security refers to the protection of assets from deliberate or accidental damage, vandalism, theft, catastrophe and other natural and man-made threats (Tipton and Krause, 2003.... Broadly speaking, the physical security is more related to controlling access to… 465).... Additionally, it is a way to protect the critical information that is central to overall security measure and security framework (Flammini, 2012....
4 Pages (1000 words) Admission/Application Essay

Dependence on IT in Business Operations

As organizations continue to increase their dependence on IT in business operations, information security has continuously presented numerous challenges.... Information security has become a dynamic and complex function, which provides an approach for information security managers… This dependence on computers has necessitated the inclusion of technology-based information security systems that seek to ensure protection of Information is an important asset to the organizations and its protection is critical to the sustainability of organizational operations....
5 Pages (1250 words) Admission/Application Essay

The Ten-Year Search for Bin Laden - from 9/11 to Abbottabad

This research will begin with the statement that the security analyst Peter Bergen has significantly executed an excellent job at recounting the 10-year United States of America track of Osama and consequential death of Osama Abbottabad, Pakistan.... The raid was never executed by the surprising Seal team, dangerous from an operational standpoint, and it was as well tricky from a political perspective....
4 Pages (1000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us