1 d
Opsec planning should focus on?
Follow
11
Opsec planning should focus on?
Specific facts about friendly intentions, capabilities, and activities needed by adversaries to plan and act effectively against friendly mission accomplishment. • Adds section in OPSEC overview on cyberspace, highlighting the key vulnerabilities associated with Internet use, to. This renowned institution is dedicated to helping indi. understanding that protection of sensitive unclassified information is: the responsibility of al persons, including civilians and contractors. Operational Security, commonly called OPSEC, is a risk management strategy and process that helps identify critical information adversaries could use to inflict harm. Operations Security (OPSEC) isn't rocket science, nor should it be. This publication describes the use of operations security in the planning, preparation, and execution of joint operations. -None of the answers are correct. OPSEC planning should focus on: Routine daily activities to include all unclassified information. • Adds section in OPSEC overview on cyberspace, highlighting the key vulnerabilities associated with Internet use, to. Where is the CIL located? ***** Wrong ***** In the EUCOM J2/Intelligence Directorate. The service is currentl. Are you looking for an exciting and challenging game that can help improve your focus and coordination? Look no further than piano tiles game play online. Reference: AFI 10-701, OPSEC. Identifying and protecting critical information Study with Quizlet and memorize flashcards containing terms like To ensure that contractors fully understand what they will be required to do if awarded a contract, contracting officers insert language primarily into which of the following sections of the Uniform Contract Format, The Program Protection Plan focuses on protecting technology, whereas an OPSEC plan focuses on protecting critical. 3) OPSEC planning should focus on: Identifying and protecting critical information. -It is required by the JTF commander to formulate operational COAs in the planning process. During operations Rolling. Customer focus is an organizational stance in which all aspects of a company’s production and delivery of goods or services are directed by the best interests of the customers Examples of customer focus include achieving 100 percent satisfaction from all customers and having a business culture that is built around the customers’ needs The difference between the epicenter and the focus of an earthquake lies in the location of their origins. It focuses the OPSEC process on protecting all unclassified information. Learn how you can become an OPSEC professional. A threat is an adversary that has the _____ + _____ to take any actions detrimental to the success. Weegy: OPSEC's most important characteristic is that: It is a process. • OPSEC planning guidance should be provided as part of the commander’s planning guidance. But when in doubt, Oliver said employees should contact their agency's OPSEC coordinator. PURPOSE: This OPSEC plan will provide the structure needed to offer OPSEC guidance and support to (organization). Another OPSEC meaning is a process that identifies seemingly innocuous actions that could inadvertently reveal critical or sensitive data to a cyber criminal. an operational function, not a security function. It focuses on preventing our adversaries' access to information and actions that may compromise an operation. OPSEC planning should focus on: Identifying and protecting critical information. OPSEC planning should focus on Identifying and protecting critical information Operations Security (OPSEC) is defined as, "a process of identifying, analyzing, and controlling critical information indicating friendly actions associated with military operations and other. OPSEC is a systematic process that helps us deny potential adversaries information about our capabilities and intentions by i\entifying, controlling, and protecting generally unclassified information associated with the planning and execution of sensiti對ve activities. 1 Military service afforded me unique opportunities and insights obtained throughout assignments that spanned across the intelligence community and multiple areas of warfare. OPSEC is concerned with: • Updates definitions of operations security (OPSEC) and OPSEC indicators. OPSEC planning should focus on Identifying and protecting critical information. OPSEC planning guidance should also outline OPSEC measures to complement physical, information, personnel, signals, computer, communica tions, and electronic security measures include, but are not limited to, counterimagery, cover, conceal ment, and deception. This answer has been confirmed as correct and helpful. Annual Awareness- Managing Soldiers and Civilians with a Security Clearance/ Access. May 8, 2019 · Operations security (OPSEC) is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever. PURPOSE: This OPSEC plan will provide the structure needed to offer OPSEC guidance and support to (organization). OPSEC countermeasures shall be employed to deny to adversaries and potential adversaries indicators that reveal critical information about DoD missions and functions See Enclosure 2. • OPSEC should be integrated into the IO cell. References: This instruction and other OP references as applicable Purpose: To establish OPSEC within. However, without a well-defined plan, it’s easy to lose focus and motivation. OPSEC planning should focus on: Click the card to flip. OPSEC countermeasures shall be employed to deny to adversaries and potential adversaries indicators that reveal critical information about DoD missions and functions See Enclosure 2. OPSEC is concerned with: Identifying, controlling, and protecting unclassified information that is associated with specific military operations and activities. In today’s fast-paced market, companies are constantly looking for ways to gain valuable insights into consumer behavior. Determining the risk level of each vulnerability. None of the answers are correct. The commander's forC2W are the basis OPSECplanning. Check out this article and find out how OPSEC can boost your organization's security against threat actors! Service Chiefs provide Service OPSEC policy, doctrine, and planning procedures consistent with OPSEC policy, doctrine, and guidance. This publication describes the use of operations security in the planning, preparation, and execution of joint operations. or tacticol) should immediately be reported and evaluated for their potential impact. Identifying adversary order of battle information. OPSEC entails the analysis of IT operations and systems intending to identify potential threats and implement relevant security best practices to address them preemptively. Exam (elaborations) $7 Add to cart Add to wishlist. Through the memorandum, the Secretary initiated an OPSEC campaign to change the culture across the department through focused OPSEC training required for all DOD personnel, including civilians. Since its introduction, OPSEC has been adopted by many organizations and sectors to safeguard sensitive information in various contexts beyond the military. management has the following critical aspects: commander involvement, operational focus, integration, coordination, and self-inspection. The CII identified during the OPSEC cycle results in a list called the Critical Information and Indicators List, or CIIL for short. OPSEC Action 3--Analysis of Vulnerabilities. OPSEC is: An operations function, not a security function. • OPSEC should be integrated into the IO cell. OPSEC challenges us to look at ourselves through the eyes of an adversary and deny the adversary the ability to act. • Adds section in OPSEC overview on cyberspace, highlighting the key vulnerabilities associated with Internet use, to. Identifying and protecting critical information A process that is a systematic method used to identify, control, and protect critical information. May 8, 2019 · Operations security (OPSEC) is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever. The OPSEC process shall be used to identify and mitigate indicators of U intentions, capabilities, operations, and activities. Score 1User: OPSEC planning should focus on:Weegy: Operations security (OPSEC) is a process that involves the identification and protection of unclassified critical information or processes that can be used by a competitor to gain real information when pieced [ together. In dynamic situations, however, individual. • OPSEC planning should focus on identifying and protecting critical information. Participates in awareness training? 22. With constant distractions and information overload, it’s important to find effective ways to. In coordination with the USD(I&S), develop standards and procedures for. In today’s fast-paced world, finding ways to enhance productivity and maintain focus can be a challenge. g and protecting critical information Workforce communication is essential to understanding what information must be protected and how to protect it. A vulnerability exists when: The adversary is capable of collecting critical information, correctly analyzing it, and then taking timely action. opsec is: an operations function, not a security function 5. -Classified information critical to the. OPSEC planning should focus on: Identifying and protecting critical information. None of the answers apply. Incorporating OPSEC practices into daily lives is, by definition, good OPSEC. OPSEC gets information technology (IT) and security managers to view their operations and systems as potential. The protection of classified information, projects, and missions is of paramount importance in fulfilling security responsibilities in connection with the Department of Energy (DOE). Air Force implements OPSEC in all _______ areas Opsec definition. • OPSEC should be integrated into the IO cell. OPSEC Indicators OPSEC indicators are friendly detectable. Specific facts about friendly intentions, capabilities, and activities needed by adversaries to plan and act effectively against friendly mission accomplishment. One of the most popular methods of gathering consumer insights is through online paid focus gro. Enhanced operational effectiveness occurs when decision-makers apply OPSEC from the earliest stages of planning. uploadhaven pro account free reddit Aug 20, 2020 · The OPSEC process shall be used to identify and mitigate indicators of U intentions, capabilities, operations, and activities. Previously searched by you Where do you study The Netherlands Germany France South Africa Defense Counterintelligence and Security Agency - Center for Development of Security Excellence CDSE presents OPSEC Awareness for Military Members, DOD Employees, and Contractors. OPSEC Indicators OPSEC indicators are friendly. OPSEC is: a process that is a systematic method used to identify, control, and protect critical information. When a contract requirement exists to have an OPSEC Plan, use this resource for completing. Additionally, it provides the procedures for the conduct of OPSEC surveys (Organization) OPERATIONS SECURITY (OPSEC) PLAN (Date) 1. • OPSEC planning guidance should be provided as part of the commander’s planning guidance. OPSEC is an operational function, not a security function Planning must focus on identifying and protecting critical information. The purpose of OPSEC is to: Reduce the vulnerability of US and multinational forces from successful adversary exploitation of critical information. OPSEC Indicators OPSEC indicators are friendly. Aug 20, 2020 · The OPSEC process shall be used to identify and mitigate indicators of U intentions, capabilities, operations, and activities. An operations function, not a security function. Operations security (OPSEC) is a vital component in developing protectionmechanisms to safeguard sensitive information and preserve essentialsecrecy. ballymena times news None of the answers apply. This publication describes the use of operations security in the planning, preparation, and execution of joint operations. • OPSEC planning should focus on identifying and protecting critical information. Are you looking for a way to enhance your personal growth and unlock your full potential? Look no further than Focus Academy. Many start the new year with an idea of achieving. JFCs should establish a fully functional IO cell. Study with Quizlet and memorize flashcards containing terms like Reference, Define OPSSEC, 5 step planning process and more. To boil that down further, it is making sure bad guys don't have any information about you that they can use against you. Results for "OPSEC planning should focus on:" All results Study sets Textbooks Questions Users Classes 0 classes opsec 5 study sets 2 classes. Are you looking for a way to enhance your personal growth and unlock your full potential? Look no further than Focus Academy. • OPSEC is an operations function, not a security function. It specifically addresses threat, critical information, vulnerabilities and risks, and necessary OPSEC measures to protect the (organization) mission Understanding how a threat could potentially exploit vulnerabilities to compromise your personal information and learning different countermeasures to prevent it are key to ensuring critical information doesn’t land in the adversary’s hands. OPSEC planning should focus on: Routine daily activities to include all unclassified information. This renowned institution is dedicated to helping indi. It is intended to be a living document that will require periodic updates throughout the life of the contract. OPSEC planning should focus on Identifying and protecting critical information Operations Security (OPSEC) is defined as, "a process of identifying, analyzing, and controlling critical information indicating friendly actions associated with military operations and other. Per National Security Presidential Memorandum (NSPM)-28, "The National Operations Security Program," the intent is for OPSEC to be a repetitive cycle, not a single process. OPSEC planning should focus on Identifying and protecting critical information. Identifying and protecting critical information. george mason youtube Information Assurance- Cyber Awareness Challenge 2021. Protecting critical and sensitive information is essential to protecting the success of our missions, and to protecting the lives of U service members, DOD employees, contractors, and family members. OPSEC is: A process that is a systematic method used to identify, control, and protect critical information OPSEC planning should focus on: Identifying and protecting critical information OPSEC is: An operations function, not a security function OPSEC is concerned with: Identifying. The Operations Security Process. • Adds section in OPSEC overview on cyberspace, highlighting the key vulnerabilities associated with Internet use, to. [Show more] Question : OPSEC planning should focus on: Options: Identifying and protecting critical information. OPSEC Indicators OPSEC indicators are friendly. Organizational leaders focus on mid-range planning and mission accomplishment takes 1 to 5 years or more. None of the answers apply. Planning a funeral can be a trying time both emotionally and financially. Learn term:operational security = opsec with free interactive flashcards. 2 Has the OPSEC Program Manager prepared an OPSEC plan? 21. OPSC planning should focus on: identifying and protecting critical information. OPSEC Indicators OPSEC indicators are friendly. an OPSEC indicator is defined as: friendly detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information. February is a month of love and operational security (OPSEC). • OPSEC planning should focus on identifying and protecting critical information. Through the memorandum, the Secretary initiated an OPSEC campaign to change the culture across the department through focused OPSEC training required for all DOD personnel, including civilians. -An OPSEC situation that indicates adversary activity. Results for "OPSEC planning should focus on:" All results Study sets Textbooks Questions Users Classes 0 classes opsec 5 study sets 2 classes. Routine daily activities that only include classified information. It is effective upon receipt and supersedes NTTP 3-13. OPSEC planning should focus on: Routine daily activities to include all unclassified information.
Post Opinion
Like
What Girls & Guys Said
Opinion
4Opinion
This article provides best practices for personal OPSEC plans, such as including personal accounts and devices, getting high-risk employees on board, and having social media policies. Operations Security (OPSEC) is a capability that uses a process to preserve friendly essential secrecy by identifying, controlling and protecting critical information and indicators that would allow adversaries or potential adversaries to identify and exploit friendly vulnerabilities. operations security (OPSEC) in the planning, preparation, and execution of joint operations. OPSEC is: - Answer- A process that is a systematic method used to identify, control, and protect critical information 
 
OPSEC planning should focus on: - Answer- Identifying and protecting critical information 
 
OPSEC is: - Answer- An operations function, not a security. It focuses the OPSEC process on protecting all unclassified information. By using this ISInformation System (which includes any device attached to this ISInformation System ), you consent to the following conditions: List of Five Conditions: -Condition 1: The USG routinely intercepts and monitors. • OPSEC planning should focus on identifying and OPSEC Planning OPSEC planning and execution occur as part ofthe or organization's C2Weffort. The identification of critical information is a key part of the OPSEC process because: OPSEC planning must focus on mission needs, provide guidance and coordination, and ensure information is consistently controlled across organizational lines As organizational activities begin, they should be monitored and the OPSEC planning adjusted to changing mission needs as well as to the adversary's changing capabilities and. • OPSEC planning guidance should be provided as part of the commander’s planning guidance. [Show more] Terms in this set (14) Protection of various forms of information, which may contain intelligence indicators of value to hostile elements is _________ What is OPSEC's goal? to idenifty information and observe actions relating to mission capabilitites, limitation, and intentions. OPSEC is: - Answer- A process that is a systematic method used to identify, control, and protect critical information 
 
OPSEC planning should focus on: - Answer- Identifying and protecting critical information 
 
OPSEC is: - Answer- An operations function, not a security. Learn how to protect executives and employees with access to sensitive enterprise data from cyberattacks and social engineering. May 8, 2019 · Operations security (OPSEC) is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever. Specific facts about friendly intentions, capabilities, and activities needed by adversaries to plan and act effectively against friendly mission accomplishment. motorhomes for sale seattle In the OPSEC process, it is important to distinguish between The mission of the Defense OPSEC Planners Course (DOPC) is to establish a common level of understanding for OPSEC planners who will serve in joint operational-level OPSEC billets. "Operations security (OPSEC) is an analytic process used to deny an adversary information - generally unclassified - concerning friendly intentions and capabilities by identifying, controlling, and protecting indicators associated with planning processes or operations. OPSEC Program Plan ChecklistOPSEC Program Plans: OPSEC Program Plans outline the broad OPSEC Program objectives f. Log in for more information. National OPSEC Awareness Month, January 2023, Bulletin 2. To develop an effective operations security program, the organization's OPSEC officer must understand the range of threats thatconfront his activity. It's a discipline of military origins that in the computer age has become vital for government and private organizations alike. Assess the Risk. Studia con Quizlet e memorizza le flashcard contenenti termini come Operations security (OPSEC) defines critical information as:, Understanding that protection of sensitive unclassified information is:, OPSEC planning should. • OPSEC should be integrated into the IO cell. Aug 20, 2020 · The OPSEC process shall be used to identify and mitigate indicators of U intentions, capabilities, operations, and activities. 3, Operations Security - Navy. Score 1 User: OPSEC is: Weegy: Operations security (OPSEC) is a process that identifies critical information to determine if friendly actions can be observed by enemy. All personnel will receive OPSEC orientation training within [30/60/90] days of assignment. It is the fifth and final step of the OPSEC process. It is required by the JTF commander to formulate operational COAs in the planning process. OPSEC countermeasures can be used to: Prevent the adversary from detecting an indicator and from exploiting a vulnerability. indiana craigslist pets None of the answers apply. Related questions 1 answer. 02 "DoD Operations Security (OPSEC) Program Manual"). Additionally, it provides the procedures for the conduct of OPSEC surveys. Specific facts about friendly intentions, capabilities, and activities needed by adversaries to plan and act effectively against friendly mission accomplishment. January's National OPSEC Awareness Month, as set forth in the 2021 National Security Presidential Memorandum (NSPM)-28, is in its second year recognizing government requirements that support the. This web-based course provides OPSEC awareness for military members, government employees, and contractors. User: OPSEC planning should focus on Question. Operational security (OPSEC) is a security and risk management process that prevents sensitive information from getting into the wrong hands. Operations Security (OPSEC) is vital and. Identifying adversary order of battle information. None of the answers are correct. The OPSEC process is designed to protect critical information from unauthorized access, collection, or exploitation by adversaries. operations security (OPSEC) in the planning, preparation, and execution of joint operations. This handy guide is provided to assist Defense Contractors with understanding the ins and outs of meeting OPSEC requirements specified in contracts. • OPSEC should be integrated into the IO cell. OPSEC planning should focus on: Routine daily activities to include all unclassified information. OPSEC planning should focus on: Routine daily activities to include all unclassified information. halyard n95 Annual Awareness- Managing Soldiers and Civilians with a Security Clearance/ Access. January's National OPSEC Awareness Month, as set forth in the 2021 National Security Presidential Memorandum (NSPM)-28, is in its second year recognizing government requirements that support the. Operations security, or opsec, is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever adversary, reveal a bigger picture that ought to stay hidden. The first step in establishing an OPSEC program is acknowledging that … National Operations Security (OPSEC) Awareness Month is an opportunity for government agencies, public and private-sector entities, and individuals to reflect on ways to mitigate the various vulnerabilities, risks, and threats to their organizations. This renowned institution is dedicated to helping indi. opsec is concerned with: identifying, controlling and protecting unclassified information that is associated with specific military operations and activities 6. This presentation provides OPSEC awareness for military members, government employees, and contractors. an operational function, not a security function. OPSEC Factors Some of the factors that must be considered when conducting OPSEC planning: • OPSEC planning guidance should be provided as part of the commander's planning guidance. • Adds section in OPSEC overview on cyberspace, highlighting the key vulnerabilities associated with Internet use, to. Step 2: Evaluate a threat involves identifying threats and vulnerabilities and then applying available resources and planning in order to mitigate the most significant threats based on a. Operational security, or OPSEC, is a security and risk management process to systematically identify, assess and mitigate risks to organisational operations, assets, and personnel. OPSEC countermeasures shall be employed to deny to adversaries and potential adversaries indicators that reveal critical information about DoD missions and functions See Enclosure 2. OPSEC is both a process and a strategy, and.
• OPSEC planning should focus on identifying and protecting critical information. Routine daily activities that only include classified information. The National OPSEC Program Office provides OPSEC resources and awareness materials year round. Exam (elaborations) $7 Add to cart Add to wishlist. The speaking section of. sec video an OPSEC indicator is defined as: friendly detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information. Routine daily activities that only include classified information. OPSEC planning should focus on: Identifying and protecting critical information. - Routine daily activities to include all unclassified information is not the primary focus of OPSEC planning, so this choice is incorrect. Markham College · Lima, Peru. benson idahosa miracles pdf OPSEC is: An operations function, not a security function. • OPSEC should be integrated into the IO cell. OPSEC planning should focus on: Identifying and protecting critical information. Additionally, it provides the procedures for the conduct of OPSEC surveys (Organization) OPERATIONS SECURITY (OPSEC) PLAN (Date) 1. • OPSEC planning should focus on identifying and protecting critical information. Identifying and protecting critical information. OPSEC Program Plan ChecklistOPSEC Program Plans: OPSEC Program Plans outline the broad OPSEC Program objectives f. rspca leicester A doctrine designed to keep military secrets safe can be invaluable to your organization. Are you looking for the best Airtel DTH plan that suits your entertainment needs? With so many options available in the market, it can be overwhelming to choose the right plan Consumer Cellular is a popular cell phone service provider that offers affordable and flexible plans for consumers of all ages. Additionally, it provides the procedures for the conduct of OPSEC surveys (Organization) OPERATIONS SECURITY (OPSEC) PLAN (Date) 1. Where is the CIL located. Identifying adversary order of battle information. OPSEC is concerned with: • Updates definitions of operations security (OPSEC) and OPSEC indicators.
None of the answers are correct. Today, these principles are used both by infosec. OPSEC planning guidance should also outline OPSEC measures to complement physical, information, personnel, signals, computer, communica tions, and electronic security measures include, but are not limited to, counterimagery, cover, conceal ment, and deception. OPSEC is a systematic process that helps us deny potential adversaries information about our capabilities and intentions by i\entifying, controlling, and protecting generally unclassified information associated with the planning and execution of sensiti對ve activities. OPSEC planning should focus on: Identifying and protecting critical information. When a contract requirement exists to have an OPSEC Plan, use this resource for completing. Develop a team-participation landing page with tips and resources for team leaders Make it easy for them to register and book housing Offer meet-up spaces Develop case studies and share stories of teams that have implemented change after attending Provide a room upgrade to a suite for any organization bringing 10 participants or. Markham College · Lima, Peru. OPSEC planning should focus on: Routine daily activities to include all unclassified information. OPSEC planning should focus on: Identifying and protecting critical information. Search for an answer or ask Weegy. Additionally, it provides the procedures for the conduct of OPSEC surveys. Specific facts about friendly intentions, capabilities, and activities needed by adversaries to plan and act effectively against friendly mission accomplishment. Protection of CI will include the adherence to and execution of countermeasures which the contractor initiates or as provided by SWF OPSEC Officer or installation OPSEC Officer, for CI on or related to the SOW/PWS OPSEC Planning OPSEC planning and execution occur as part ofthe or organization's C2Weffort. Most of us apply OPSEC principles in our daily lives without realizing it. rural properties in newtownards area 1 study set, 1 member. OPSEC Awareness for Military Members, DOD Employees, and Contractors BACK Submit Transcript Search for an answer or ask Weegy. Additionally, it provides the procedures for the conduct of OPSEC surveys (Organization) OPERATIONS SECURITY (OPSEC) PLAN (Date) 1. After use, units must sanitize, secure, or destroy the sketch map. None of the answers apply. A vulnerability exists when: The adversary is capable of collecting critical information, correctly analyzing it, and then taking timely. In small to medium-sized entities, lack of resources and time forces people. It is required by the JTF commander to formulate operational COAs in the planning process. Match the five-step OPSEC process with the action associated with the step. an OPSEC indicator is defined as: friendly detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information. It specifically addresses threat, critical information, vulnerabilities and risks, and necessary OPSEC measures to protect the (organization) mission Understanding how a threat could potentially exploit vulnerabilities to compromise your personal information and learning different countermeasures to prevent it are key to ensuring critical information doesn’t land in the adversary’s hands. With a focus on providing affordable air trav. cheap truck for sale near idaho OPSEC countermeasures reduce the likelihood that critical information will be unintentionally disclosed to threat actors and should be applied to all election security risk areas, including people, operations, cybersecurity, and physical security. Identifying and protecting critical information OPSEC planning should focus on: Click the card to flip. Aug 20, 2020 · The OPSEC process shall be used to identify and mitigate indicators of U intentions, capabilities, operations, and activities. understanding that protection of sensitive unclassified information is: the responsibility of al persons, including civilians and contractors. None of the answers apply. • OPSEC planning guidance should be provided as part of the commander’s planning guidance. Routine daily activities that only include classified information. To ensure the effectiveness of [OPSEC] policies, organizations need to focus on several core elements. II) Risk assessments estimate the: a) adversary's ability to exploit a vulnerability b) potential effects on the operation c) Cost. an OPSEC indicator is defined as: friendly detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information. Identifying adversary order of battle information. Reduce the risk of an adversary exploiting vulnerabilities. r the organization/activity. The course provides information on the basic need to protect unclassified information about operations and personal information to ensure safe and successful operations and personal safety. Log in or sign up first. Identifying and protecting critical information. • OPSEC is an operations function, not a security function. Planning a funeral can be a trying time both emotionally and financially. Additionally, it provides the procedures for the conduct of OPSEC surveys (Organization) OPERATIONS SECURITY (OPSEC) PLAN (Date) 1.