OPSEC Basics
OPSEC Cycle
CSFE CII List
My Responsibilities
100

A continuous cycle that identifies unclassified critical information and indicators, analyzes potential threats and vulnerabilities, assesses risks, and develops countermeasures to safeguard CII.

What is OPSEC?

100

This is the first step in the OPSEC cycle, crucial for determining what needs protection.

What is Identify Critical Information and Indicators?

100

An easily lost or stolen item that allows entrance to a military location.

What is access/identification cards?

100

This is not just a one-time event; personnel are directed to do this as a method of ongoing OPSEC and for a commitment to force readiness.

What is complete annual OPSEC training?

200

This force is constantly attempting to collect information on the Department of the Navy and will attempt to exploit any weakness they can, to include our personnel.

What are our adversaries? 

200

This OPSEC action focuses on understanding both the intent and capability of someone who might seek to compromise your information.

What is Analyze Threat?

200

This information, whether it's a social security number, date of birth, or financial information, requires special protection.

What is Personally Identifiable Information (PII)?

200

To secure NIPRNET emails with CUI, PII, and sensitive info, this is needed to not have your message breached.

What is utilize digital signatures and encryption?

300

The probability an adversary will gain knowledge of your critical information, and the impact it will have on our mission if they’re successful. 

What is risk? 

300

This step in the OPSEC process identifies weaknesses that an adversary could exploit to gain access to critical information.

What is Analyze Vulnerabilities?

300

The public release of this information could reveal vulnerabilities in our base's physical security measures.

What are detailed installation maps/site photography/building plans?

300

After you utilize critical, sensitive, or outdated documents (not designated for retention), this simple action protects your operation from an information leak.

What is shred all office-generated documents (using approved shredders)?

400

Everyone in our command must be familiar with this command specific OPSEC list.

What is the CSFE Critical Information and Indicators (CII) list?

400

This OPSEC activity considers the potential cost if critical information is compromised, including loss of lives, mission failure, loss of money, and loss of time.

What is Assess Risk?

400

Revealing details about this could allow adversaries to gain insight into our command's priorities and resource allocations.

What is CSFE budget information?

400

When considering posting on social media, the expectation is “When in doubt, ____.”

What is “do not post” the information?

500

The easiest action that you can take if you have recommendations for the OPSEC program or OPSEC concerns.

What is notify the OPSEC Program Manager?

500

As part of the OPSEC cycle, it is essential that personnel undertake this process to maintain that operations remain safe.

What is Periodic Assessment?

500

Even though it's not classified, this needs to be handled carefully, and access should be limited to those with a need-to-know.

What is Controlled Unclassified Information/For Official Use Only Information?

500

To avoid the potential for identity theft or unauthorized base/computer access.

What is maintain personal control of Common Access Card?

M
e
n
u