skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 113311 Find in a Library
Title: OPSEC (Operations Security) Check
Journal: Security Management  Volume:32  Issue:7  Dated:(July 1988)  Pages:67-70
Author(s): R A Fisher; D B Nickell
Date Published: 1988
Page Count: 4
Type: Program/Project Description
Format: Article
Language: English
Country: United States of America
Annotation: Developed during the Viet Nam War, the operations security program (OPSEC), is a set of management procedures to protect classified and sensitive Government operations, programs, and activities.
Abstract: While the protective techniques include all security disciplines, primary emphasis is given to the role of policies, practices, and procedures in protecting critical information. Because of the procedural nature of OPSEC, responsibility for implementation and operation rests with senior management. In reducing the threat represented by hostile national or corporate intelligence systems, the first step involves a self-assessment that includes identifying adversaries, their objectives, and the information they need to attain their objectives. Management must stipulate this information so that security can be tailored to meet specific needs. The size of the OPSEC response should be based on a cost/benefit analysis, and the response should be formalized in the firm's standard operating procedures. An OPSEC master plan should be developed that details the who, what, when, where, and why of the program's key elements. Once this is done, the organization is ready to implement the plan. First, the self-assessment should be validated to ensure that all threats and vulnerabilities were properly identified. Surveys can be conducted to identify the program's hazards and shortcomings. An outside consultant can be used to objectively evaluate the firm's internal efforts. A monitoring process should be developed to provide objective oversight and minimize illegal or unethical activities.
Main Term(s): Business security
Index Term(s): Classified information; Security management; Threat assessment
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=113311

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.