Applying the Network Security OPSEC Principles (word count 200)Do a fictional or imaginary comparison for the following scenario.Describe a violation of OPSEC principles that plays a major role in the plot of a movie you have seen, then describe briefly how the 5 step process should have been carried out, and how it wasnt followed.(This shows up in spy and war movies all the time, often making the plots less believable to someone aware of OPSEC principles and how people with access to sensitive information are trained in OPSEC.)Optional Movie Example (can be any movie or non movie/story):Green Zone (2010) Part 1 – 12http://www.youtube.com/watch?v=_Qsfi8FbePUSet in Iraq in 2003, Green Zone’s all about America’s invasion of Iraq under false pretenses.’Green Zone’ Movie Reviewhttp://movies.about.com/od/greenzone/fr/green-zone-review.htmOPSEC five steps: 1.identification of critical information, – weapons of mass destruction(WMD)2.analysis of threats, – terrorism, war , lost of life3.analysis of vulnerabilities, – corrupt information, occupying a foreign country4.assessment of risks, – USA civilian and military safety5.application of appropriate countermeasures destroy WMD, capture Sadam Hussein and associates.
Consider the following information, and answer the question below. China and England are international trade…
The CPA is involved in many aspects of accounting and business. Let's discuss some other…
For your initial post, share your earliest memory of a laser. Compare and contrast your…
2. The Ajax Co. just decided to save $1,500 a month for the next five…
How to make an insertion sort to sort an array of c strings using the…
Assume the following Keynesian income-expenditure two-sector model: AD = Cp + Ip Cp = Co…