DOCUMENT
OPSEC Glossary of Terms
154 definitions by Interagency OPSEC Support Staff

Acceptable Level of RiskAccess Control MechanismsAcoustic IntelligenceAdversaryAdversary Collection MethodologyAdversary Threat StrategyAgentAnalysisAssessmentAssetAuthenticationAuthenticityAutomated Information SystemsAvailabilityCamouflageCase OfficerClandestine OperationClassificationClassification GuideClassified InformationCommand and Control WarfareCommercial-off-the-shelfCommunications IntelligenceCommunications ProfileCommunications SecurityCompartmentationCompromiseCompromising EmanationsComputer SecurityComsec MonitoringConcealmentConfidentialityConfidential SourceContingency PlanControlled InformationCounterintelligenceCountermeasureCoverCovert OperationCritical and Sensitive Information ListCritical InformationCritical InfrastructuresCryptanalysisCrypto-EquipmentCryptographyCryptosecurityDamageDeceptionDefense Information InfrastructureDefense Information Systems NetworkDenialDenial of ServiceDirection FindingEconomic IntelligenceElectronic IntelligenceElectronic SecurityElectronic WarfareEmissions SecurityEspionageEssential Elements of Friendly InformationEssential Elements of InformationExploitationFacilitiesFirewallFoeForeign Intelligence ServiceFreedom of Information ActFriendFriendlyGlobal Information InfrastructureGovernment-off-the-shelfHackerHuman IntelligenceImageryImagery IntelligenceImitative Communications DeceptionInadvertent DisclosureIncidentIndustrial EspionageInformationInformation AssuranceInformation IntegrityInformation of Intelligence ValueInformation OperationInformation SecurityInformation Systems SecurityInformation WarfareIntegrityIntelligenceIntelligence CollectionIntelligence CommunityIntelligence CycleIntelligence InformationIntelligence SystemIntentionInterceptLow Probability of DetectionLow Probability of InterceptManipulative Communications DeceptionMeasurement and Signature IntelligenceMultilevel securityNational Information InfrastructureNational SecurityNeed-to-KnowNonrepudiationObservablesOpen Source IntelligenceOperations SecurityOperations Security assessmentOperations Security IndicatorOperations Security PlanOperations Security ProcessOperations Security ProgramOperations Security SurveyOperations Security working GroupOvert CollectionOvert OperationPerceived Collection ThreatPhysical SecurityProcurementProfileProprietary InformationProtected InformationProtective MeasuresPsychological OperationsPublic DomainRiskRisk AnalysisRisk AssessmentRisk AvoidanceRisk ManagementSecure CommunicationsSecuritySensitive InformationSignals IntelligenceSignals SecuritySpecial Access ProgramSurveillanceTargetTelecommunicationsTelemetryTelemetry IntelligenceTempestTerrorismThreatThreat AnalysisThreat AssessmentTransmission SecurityType 1 ProductsUnauthorized DisclosureUndercover OperationVulnerabilityVulnerability AnalysisVulnerability Assessment
Loading conversations.
Date
2014-05-29
Related Entities