SlideShare une entreprise Scribd logo
1  sur  14
OPSEC Training & Awareness  to the Army Family
What, exactly,  is OPSEC?  OPSEC is protecting certain information that will keep your loved one safe. It’s making sure to keep the right kind of secrets to protect your loved one. What kind of secrets? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],OPSEC 101
What seemed like unimportant information from one site can be the start of the Google search leading to other sites.  Remember: even items which are deleted from Web sites  can still be searched!
Using Social Media to Stay Connected Social media outlets such as Facebook or chat options such as Gmail chat can be a great way to stay connected during deployments.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ Please burglarize  my house!”  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Even if you think you’re  being “clever,”  you could  accidentally leak a  small piece of  information.
Myth #1  – “I am no one they care about.” Fact #1  – One small piece of information can be the last puzzle piece the enemy needs. 4 Myths about OPSEC
4 Myths about OPSEC Myth #2  – “I don’t have any adversaries.” Fact #2  – Think about: former boyfriends/girlfriends, angry neighbors,  identity thieves
4 Myths about OPSEC Myth #3  – “I’m smarter than the enemy.”  Fact #3  – Information theft is a good    investment for the enemy. Some    nations are willing to spend      BILLIONS of dollars for our      seemingly trivial information.    One small mistake on line can   put our Soldiers at big risk.
4 Myths about OPSEC Myth #4  – “I don’t post on the Internet.”  Fact #4  – Unencrypted emails can be misrouted, intercepted or gathered.
Don’t be sad!  ,[object Object],[object Object],[object Object],[object Object],[object Object]
It’s ALWAYS better to  be cautious!
Questions?
Lindy Kyzer [email_address] 703.697.4314 ,[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Day 2: Bias Lesson
Day 2: Bias LessonDay 2: Bias Lesson
Day 2: Bias LessonSam Spurlin
 
Keep your teens safe on the internet
Keep your teens safe on the internetKeep your teens safe on the internet
Keep your teens safe on the internetDeborah Brown
 
Full Funnel Marketing for Facebook and LinkedIn
Full Funnel Marketing for Facebook and LinkedInFull Funnel Marketing for Facebook and LinkedIn
Full Funnel Marketing for Facebook and LinkedInDamon Gochneaur
 
Conspiracy Theories and Explanations
Conspiracy Theories and ExplanationsConspiracy Theories and Explanations
Conspiracy Theories and Explanationsdyeakel
 
Fake news? Protect yourself.
Fake news? Protect yourself.Fake news? Protect yourself.
Fake news? Protect yourself.Amy LC
 
Twitter ye Not - A journalist view of Twitter
Twitter ye Not - A journalist view of TwitterTwitter ye Not - A journalist view of Twitter
Twitter ye Not - A journalist view of TwitterPorter Novelli
 
2015 AppSecUSA 2015 - Wait wait... don't pwn me!
2015 AppSecUSA 2015 - Wait wait... don't pwn me!2015 AppSecUSA 2015 - Wait wait... don't pwn me!
2015 AppSecUSA 2015 - Wait wait... don't pwn me!Mark Miller
 
WALT be Cyber smart
WALT be Cyber smartWALT be Cyber smart
WALT be Cyber smartwiggit
 
EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE
EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE
EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE LallainePetalcorin
 
Be responsibly digital in Fake News Era
Be responsibly digital in Fake News EraBe responsibly digital in Fake News Era
Be responsibly digital in Fake News EraKumar Manish
 
Building Community with Social Media
Building Community with Social MediaBuilding Community with Social Media
Building Community with Social MediaBob Bertsch
 
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online One-IT
 
Germany Finds US Spy and Asks CIA Station Chief to Leave Country
Germany Finds US Spy and Asks CIA Station Chief to Leave CountryGermany Finds US Spy and Asks CIA Station Chief to Leave Country
Germany Finds US Spy and Asks CIA Station Chief to Leave CountryNews Feather
 
News Literacy, Spring 2024: Week 6 Lecture
News Literacy,  Spring 2024: Week 6 LectureNews Literacy,  Spring 2024: Week 6 Lecture
News Literacy, Spring 2024: Week 6 LectureSteve Fox
 

Tendances (16)

Day 2: Bias Lesson
Day 2: Bias LessonDay 2: Bias Lesson
Day 2: Bias Lesson
 
Keep your teens safe on the internet
Keep your teens safe on the internetKeep your teens safe on the internet
Keep your teens safe on the internet
 
Full Funnel Marketing for Facebook and LinkedIn
Full Funnel Marketing for Facebook and LinkedInFull Funnel Marketing for Facebook and LinkedIn
Full Funnel Marketing for Facebook and LinkedIn
 
Conspiracy Theories and Explanations
Conspiracy Theories and ExplanationsConspiracy Theories and Explanations
Conspiracy Theories and Explanations
 
Fake news? Protect yourself.
Fake news? Protect yourself.Fake news? Protect yourself.
Fake news? Protect yourself.
 
Twitter ye Not - A journalist view of Twitter
Twitter ye Not - A journalist view of TwitterTwitter ye Not - A journalist view of Twitter
Twitter ye Not - A journalist view of Twitter
 
2015 AppSecUSA 2015 - Wait wait... don't pwn me!
2015 AppSecUSA 2015 - Wait wait... don't pwn me!2015 AppSecUSA 2015 - Wait wait... don't pwn me!
2015 AppSecUSA 2015 - Wait wait... don't pwn me!
 
Fa102a, assignment 3
Fa102a, assignment 3Fa102a, assignment 3
Fa102a, assignment 3
 
WALT be Cyber smart
WALT be Cyber smartWALT be Cyber smart
WALT be Cyber smart
 
EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE
EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE
EMPOWERMENT TECHNOLOGY | IDENTIFYING SATIRICAL SOURCE FROM GOOD SOURCE
 
Be responsibly digital in Fake News Era
Be responsibly digital in Fake News EraBe responsibly digital in Fake News Era
Be responsibly digital in Fake News Era
 
Building Community with Social Media
Building Community with Social MediaBuilding Community with Social Media
Building Community with Social Media
 
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
 
Germany Finds US Spy and Asks CIA Station Chief to Leave Country
Germany Finds US Spy and Asks CIA Station Chief to Leave CountryGermany Finds US Spy and Asks CIA Station Chief to Leave Country
Germany Finds US Spy and Asks CIA Station Chief to Leave Country
 
Plagiarism Lesson 2018
Plagiarism Lesson 2018Plagiarism Lesson 2018
Plagiarism Lesson 2018
 
News Literacy, Spring 2024: Week 6 Lecture
News Literacy,  Spring 2024: Week 6 LectureNews Literacy,  Spring 2024: Week 6 Lecture
News Literacy, Spring 2024: Week 6 Lecture
 

En vedette

OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackersgrugq
 
An Underground education
An Underground educationAn Underground education
An Underground educationgrugq
 
Global privacy research
Global privacy researchGlobal privacy research
Global privacy researchbbw1984
 
Catch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingCatch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingJan Seidl
 
NSA-Proof communications (mostly)
NSA-Proof communications (mostly)NSA-Proof communications (mostly)
NSA-Proof communications (mostly)Jan Seidl
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Naval OPSEC
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentationguest019923
 
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsReducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsJan Seidl
 
An Underground education
An Underground educationAn Underground education
An Underground educationgrugq
 
Social Media - Privacy and Settings
Social Media -  Privacy and SettingsSocial Media -  Privacy and Settings
Social Media - Privacy and SettingsVanguard Leadership
 
FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015Naval OPSEC
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobilegrugq
 
On Cyber
On Cyber  On Cyber
On Cyber grugq
 
OPSEC Vulnerabilities And Indicators
OPSEC Vulnerabilities And IndicatorsOPSEC Vulnerabilities And Indicators
OPSEC Vulnerabilities And IndicatorsDepartment of Defense
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 

En vedette (16)

OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
Global privacy research
Global privacy researchGlobal privacy research
Global privacy research
 
Catch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingCatch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hacking
 
NSA-Proof communications (mostly)
NSA-Proof communications (mostly)NSA-Proof communications (mostly)
NSA-Proof communications (mostly)
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentation
 
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsReducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutions
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
Social Media - Privacy and Settings
Social Media -  Privacy and SettingsSocial Media -  Privacy and Settings
Social Media - Privacy and Settings
 
Personal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy WorkshopPersonal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy Workshop
 
FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
 
On Cyber
On Cyber  On Cyber
On Cyber
 
OPSEC Vulnerabilities And Indicators
OPSEC Vulnerabilities And IndicatorsOPSEC Vulnerabilities And Indicators
OPSEC Vulnerabilities And Indicators
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 

Similaire à Opsec for families

Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit pptapieper
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaBen Woelk, CISSP, CPTC
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
Document
DocumentDocument
Documentkiiik1
 
Casott employee conference 2015
Casott employee conference 2015Casott employee conference 2015
Casott employee conference 2015Bernard Charlebois
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Ratmegg16
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxGrayzon Gonzales, LPT
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
Top Ten Tips to Shockproof Your Use of Social Media 2012
Top Ten Tips to Shockproof Your Use of Social Media 2012Top Ten Tips to Shockproof Your Use of Social Media 2012
Top Ten Tips to Shockproof Your Use of Social Media 2012Ben Woelk, CISSP, CPTC
 

Similaire à Opsec for families (20)

Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit ppt
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Document
DocumentDocument
Document
 
Casott employee conference 2015
Casott employee conference 2015Casott employee conference 2015
Casott employee conference 2015
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Top Ten Tips to Shockproof Your Use of Social Media 2012
Top Ten Tips to Shockproof Your Use of Social Media 2012Top Ten Tips to Shockproof Your Use of Social Media 2012
Top Ten Tips to Shockproof Your Use of Social Media 2012
 
Users guide
Users guideUsers guide
Users guide
 
Heads up!
Heads up!Heads up!
Heads up!
 

Plus de Lindy Kyzer

Digital Media from Washington, D.C.
Digital Media from Washington, D.C.Digital Media from Washington, D.C.
Digital Media from Washington, D.C.Lindy Kyzer
 
Social media considerations
Social media considerationsSocial media considerations
Social media considerationsLindy Kyzer
 
Social media tip sheet
Social media tip sheetSocial media tip sheet
Social media tip sheetLindy Kyzer
 
Army social media best practices
Army social media best practicesArmy social media best practices
Army social media best practicesLindy Kyzer
 
Harnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organizationHarnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organizationLindy Kyzer
 
Harnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organizationHarnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organizationLindy Kyzer
 
Army bands social media presentation
Army bands social media presentationArmy bands social media presentation
Army bands social media presentationLindy Kyzer
 

Plus de Lindy Kyzer (7)

Digital Media from Washington, D.C.
Digital Media from Washington, D.C.Digital Media from Washington, D.C.
Digital Media from Washington, D.C.
 
Social media considerations
Social media considerationsSocial media considerations
Social media considerations
 
Social media tip sheet
Social media tip sheetSocial media tip sheet
Social media tip sheet
 
Army social media best practices
Army social media best practicesArmy social media best practices
Army social media best practices
 
Harnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organizationHarnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organization
 
Harnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organizationHarnessing the power of a 1 million + organization
Harnessing the power of a 1 million + organization
 
Army bands social media presentation
Army bands social media presentationArmy bands social media presentation
Army bands social media presentation
 

Dernier

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 

Dernier (20)

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 

Opsec for families

  • 1. OPSEC Training & Awareness to the Army Family
  • 2.
  • 3. What seemed like unimportant information from one site can be the start of the Google search leading to other sites. Remember: even items which are deleted from Web sites can still be searched!
  • 4.
  • 5.
  • 6. Even if you think you’re being “clever,” you could accidentally leak a small piece of information.
  • 7. Myth #1 – “I am no one they care about.” Fact #1 – One small piece of information can be the last puzzle piece the enemy needs. 4 Myths about OPSEC
  • 8. 4 Myths about OPSEC Myth #2 – “I don’t have any adversaries.” Fact #2 – Think about: former boyfriends/girlfriends, angry neighbors, identity thieves
  • 9. 4 Myths about OPSEC Myth #3 – “I’m smarter than the enemy.” Fact #3 – Information theft is a good investment for the enemy. Some nations are willing to spend BILLIONS of dollars for our seemingly trivial information. One small mistake on line can put our Soldiers at big risk.
  • 10. 4 Myths about OPSEC Myth #4 – “I don’t post on the Internet.” Fact #4 – Unencrypted emails can be misrouted, intercepted or gathered.
  • 11.
  • 12. It’s ALWAYS better to be cautious!
  • 14.

Notes de l'éditeur

  1. OPSEC information should be shared with your families. Explain why you can’t ask or talk about certain things and make sure your family understands.
  2. Google is a great Internet tool but it also remembers EVERYTHING! Even items and searches that have been deleted from search history or your browsing cache can be searched on Google.
  3. Social media allows for a more instantaneous way to communicated with your Soldier while he or she is deployed. However, just like conversations on the phone or by letter, watch what you say. Even a simple questions like “What’s work like over there?” could be useful to the enemy.
  4. Be smart about what you post on social media sites. Posting things such as “Going on vacation for two weeks” is really like telling people, “My house will be COMPLETELY empty for two weeks!” If it isn’t already, make your Facebook and Twitter accounts private and then you can ensure only your friends see the information. Don’t friend everyone who asks… make sure you know who that person is!
  5. Trying to be clever or speaking in code really doesn’t work. It can also lead to slip-ups. Be safe and just avoid talking about subjects that can lead to OPSEC violations.
  6. That may be true at the moment but you never know when you will accidentally bringing yourself to attention. Remember, it is difficult to know exactly what an adversary is looking for and if what you have may be of benefit.
  7. Anyone who might want a little bit of information about you can be an adversary.
  8. It’s a common feeling. People interviewed often say they know more than “some guy sitting in a cave, hiding out.” But, our adversaries are willing to spend BILLIONS of dollars to gain an advantage. They are willing to spend money on information. Some agencies train young people in info gathering.
  9. Not posting on the Internet doesn’t mean you don’t leave information on the Internet. Most people email now and unencrypted emails can be used in a negative way. Intercepting emails is the tech equivalent of dumpster diving.
  10. Always remember to be savvy with your conversations and avoid certain topics. That way, you won’t leak information!