Time
1 hour 56 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
hi and welcome back,
00:02
as I have previously mentioned. First, we will talk about the Operation Security or popularly called the Opsec. Actually, we will define it, and then we'll put it in the open source intelligence context, because with that we will grasp a better understanding of the two terms
00:21
after debt. I will show you a few examples how people are exposing themselves to anyone who wants to gather information about them or their companies.
00:29
23rd The question. What is opsec or operations? Security? I would say that opsec is a term that derives from the U. S. Military. I use the Wikipedia definition operations. Security, or OPSEC,
00:42
is a process that identifies critical information to determine a friendly actions can be observed by the enemy Intelligence.
00:50
As you can see, what we merge open source intelligence With the operations security, we get a big, fancy military like word, which means a lot of things. But in the end, everything comes to one safety.
01:03
There are many reasons why having a healthy obsession with OPSEC is important. One of the biggest is protecting yourselves from hackers, cyber criminals and governments from obtaining data and information that can be used to disclose sensitive things about you or your organization.
01:19
When we talk about oh sent an opsec, I would have to say that we all live a big digital footprint and all kinds of traces around the Internet.
01:29
Sometimes you wouldn't have to invest a lot of time to get someone's full name, date of birth, email accounts, some employment information, financial information so forth. For example,
01:41
the bad guys aren't with that info could generate a very good phishing email that has a great potential to do a lot of damage if it goes through properly. And since Social Media is a big, big source of information and data about a person or a company, the most important advice I can give you regarding that is
02:00
think before you share because and I have mentioned this throughout this course,
02:05
Internet is forever, and maybe you do not need something about you out there. Actually, it is pretty contrary that we are very private about our life. But when it comes to the Internet, everything goes just something for you to think about
02:20
in this lesson. We visited for a brief moment, operations security, and we have put it in the Austin context, and in the next video, I will show you a few interesting examples how people easily provide information about themselves.

Up Next

Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By

Instructor Profile Image
Tino Sokic
CEO at DobarDan
Instructor