Operations Security - Los Alamos National Laboratory

It is a five-step process that provides the decision-maker with a firm foundation upon which to make an informed decision. During a risk assessment, the value of the information, analysis of the threat, and determination of the information’s vulnerability are conducted. ................
................