opsec-1----Page:3
1  2  3  4 

Op Function Subsections
Threats/Attacks
Confidentiality Violations
Offline Cryptographic Attacks
Replay Attacks
Message Insertion / Deletion / Modification
MIM
Security Practices
Security Services
User Authentication
User Authorization
Data Origin Authentication
Access Control
Data Integrity
Data Confidentiality
Auditing / Logging
DoS Mitigation
Additional Considerations
PPT Version