SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Provided by OSPA (www.opsecprofessionals.org) Vulnerabilities and Indicators The OPSEC Process
Definitions ,[object Object],[object Object],[object Object],[object Object]
Indicators ,[object Object]
Profiles and Signatures ,[object Object],[object Object],[object Object],[object Object]
Vulnerability Areas ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stereotyped Operations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of Vulnerabilities  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Communication Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Common Vulnerabilities ,[object Object],[object Object],[object Object],Few Government-Owned Systems
Cell Phones ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cell Phones ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Areas of Vulnerability ,[object Object],[object Object],[object Object],[object Object]
Administrative ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Financial ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Logistics ,[object Object],[object Object],[object Object],[object Object]
Operations ,[object Object],[object Object],[object Object],[object Object],[object Object]
EVEN MORE Indicators and Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Where Are the Indicators?
Indicators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information of Intelligence Value Collectible Observable
Collectible ,[object Object],Examples: Dumpster diving, cordless/cell phone interception, email, open source
Observable What you can see What you can smell What you can hear
Why train for OPSEC? ( A real Exercise)
What is our greatest Weakness? OURSELVES!
Questions? ,[object Object],[object Object]

Weitere Àhnliche Inhalte

Was ist angesagt?

Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
Army Social Media Presentation
Army Social Media PresentationArmy Social Media Presentation
Army Social Media PresentationDepartment of Defense
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber securityJoey Hernandez
 
Incident response process
Incident response processIncident response process
Incident response processBhupeshkumar Nanhe
 
Adversary Emulation and the C2 Matrix
Adversary Emulation and the C2 MatrixAdversary Emulation and the C2 Matrix
Adversary Emulation and the C2 MatrixJorge Orchilles
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxChandanChandu928137
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxAbimbolaFisher1
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureDr David Probert
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of viewS.E. CTS CERT-GOV-MD
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITYPranjalShah18
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceMITRE - ATT&CKcon
 

Was ist angesagt? (20)

Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Army Social Media Presentation
Army Social Media PresentationArmy Social Media Presentation
Army Social Media Presentation
 
OPSEC for Families
OPSEC for FamiliesOPSEC for Families
OPSEC for Families
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber security
 
Incident response process
Incident response processIncident response process
Incident response process
 
Adversary Emulation and the C2 Matrix
Adversary Emulation and the C2 MatrixAdversary Emulation and the C2 Matrix
Adversary Emulation and the C2 Matrix
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Application Security
Application SecurityApplication Security
Application Security
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
 

Andere mochten auch

General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentationguest019923
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
05 application security fundamentals - part 2 - security mechanisms - autho...
05   application security fundamentals - part 2 - security mechanisms - autho...05   application security fundamentals - part 2 - security mechanisms - autho...
05 application security fundamentals - part 2 - security mechanisms - autho...appsec
 
Date security security principles
Date security   security principlesDate security   security principles
Date security security principlesLeo Mark Villar
 
Global privacy research
Global privacy researchGlobal privacy research
Global privacy researchbbw1984
 
Catch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingCatch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingJan Seidl
 
NSA-Proof communications (mostly)
NSA-Proof communications (mostly)NSA-Proof communications (mostly)
NSA-Proof communications (mostly)Jan Seidl
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Naval OPSEC
 
Opsec for families
Opsec for familiesOpsec for families
Opsec for familiesLindy Kyzer
 
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsReducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsJan Seidl
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
Navy Command Facebook Assessment and Worksheet (March 2015)
 Navy Command Facebook Assessment and Worksheet (March 2015) Navy Command Facebook Assessment and Worksheet (March 2015)
Navy Command Facebook Assessment and Worksheet (March 2015)US Navy Social Media
 
Social Media - Privacy and Settings
Social Media -  Privacy and SettingsSocial Media -  Privacy and Settings
Social Media - Privacy and SettingsVanguard Leadership
 

Andere mochten auch (20)

General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentation
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
05 application security fundamentals - part 2 - security mechanisms - autho...
05   application security fundamentals - part 2 - security mechanisms - autho...05   application security fundamentals - part 2 - security mechanisms - autho...
05 application security fundamentals - part 2 - security mechanisms - autho...
 
Date security security principles
Date security   security principlesDate security   security principles
Date security security principles
 
Situational awareness
Situational awarenessSituational awareness
Situational awareness
 
Global privacy research
Global privacy researchGlobal privacy research
Global privacy research
 
Catch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingCatch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hacking
 
NSA-Proof communications (mostly)
NSA-Proof communications (mostly)NSA-Proof communications (mostly)
NSA-Proof communications (mostly)
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)
 
CyberCoex
CyberCoexCyberCoex
CyberCoex
 
Opsec for families
Opsec for familiesOpsec for families
Opsec for families
 
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsReducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutions
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Social Media OPSEC
Social Media OPSECSocial Media OPSEC
Social Media OPSEC
 
Navy Command Facebook Assessment and Worksheet (March 2015)
 Navy Command Facebook Assessment and Worksheet (March 2015) Navy Command Facebook Assessment and Worksheet (March 2015)
Navy Command Facebook Assessment and Worksheet (March 2015)
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
 
Info hiding
Info hidingInfo hiding
Info hiding
 
Social Media - Privacy and Settings
Social Media -  Privacy and SettingsSocial Media -  Privacy and Settings
Social Media - Privacy and Settings
 

Ähnlich wie OPSEC Vulnerabilities And Indicators

20110414 ARMA Twin Cities Inventorying Electronic Records
20110414 ARMA Twin Cities Inventorying Electronic Records20110414 ARMA Twin Cities Inventorying Electronic Records
20110414 ARMA Twin Cities Inventorying Electronic RecordsJesse Wilkins
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06gbroadbent67
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Building a Data Quality Program from Scratch
Building a Data Quality Program from ScratchBuilding a Data Quality Program from Scratch
Building a Data Quality Program from Scratchdmurph4
 
080312 Ict Hub Risk Management
080312 Ict Hub Risk Management080312 Ict Hub Risk Management
080312 Ict Hub Risk ManagementMark Walker
 
October 3rd Briefing, Transformation
October 3rd Briefing, TransformationOctober 3rd Briefing, Transformation
October 3rd Briefing, TransformationNathaniel Palmer
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodologyciso_insights
 
What Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorWhat Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorAnton Chuvakin
 
Kristina Podnar - Delivering Digital Excellence with Global Compliance and In...
Kristina Podnar - Delivering Digital Excellence with Global Compliance and In...Kristina Podnar - Delivering Digital Excellence with Global Compliance and In...
Kristina Podnar - Delivering Digital Excellence with Global Compliance and In...Digital Experience (DX) Summit 2016
 
Delivering Digital Excellence with Global Compliance and Integrity
Delivering Digital Excellence with Global Compliance and IntegrityDelivering Digital Excellence with Global Compliance and Integrity
Delivering Digital Excellence with Global Compliance and IntegrityKristina Podnar
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and ComplianceSPC Adriatics
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and ComplianceAlistair Pugin
 
Keeping Score on Testing
Keeping Score on TestingKeeping Score on Testing
Keeping Score on Testingamiable_indian
 
Question 1Discuss why those in the human resource development po.docx
Question 1Discuss why those in the human resource development po.docxQuestion 1Discuss why those in the human resource development po.docx
Question 1Discuss why those in the human resource development po.docxmakdul
 
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)Joe Orlando
 

Ähnlich wie OPSEC Vulnerabilities And Indicators (20)

20110414 ARMA Twin Cities Inventorying Electronic Records
20110414 ARMA Twin Cities Inventorying Electronic Records20110414 ARMA Twin Cities Inventorying Electronic Records
20110414 ARMA Twin Cities Inventorying Electronic Records
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Safe shipley 2 upload
Safe shipley 2 uploadSafe shipley 2 upload
Safe shipley 2 upload
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Building a Data Quality Program from Scratch
Building a Data Quality Program from ScratchBuilding a Data Quality Program from Scratch
Building a Data Quality Program from Scratch
 
080312 Ict Hub Risk Management
080312 Ict Hub Risk Management080312 Ict Hub Risk Management
080312 Ict Hub Risk Management
 
October 3rd Briefing, Transformation
October 3rd Briefing, TransformationOctober 3rd Briefing, Transformation
October 3rd Briefing, Transformation
 
David Whitaker: Managing Your Vendors
David Whitaker: Managing Your VendorsDavid Whitaker: Managing Your Vendors
David Whitaker: Managing Your Vendors
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodology
 
What Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorWhat Every Organization Should Log And Monitor
What Every Organization Should Log And Monitor
 
Taking Transactions Mobile
Taking Transactions MobileTaking Transactions Mobile
Taking Transactions Mobile
 
Kristina Podnar - Delivering Digital Excellence with Global Compliance and In...
Kristina Podnar - Delivering Digital Excellence with Global Compliance and In...Kristina Podnar - Delivering Digital Excellence with Global Compliance and In...
Kristina Podnar - Delivering Digital Excellence with Global Compliance and In...
 
Delivering Digital Excellence with Global Compliance and Integrity
Delivering Digital Excellence with Global Compliance and IntegrityDelivering Digital Excellence with Global Compliance and Integrity
Delivering Digital Excellence with Global Compliance and Integrity
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and Compliance
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and Compliance
 
Keeping Score on Testing
Keeping Score on TestingKeeping Score on Testing
Keeping Score on Testing
 
Question 1Discuss why those in the human resource development po.docx
Question 1Discuss why those in the human resource development po.docxQuestion 1Discuss why those in the human resource development po.docx
Question 1Discuss why those in the human resource development po.docx
 
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
 

Mehr von Department of Defense

Invasive species commanders_guide
Invasive species commanders_guideInvasive species commanders_guide
Invasive species commanders_guideDepartment of Defense
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 
Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011Department of Defense
 
National Security Space Strategy
National Security Space StrategyNational Security Space Strategy
National Security Space StrategyDepartment of Defense
 
Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011Department of Defense
 
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...Department of Defense
 
Customizing Your YouTube Channel
Customizing Your YouTube ChannelCustomizing Your YouTube Channel
Customizing Your YouTube ChannelDepartment of Defense
 
Army Official Social Media Policy
Army Official Social Media PolicyArmy Official Social Media Policy
Army Official Social Media PolicyDepartment of Defense
 
Creative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesCreative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesDepartment of Defense
 
Getting Started With Facebook
Getting Started With Facebook Getting Started With Facebook
Getting Started With Facebook Department of Defense
 

Mehr von Department of Defense (20)

Invasive species commanders_guide
Invasive species commanders_guideInvasive species commanders_guide
Invasive species commanders_guide
 
DoD Cyber Strategy
DoD Cyber StrategyDoD Cyber Strategy
DoD Cyber Strategy
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011
 
National Security Space Strategy
National Security Space StrategyNational Security Space Strategy
National Security Space Strategy
 
Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011
 
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
 
Social Media Overview
Social Media OverviewSocial Media Overview
Social Media Overview
 
How To Tweet
How To TweetHow To Tweet
How To Tweet
 
Getting Started With Twitter
Getting Started With TwitterGetting Started With Twitter
Getting Started With Twitter
 
Tips And Tools For YouTube
Tips And Tools For YouTubeTips And Tools For YouTube
Tips And Tools For YouTube
 
Customizing Your YouTube Channel
Customizing Your YouTube ChannelCustomizing Your YouTube Channel
Customizing Your YouTube Channel
 
YouTube Uses In The Field
YouTube Uses In The FieldYouTube Uses In The Field
YouTube Uses In The Field
 
Army Official Social Media Policy
Army Official Social Media PolicyArmy Official Social Media Policy
Army Official Social Media Policy
 
ONR Innovation Newsletter
ONR Innovation NewsletterONR Innovation Newsletter
ONR Innovation Newsletter
 
Getting Started With You Tube
Getting Started With You TubeGetting Started With You Tube
Getting Started With You Tube
 
Creative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesCreative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook Pages
 
Designing Your Facebook Page
Designing Your Facebook Page Designing Your Facebook Page
Designing Your Facebook Page
 
Getting Started With Facebook
Getting Started With Facebook Getting Started With Facebook
Getting Started With Facebook
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 

KĂŒrzlich hochgeladen

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)lakshayb543
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...SeĂĄn Kennedy
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...Nguyen Thanh Tu Collection
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 

KĂŒrzlich hochgeladen (20)

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
HỌC TỐT TIáșŸNG ANH 11 THEO CHÆŻÆ NG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáșŸT - Cáșą NĂ...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 

OPSEC Vulnerabilities And Indicators