Respuesta :

Its the the second step, 

1. Identify critical information
2. Analyze threats
3. Analyze vulnerabilities
4. Assess risk
5. Apply OPSEC measures