Threats in Context e-bog
509,93 DKK
(inkl. moms 637,41 DKK)
Threats in Context: Identify, Analyze, Anticipate begins with the premise that a risk assessment is relevant primarily-and hinges upon-the correct evaluation of the threat. According to the author, all the other stages of the risk evaluation are, in fact, dependent on getting the understanding and measurement of the threat right.a Despite this truism, many risk assessment methods (i.e., the pr...
E-bog
509,93 DKK
Forlag
CRC Press
Udgivet
21 december 2022
Længde
248 sider
Genrer
Terrorism, armed struggle
Sprog
English
Format
pdf
Beskyttelse
LCP
ISBN
9781000824612
Threats in Context: Identify, Analyze, Anticipate begins with the premise that a risk assessment is relevant primarily-and hinges upon-the correct evaluation of the threat. According to the author, all the other stages of the risk evaluation are, in fact, dependent on getting the understanding and measurement of the threat right.a Despite this truism, many risk assessment methods (i.e., the process of determining the threat) tend to rush through a vague typology, offer minimal classifications, utilize an often-outdated list of potential malevolent actions-all of which are based on precedent occurrences. There should be a way to improve on this: a way to provide security practitioners and analysts better tools to deal with the task of analyzing threats and risk and to prepare for such contingencies appropriately.a The book begins with a retrospective on the threats from the 1960s through to the present. The list is long and includes hijackings and airport attacks, piracy, drug smuggling, attacks on trains, pipelines, city-wide multi-site attacks, road attacks, workplace shootings, lone wolf attacks, drone attacks, bombings, IEDs, sniper attacks, random stabbings, and more. Terrorism, workplace violence, and active shooter scenarios all present asymmetric problems and unique challenges that require new ways of thinking, operationally, of risk to properly prevent, mitigate, and respond to such threats. The author demonstrates how to develop an appropriate methodology to define both current and emerging threats, providing a five-step process to self-evaluate-to determine an organization's, a location's, or a facility's threats and to plan risk mitigation strategies to accurately identify, minimize, and neutralize such threats.a Coverage progressively builds from correctly identifying the root threats-both global and local-to a subsequent understanding of the corollary relationship between threat, vulnerability, and risk, with the threat serving as the fundamental cornerstone of the risk evaluation. As such, Threats in Context will serve as a pivotal resource to security professionals from all backgrounds serving in a variety of fields and industries.