Once the risk assessment is done, it is then time to act on the information. Based on the Read items thus far, discuss principles of protective security as it relates to risk. How do prevention, information collection, information sharing, risk mitigation, and cost-benefit analysis figure into the process? Consider terrorism but also all hazards.
TEXTBOOK: Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN: 9781119237785.
Recent Comments