Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?Rand Corporation, 20 Μαΐ 2009 - 30 σελίδες Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. This paper explores an approach for assessing novel or emerging threats and prioritizing which merit specific security attention and which can be addressed as part of existing security efforts. |
Άλλες εκδόσεις - Προβολή όλων
Emerging Threats and Security Planning: How Should We Decide what ... Brian A. Jackson,Dave Frelinger Περιορισμένη προεπισκόπηση - 2009 |
Emerging Threats and Security Planning: How Should We Decide what ... Brian A. Jackson,Dave Frelinger Προβολή αποσπασμάτων - 2009 |
Συχνά εμφανιζόμενοι όροι και φράσεις
advantage adversaries al-Ekhlaas posting Al-Qaeda Alberto Gonzales April 16 attack mode attack scenarios blog Brian Bruce Schneier Calif characteristics commercial off-the-shelf Countering Terrorism current security customized security measures Department of Homeland disrupt emerging threat scenario example existing security efforts explosives factors focusing future threats greater concern Homeland Security Program hypothetical attacks Hypothetical Threats identify improvised weapons Infrastructure Jackson lasers lesser included measures in place missiles Movie plot threats National niche threats novel attack Operational Risk particular attack potential attacker potential consequences prioritize protect prudent RAND Corporation ranking remote-controlled planes require response result risk analysis rorists Santa Monica Schneier Science Fiction security approaches security planners security planning security resources specific attack stage attacks staging an attack tactics Terrorist Attacks terrorist groups terrorist operations terrorist plots terrorist scenarios terrorist threat terrorists might attack Threats to Worry translation dated Transportation Security Administration U.S. Army UAVs Unmanned Aerial Vehicles unusual threats vulnerabilities