
- 248 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Threats in Context: Identify, Analyze, Anticipate begins with the premise that a risk assessment is relevant primarilyāand hinges uponāthe correct evaluation of the threat. According to the author, all the other stages of the risk evaluation are, in fact, dependent on getting the understanding and measurement of the threat right.
Despite this truism, many risk assessment methods (i.e., the process of determining the threat) tend to rush through a vague typology, offer minimal classifications, utilize an often-outdated list of potential malevolent actionsāall of which are based on precedent occurrences. There should be a way to improve on this: a way to provide security practitioners and analysts better tools to deal with the task of analyzing threats and risk and to prepare for such contingencies appropriately.
The book begins with a retrospective on the threats from the 1960s through to the present. The list is long and includes hijackings and airport attacks, piracy, drug smuggling, attacks on trains, pipelines, city-wide multi-site attacks, road attacks, workplace shootings, lone wolf attacks, drone attacks, bombings, IEDs, sniper attacks, random stabbings, and more.
Terrorism, workplace violence, and active shooter scenarios all present asymmetric problems and unique challenges that require new ways of thinking, operationally, of risk to properly prevent, mitigate, and respond to such threats. The author demonstrates how to develop an appropriate methodology to define both current and emerging threats, providing a five-step process to self-evaluateāto determine an organization's, a location's, or a facility's threats and to plan risk mitigation strategies to accurately identify, minimize, and neutralize such threats.
Coverage progressively builds from correctly identifying the root threatsāboth global and localāto a subsequent understanding of the corollary relationship between threat, vulnerability, and risk, with the threat serving as the fundamental cornerstone of the risk evaluation. As such, Threats in Context will serve as a pivotal resource to security professionals from all backgrounds serving in a variety of fields and industries.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- About the Author
- Acknowledgments
- Introduction
- 1 An Abridged History of Threats from the Late 60s to Today: A Retrospective
- 2 Is Our World under Threat?
- 3 The Globalization of Threats
- 4 The Securitization of Threats
- 5 The Quest for a Method
- 6 Anticipating the Threat: Introduction to Forecasting Principles and Techniques
- And nowā¦
- References
- Index