Threat Identification and Assessment

 
 
 
 
5003-Chapter 5 Threat Identification and Assessment

In order to identify and assess threats and implement risk-management strategies to counteract them, it is necessary to have a clear picture of prospective adversaries. Carl A. Roper's focus is on U.S. government assets and the security responses that are appropriate to protecting them, but the implication is that similar methods of identification, assessment, and mitigation can be extrapolated to the benefit of organizations of all sizes and levels of complexity.

Roper begins by explaining that identification and assessment of threats may pose a challenge. That is because of the potential adversary's nature. Risk managers are obliged to speculate the capabilities and intentions of adversaries based on partial information. That being so, it is important to identify categories of threat. Roper says there are eight kinds: foreign intelligence, terrorist, inside-job, outside criminal, environmental, foreign military, political, and "other" threat categories. Not all kinds of adversaries will be relevant to all kinds of organizations; however, it is important to recognize the ones that do relate to the organization--or to a specific subset of the organization, such as a particular project or facility or person.

Within these categories, further general distinctions can be made about motivations and intentions. For example, a terrorist may well be motivated by a "cause," but terrorists may also be motivated by the attractions o

     
 
 
 
    

 

Related Essays

Risk-Analysis .... The data base of information begins with asset identification, proceeds through threat identification and assessment, and on to vulnerability identification .... (1804 7 )

The US Secret Service .... leadership and guidance to the emerging field of threat assessment. .... fraud, computer and telecommunications fraud, false identification documents, access device .... (1998 8 )

The Secret Service Agency .... leadership and guidance to the emerging field of threat assessment. .... fraud, computer and telecommunications fraud, false identification documents, access device .... (1921 8 )

Strategic Planning and Public Safety Agencies .... Budget Size-Threat Identification ..... .... the rational mode of strategy formulation as a formal and comprehensive analysis and assessment of internal and .... (8959 36 )

Threats to US Interests and Responses .... been noted by several experts, identification of potential .... are divided on the realistic threat posed by .... Laqueur, 1996, p. 315; Strategic Assessment 1997, 1997 .... (1873 7 )


Category: Government - T
 
 
 
Common Topics
 
 
 
 
 
 
 
Click Here to Get Instant Access to over 32,000 Professionally Written Papers!!!
 
 
 
Join Now  
 
 
 
 
 
Saved Papers  
 
 
Save your essays here so you can locate them quickly!
 
 
 
Testimonials  
 
"Your site was very helpful and gave me the details I needed in order to complete my essay!!!"
Mike F.
 
"This site is an excellent vehicle for quick referrences. Thanks a bunch!"
Carla T.
 
"Great site, I got a lot of new ideas I would have never thought of before."
Nate A.
 
"I love this site!!!"
Marie H.
 
"Thank you for making such a high quality site! Your papers are the best I have seen around"
Debbie B.
 
 
 
 
Copyright © 2007 - 2014 Lots of Essays. All Rights Reserved. DMCA