Homework Help Global logo
  • Home
  • Coursework Help
  • Dissertation Help
  • Homework Help
  • My account
  • Order now
Order Now
Homework Help

Hlsc 720-discussion 4-reply 1 | HLSC 720 – Critical Infrastructure: Vulnerability Analysis and Protection | Liberty University

4 min read
Posted on 
March 5th, 2023
Home Homework Help Hlsc 720-discussion 4-reply 1 | HLSC 720 - Critical Infrastructure: Vulnerability Analysis and Protection | Liberty University

The thread must be a minimum of 200-400 words. MINIMUM OF TWO SOURCES BESIDES THE TEXTBOOK. Must cite at least 2 sources in addition to the Bible.

TEXTBOOK: Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN: 9781119237785.

***CHEYANNE***

The identification, evaluation, and management of risks to assets, personnel, and resources are the primary goals of the protective security principles that make up the foundation of a risk management strategy. These objectives can be accomplished by adhering to these fundamental protective security principles. Protective security reduces the likelihood that individuals, assets, or data will be compromised because of an attack. It entails prevention, the collection of information, the sharing of information, the mitigation of risk, and the measurement of cost vs. benefit.

Prevention

Prevention is the first and most crucial principle of protective security. The fundamental objective of prevention is to eliminate or significantly minimize risks by removing the possibility of adverse effects. This can be accomplished by lessening the susceptibility of both assets and individuals and instituting policies and processes designed to lessen the possibility of a threat actually being carried out. Administrative processes like background checks, access control, and physical security measures like locks, alarms, and surveillance systems can be utilized to prevent criminal activity.

The Accumulation of Information

The gathering of relevant information constitutes the second principle of protective security. This requires collecting and evaluating data to discover potential dangers and weak spots in the system. Data might originate from many sources, such as personnel records, physical security systems, and intelligence reports. The identification of dangers and the implementation of relevant countermeasures can be accomplished by companies once they have collected and analyzed the data in question.

The Exchange of Information

The dissemination and exchange of information is the third tenet of protective security. Making the system more secure necessitates disseminating information to third parties, including private businesses, public agencies, and other organizations. Organizations can better identify possible risks and take appropriate measures to protect themselves if they share information and do so more promptly. In addition to this, the sharing of information can assist firms in the development of more efficient security policies and procedures.

Risk Mitigation

The focus of the fourth principle of preventive security is the reduction of potential danger. This involves taking measures to limit the risk of an incident occurring or the impact of an incident if it does occur to lessen the potential damage that the occurrence of an incident could cause. Physical security precautions, administrative controls, and emergency response protocols are all examples of risk reduction tactics that may be used.

Evaluation of the Costs and Benefits

The fifth premise is evaluating the costs and benefits of preventive security measures. This requires determining if the possible benefits of additional security measures are worth the additional costs of those measures. Organizations are responsible for weighing the prospective costs and advantages of implementing security measures, including the potential cost savings that could result from preventing an incident or reducing the severity of its impact.

When contemplating preventative safety measures, businesses are obligated to consider all possible threats, including acts of terrorism. The dangers posed by terrorism require specific countermeasures, which can only be provided by vigilant security. Measures of physical security, gathering intelligence, exchanging information, and other risk reduction tactics could all fall under this category. When determining the most effective method to safeguard resources and employees, businesses must also consider the financial implications of implementing various security precautions. Organizations can lessen the likelihood of harm being caused to individuals, property, and information if they adhere to protective security principles.

2 Timothy 4:2 explains “Preach the word; be prepared in season and out of season; correct, rebuke and encourage—with great patience and careful instruction.” (NIV) This biblical worldview explains that preparation is needed and crucial. To be prepared and to have a plan with help prevention of an incident from occurring. 

References

Bible gateway passage: 2 timothy 4:2 – new international version. Bible Gateway. (n.d.). Retrieved February 6, 2023, from https://www.biblegateway.com/passage/?search=2+Timothy+4%3A2&version=NIV

Hale, C. (2018, May 1). Security in depth. ISACA. Retrieved February 6, 2023, from https://www.isaca.org/resources/isaca-journal/issues/2018/volume-3/security-in-depth

Miralis, D. (2020, October 19). Australian national security: What are the five principles of the protective security policy framework?Lexology. Retrieved February 6, 2023, from https://www.lexology.com/library/detail.aspx?g=97abff03-36ab-4f6b-a051-f93816cf64d6

Order an Essay Now & Get These Features For Free:

Turnitin Report

Formatting

Title Page

Citation

Outline

Place an Order
Share
Tweet
Share
Tweet
Calculate the price
Pages (275 words)
$0.00
Homework Help Global
Company
  • Coursework Help
  • Law Homework Help
  • Business Paper Help
  • Thesis Writing Help
Legal
  • Dissertation Help
  • Homework Help
  • Essay Writing
  • Custom Writing
How Our Service is Used:
Homework Help Global essays are NOT intended to be forwarded as finalized work as it is only strictly meant to be used for research and study purposes. Homework Help Global does not endorse or condone any type of plagiarism.
Subscribe
No Spam
© 2023 Homework Help Global. All rights reserved.
Homework Help Global will be listed as ‘Homework Help Global’ on your bank statement.