Home » Hlsc 720-discussion 4-reply 1 | HLSC 720 – Critical Infrastructure: Vulnerability Analysis and Protection | Liberty University

Hlsc 720-discussion 4-reply 1 | HLSC 720 – Critical Infrastructure: Vulnerability Analysis and Protection | Liberty University

The thread must be a minimum of 200-400 words. MINIMUM OF TWO SOURCES BESIDES THE TEXTBOOK. Must cite at least 2 sources in addition to the Bible.

TEXTBOOK: Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN: 9781119237785.

***CHEYANNE***

The identification, evaluation, and management of risks to assets, personnel, and resources are the primary goals of the protective security principles that make up the foundation of a risk management strategy. These objectives can be accomplished by adhering to these fundamental protective security principles. Protective security reduces the likelihood that individuals, assets, or data will be compromised because of an attack. It entails prevention, the collection of information, the sharing of information, the mitigation of risk, and the measurement of cost vs. benefit.

Prevention

Prevention is the first and most crucial principle of protective security. The fundamental objective of prevention is to eliminate or significantly minimize risks by removing the possibility of adverse effects. This can be accomplished by lessening the susceptibility of both assets and individuals and instituting policies and processes designed to lessen the possibility of a threat actually being carried out. Administrative processes like background checks, access control, and physical security measures like locks, alarms, and surveillance systems can be utilized to prevent criminal activity.

The Accumulation of Information

The gathering of relevant information constitutes the second principle of protective security. This requires collecting and evaluating data to discover potential dangers and weak spots in the system. Data might originate from many sources, such as personnel records, physical security systems, and intelligence reports. The identification of dangers and the implementation of relevant countermeasures can be accomplished by companies once they have collected and analyzed the data in question.

The Exchange of Information

The dissemination and exchange of information is the third tenet of protective security. Making the system more secure necessitates disseminating information to third parties, including private businesses, public agencies, and other organizations. Organizations can better identify possible risks and take appropriate measures to protect themselves if they share information and do so more promptly. In addition to this, the sharing of information can assist firms in the development of more efficient security policies and procedures.

Risk Mitigation

The focus of the fourth principle of preventive security is the reduction of potential danger. This involves taking measures to limit the risk of an incident occurring or the impact of an incident if it does occur to lessen the potential damage that the occurrence of an incident could cause. Physical security precautions, administrative controls, and emergency response protocols are all examples of risk reduction tactics that may be used.

Evaluation of the Costs and Benefits

The fifth premise is evaluating the costs and benefits of preventive security measures. This requires determining if the possible benefits of additional security measures are worth the additional costs of those measures. Organizations are responsible for weighing the prospective costs and advantages of implementing security measures, including the potential cost savings that could result from preventing an incident or reducing the severity of its impact.

When contemplating preventative safety measures, businesses are obligated to consider all possible threats, including acts of terrorism. The dangers posed by terrorism require specific countermeasures, which can only be provided by vigilant security. Measures of physical security, gathering intelligence, exchanging information, and other risk reduction tactics could all fall under this category. When determining the most effective method to safeguard resources and employees, businesses must also consider the financial implications of implementing various security precautions. Organizations can lessen the likelihood of harm being caused to individuals, property, and information if they adhere to protective security principles.

2 Timothy 4:2 explains “Preach the word; be prepared in season and out of season; correct, rebuke and encourage—with great patience and careful instruction.” (NIV) This biblical worldview explains that preparation is needed and crucial. To be prepared and to have a plan with help prevention of an incident from occurring. 

References

Bible gateway passage: 2 timothy 4:2 – new international version. Bible Gateway. (n.d.). Retrieved February 6, 2023, from https://www.biblegateway.com/passage/?search=2+Timothy+4%3A2&version=NIV

Hale, C. (2018, May 1). Security in depth. ISACA. Retrieved February 6, 2023, from https://www.isaca.org/resources/isaca-journal/issues/2018/volume-3/security-in-depth

Miralis, D. (2020, October 19). Australian national security: What are the five principles of the protective security policy framework?Lexology. Retrieved February 6, 2023, from https://www.lexology.com/library/detail.aspx?g=97abff03-36ab-4f6b-a051-f93816cf64d6







Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more