Once the risk assessment is done, it is then time to act on the information. Based on the Read items thus far, discuss principles of protective security as it relates to risk. How do prevention, information collection, information sharing, risk mitigation, and cost-benefit analysis figure into the process? Consider terrorism but also all hazards.
TEXTBOOK: Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN: 9781119237785.
Preventing terrorist attacks and other security threats requires a comprehensive approach that includes prevention, information collection, information sharing, risk mitigation and cost-benefit analysis. Prevention is an essential part of the process by which risks can be managed effectively; it involves working to reduce exposure to harm through preventive measures such as technical solutions, physical barriers, or policies that limit access to certain areas or resources.
Information collection in regards to terrorism entails gathering intelligence on potential threats in order to identify possible targets before they become active. Information sharing between different departments and agencies within a government is also important in order to ensure that all parties are aware of any impending threats and can work together to prevent them from occurring. Risk mitigation encompasses strategies designed both for reducing the likelihood of an attack taking place as well as minimizing the impact if one does take place; these include developing emergency response plans, hardening critical infrastructure against attack, and implementing regular training exercises for personnel. Finally, cost-benefit analysis is used when weighing up the costs associated with implementing protective measures versus their potential benefit in terms of preventing damage from an attack or threat.