• Medientyp: E-Book
  • Titel: Emerging threats and security planning : how should we decide what hypothetical threats to worry about?
  • Beteiligte: Jackson, Brian A. [VerfasserIn]; Frelinger, Dave [Sonstige Person, Familie und Körperschaft]
  • Erschienen: Santa Monica, CA: RAND, 2009
    [S.l.]: HathiTrust Digital Library, 2010
  • Erschienen in: RAND Corporation occasional paper series ; OP-256-RC
  • Umfang: 1 Online-Ressource (x, 19 pages)
  • Sprache: Englisch
  • ISBN: 9780833047311; 0833048643; 0833047310; 9780833048646
  • Schlagwörter: Strategic planning United States ; Civil defense United States ; National security United States Planning ; Terrorism United States Prevention ; Strategic planning ; Civil defense ; National security ; Terrorism ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; POLITICAL SCIENCE ; Terrorism ; Military readiness ; Planning ; National security ; Planning ; Terrorism ; Prevention ; United States ; United States Defenses Planning
  • Hersteller der Reproduktion: [S.l.]: HathiTrust Digital Library, 2010
  • Reproduktionsnotiz: Electronic reproduction
  • Entstehung:
  • Anmerkungen: Includes bibliographical references (pages 17-19)
    Use copy Restrictions unspecified star MiAaHDL
    Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002
  • Beschreibung: "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover

    "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover
  • Zugangsstatus: Freier Zugang