Quantcast Table 4. Checlist of Design Threat for Aggressor Categories

Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search

the asset is in the given facility; and (c) the risk at other similar
facilities with the asset in the area (either on site or off) is perceived as
higher.  The last implies that alternative facilities with similar assets are
in the area, and that their protective measures are perceived by the
aggressor as more difficult to penetrate.
Whether the aggressor is deterred by a given set of protective
measures depends on:  (a) if a specific aggressor's motivation is known to be
high, or (b) there is a history (either locally, or elsewhere) of a given
attack not being deterred by the given protective measures.
Whether a given aggressor's motivation is high, in turn,
depends on whether they perceive both the reward for success and the
probability of success as high.
In turn, whether an aggressor may perceive the probability of
attack success as high depends on a history of successes; or if the manpower,
equipment, and opportunity available to the aggressor is perceived by them as
sufficient to accomplish their objectives and to escape.


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc.