Here is the synopsis of our sample research paper on From A Threat-Based Approach to A Risk Based Approach to Security. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 7 page paper considers the way in which security challenges are dealt with is gradually shifted from a threat-based approach to a risk based approach. The concept of both approaches is discussed along with the way in which they may be perceived in terms of approaches to dealing with issues such as terrorist threats. The bibliography cites 8 sources.
Page Count:
7 pages (~225 words per page)
File: TS14_TEthreatrisk.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
model to one that is a risk based approach. There are many reasons for this shift including the changing nature of threats and risks. There is a pattern of
movement towards risk based management with proponents arguing that it has the potential to be more flexible and adaptive, but it is still a move that is taking place and
receiving criticism. With the threats and risks that are emerging, as well as the potential scale that is facilitated by technology and innovation and there is a need to assess
which of the approaches are best. Poole (2008; p4) argues that to take a threat based approach can be seen as
akin to the unsuccessful Maginot Line. Strategies that are akin or literally aligned to the building of walls to defend against specific perceived threat have been a strategy used for
centuries. It has been a threat based approach that has influenced the way in which military forces have been created, trained and are maintained, influencing even in the structure of
an organization. The main idea is that if a system, structure or policy can deal with the most serous threats that can be perceived then the same measures should
deal with the lesser threats. It was a threat based approach that NATO used during the cold war, and although this did provide a degree of efficiency, and facilitated the
development of suitable structures and system, such as systems to allow allies to exchange information threats but as the environment has change and the perceived threats disappeared or changed NATO
became inefficient (Haftendorn et al, 1999; p153). When looking at the threat based approach the way that a threat is defined needs
...