Emerging threats and security planning: how should we decide what hypothetical threats to worry about?
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA
RAND
2009
|
Schriftenreihe: | Occasional paper (Rand Corporation)
OP-256-RC. |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Includes bibliographical references (pages 17-19) "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References |
Beschreibung: | 1 Online-Ressource (x, 19 pages) |
ISBN: | 0833048643 9780833048646 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043144989 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2009 |||| o||u| ||||||eng d | ||
020 | |a 0833048643 |c electronic bk. |9 0-8330-4864-3 | ||
020 | |a 9780833048646 |c electronic bk. |9 978-0-8330-4864-6 | ||
027 | |a RAND/OP-256-RC | ||
035 | |a (OCoLC)559031517 | ||
035 | |a (DE-599)BVBBV043144989 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 355/.033573 |2 22 | |
100 | 1 | |a Jackson, Brian A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Emerging threats and security planning |b how should we decide what hypothetical threats to worry about? |c Brian A. Jackson, David R. Frelinger |
264 | 1 | |a Santa Monica, CA |b RAND |c 2009 | |
300 | |a 1 Online-Ressource (x, 19 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Occasional paper (Rand Corporation) |v OP-256-RC. | |
500 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 | ||
500 | |a Includes bibliographical references (pages 17-19) | ||
500 | |a "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover | ||
500 | |a Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References | ||
650 | 4 | |a Military Science | |
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE / Terrorism |2 bisacsh | |
650 | 7 | |a Civil defense |2 fast | |
650 | 7 | |a Military readiness / Planning |2 fast | |
650 | 7 | |a National security / Planning |2 fast | |
650 | 7 | |a Strategic planning |2 fast | |
650 | 7 | |a Terrorism / Prevention |2 fast | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a National security |z United States |x Planning | |
650 | 4 | |a Terrorism |z United States |x Prevention | |
650 | 4 | |a Strategic planning |z United States | |
650 | 4 | |a Civil defense |z United States | |
651 | 4 | |a USA | |
700 | 1 | |a Frelinger, Dave |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 0-8330-4731-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-8330-4731-1 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304905 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028569180 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304905 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304905 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175598309867520 |
---|---|
any_adam_object | |
author | Jackson, Brian A. |
author_facet | Jackson, Brian A. |
author_role | aut |
author_sort | Jackson, Brian A. |
author_variant | b a j ba baj |
building | Verbundindex |
bvnumber | BV043144989 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)559031517 (DE-599)BVBBV043144989 |
dewey-full | 355/.033573 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355/.033573 |
dewey-search | 355/.033573 |
dewey-sort | 3355 533573 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04596nmm a2200601zcb4500</leader><controlfield tag="001">BV043144989</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833048643</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-8330-4864-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833048646</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-8330-4864-6</subfield></datafield><datafield tag="027" ind1=" " ind2=" "><subfield code="a">RAND/OP-256-RC</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)559031517</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043144989</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355/.033573</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jackson, Brian A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Emerging threats and security planning</subfield><subfield code="b">how should we decide what hypothetical threats to worry about?</subfield><subfield code="c">Brian A. Jackson, David R. Frelinger</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, CA</subfield><subfield code="b">RAND</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (x, 19 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Occasional paper (Rand Corporation)</subfield><subfield code="v">OP-256-RC.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 17-19)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military Science</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Civil defense</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Military readiness / Planning</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security / Planning</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Strategic planning</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="z">United States</subfield><subfield code="x">Planning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Strategic planning</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Civil defense</subfield><subfield code="z">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Frelinger, Dave</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">0-8330-4731-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-8330-4731-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304905</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028569180</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304905</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304905</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043144989 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:50Z |
institution | BVB |
isbn | 0833048643 9780833048646 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028569180 |
oclc_num | 559031517 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (x, 19 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | RAND |
record_format | marc |
series2 | Occasional paper (Rand Corporation) |
spelling | Jackson, Brian A. Verfasser aut Emerging threats and security planning how should we decide what hypothetical threats to worry about? Brian A. Jackson, David R. Frelinger Santa Monica, CA RAND 2009 1 Online-Ressource (x, 19 pages) txt rdacontent c rdamedia cr rdacarrier Occasional paper (Rand Corporation) OP-256-RC. Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Includes bibliographical references (pages 17-19) "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References Military Science POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh POLITICAL SCIENCE / Terrorism bisacsh Civil defense fast Military readiness / Planning fast National security / Planning fast Strategic planning fast Terrorism / Prevention fast Terrorismus National security United States Planning Terrorism United States Prevention Strategic planning United States Civil defense United States USA Frelinger, Dave Sonstige oth Erscheint auch als Druck-Ausgabe, Paperback 0-8330-4731-0 Erscheint auch als Druck-Ausgabe, Paperback 978-0-8330-4731-1 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304905 Aggregator Volltext |
spellingShingle | Jackson, Brian A. Emerging threats and security planning how should we decide what hypothetical threats to worry about? Military Science POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh POLITICAL SCIENCE / Terrorism bisacsh Civil defense fast Military readiness / Planning fast National security / Planning fast Strategic planning fast Terrorism / Prevention fast Terrorismus National security United States Planning Terrorism United States Prevention Strategic planning United States Civil defense United States |
title | Emerging threats and security planning how should we decide what hypothetical threats to worry about? |
title_auth | Emerging threats and security planning how should we decide what hypothetical threats to worry about? |
title_exact_search | Emerging threats and security planning how should we decide what hypothetical threats to worry about? |
title_full | Emerging threats and security planning how should we decide what hypothetical threats to worry about? Brian A. Jackson, David R. Frelinger |
title_fullStr | Emerging threats and security planning how should we decide what hypothetical threats to worry about? Brian A. Jackson, David R. Frelinger |
title_full_unstemmed | Emerging threats and security planning how should we decide what hypothetical threats to worry about? Brian A. Jackson, David R. Frelinger |
title_short | Emerging threats and security planning |
title_sort | emerging threats and security planning how should we decide what hypothetical threats to worry about |
title_sub | how should we decide what hypothetical threats to worry about? |
topic | Military Science POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh POLITICAL SCIENCE / Terrorism bisacsh Civil defense fast Military readiness / Planning fast National security / Planning fast Strategic planning fast Terrorism / Prevention fast Terrorismus National security United States Planning Terrorism United States Prevention Strategic planning United States Civil defense United States |
topic_facet | Military Science POLITICAL SCIENCE / Political Freedom & Security / Terrorism POLITICAL SCIENCE / Terrorism Civil defense Military readiness / Planning National security / Planning Strategic planning Terrorism / Prevention Terrorismus National security United States Planning Terrorism United States Prevention Strategic planning United States Civil defense United States USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304905 |
work_keys_str_mv | AT jacksonbriana emergingthreatsandsecurityplanninghowshouldwedecidewhathypotheticalthreatstoworryabout AT frelingerdave emergingthreatsandsecurityplanninghowshouldwedecidewhathypotheticalthreatstoworryabout |