- Home
- Search Result
Search Results
Filter
Topics
Industry
Threats
Article Type
Document Types
DEFINED TERM(S)
Asset
An asset can be anything an organisation deems critical to its success or continued operation. Loss of assets would mean proper functioning becomes impaired or stops altogether. Assets need to be identified, prioritised and protected. They can be people, information, equipment, or places; assets can be tangible or intangible, for example reputation. Essentially, an asset is what we are trying to protect.
Foreign Direct Investment
Foreign Direct Investment (FDI): an investment made by a company or individual in one country in business interests in another country. The aim being to establish a controlling interest or acquiring business assets
Vulnerability
Vulnerability is how inherently prone an asset is to the threat. It considers what measures are in place to protect the asset, as well as the state of those measures. A vulnerability could be exploited by threat actors
Security-Mindedness
In relation to built assets, security mindedness is the adoption of appropriate and proportionate measures to reduce the risk of loss or disclosure of information which could impact on the safety or security of: personnel and other occupants or users; the asset itself; asset information; the benefits the asset exists to deliver
Security Engineering
The design and application of physical, personnel and cyber protective security measures to protect assets and operations against malicious attacks such as terrorism, espionage and crime
Risk
Risk is a situation that could occur as a result of the threat and vulnerability, causing loss to or damage of the asset. Risks are what your protective security measures are designed to reduce or remove – in other words, what those measures are designed to mitigate.
Insider
A person who exploits, or has the intention to exploit, their legitimate access to an organisation’s assets for unauthorised purposes
Physical Security
Refers to measures designed to ensure the physical protection of people, property and assets from actions and events that could cause damage or loss
194 results for "Asset"
Asset
Information on the protective security measures that can achieve the protective security principles of Deter, Detect, Delay, Mitigate and Response in relation to an asset.
Asset Identification Guide PDF
This Asset Identification Guide has been developed to assist anyone responsible for identifying an organisation’s critical assets as part of the Protective Security Risk Assessment process
Sensitive Information & Assets
Sensitive information and assets, whatever their form, must be appropriately protected from creation through to verified destruction.
Securing Underground Asset Data
Guidance on a security-minded approach to securing underground asset data.
SCA - New Built Assets PDF
A SCA should be undertaken when planning, designing, manufacturing and constructing new assets, whether a building or infrastructure. The asset owner(s) should therefore ensure that processes are in p...
Asset Cost Estimation Tool (ACET)
NPSA has developed a bespoke tool to help security managers in the UK obtain a realistic estimate of the cost of losing a critical asset
SCA - End of life of a built asset PDF
A SCA should be undertaken at the end of life of a built asset, including a change of owner or occupier, where failure to take appropriate measures could result in precise details about security risks...
Built Asset Security Strategy Template PDF
Built Asset Security Strategy Template
Protecting Your Assets
NPSA’s protective security methodology is based on the core principles of Deter, Detect and Delay. It defines a holistic approach to the protection of the most important or sensitive assets.
Identify your Most Valuable Assets
Passport to Good Security - Identify your Most Valuable Assets: understanding which assets are critical to your organisation’s existence and operation should be the starting point in your protective s...
SCA - Modification or improvement - existing built asset PDF
A SCA should be carried out when undertaking a significant modification or improvement of an existing built asset, whether a building or infrastructure. The asset owner(s) should therefore ensure that...
Establishing a dialogue about the security of digital built assets PDF
This guidance provides the questions which an organisation needs to ask of itself and its supply chain, including its professional advisers, in order to gain an understanding of what information it, o...