- Home
- Search Result
Search Results
Filter
Topics
Industry
Threats
Article Type
Document Types
DEFINED TERM(S)
Vulnerability
Vulnerability is how inherently prone an asset is to the threat. It considers what measures are in place to protect the asset, as well as the state of those measures. A vulnerability could be exploited by threat actors
Risk
Risk is a situation that could occur as a result of the threat and vulnerability, causing loss to or damage of the asset. Risks are what your protective security measures are designed to reduce or remove – in other words, what those measures are designed to mitigate.
152 results for "Vulnerability"
Vulnerabilities Checklist -Safeguard Supply PDF
Vulnerabilities Checklist -Safegaurd Supply
Countering Threats from Uncrewed Aerial Systems - Assessing The Threat & Vulnerability PDF
This document provides information as to how to assess the vulnerability of a site to the threat of Unmanned Aerial Systems. Detailed guidance is provided as to the four tasks that should be undertak...
Disrupting Hostile Reconnaissance
Why and how hostile reconnaissance is conducted, and the principles of how to disrupt threats during the reconnaissance phase, along with practical measures on how to reduce the vulnerability of their...
Guidance for Business
Guidance on supply chain resilience or the security of supply. Aims to help businesses and organisations to anticipate, prepare and adaptively respond to prevent disruption to supply chains.
Building Automation and Control Systems (BACS)
These systems are essential for the safe, secure and resilient operation of most built assets, and their potential vulnerability should addressed when assessing potential threats.
Considering the Risks
Developing a risk based plan to doing business with overseas parties is essential to ensure success.
Use of UAS - Managing Security Risks PDF
The adoption of UAS into an organisations protective security model can bring a number of benefits, but it must be noted that there are also potential risks that may need to be considered and mitigate...
Promoting public vigilance and reporting at sites PDF
Terrorist attacks in crowded places raise issues and concerns as to how sites and organisations can keep their public areas safe. While it is not possible to completely protect our public spaces from ...
Security Considerations Assessment (SCA)
A New set of guidance documents and video for SCA (Security Considerations Assessment) have been published to ensure security-related vulnerabilities are considered across a range of activities and pr...
Enhancing Doors, Windows, Patio Doors and Walls Guidance
Guidance for high-risk individuals and those advising them on protecting premises from the threat of forced entry
Data hall risks for owners
In addition to the layered security you provide to protect data halls, data owners should be encouraged to implement extra security measures and controls on the perimeter of their own networking equip...