Hlsc 720-discussion 4-reply 1 | HLSC 720 – Critical Infrastructure: Vulnerability Analysis and Protection | Liberty University

The thread must be a minimum of 200-400 words. MINIMUM OF TWO SOURCES BESIDES THE TEXTBOOK. Must cite at least 2 sources in addition to the Bible.

TEXTBOOK: Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN: 9781119237785.


The identification, evaluation, and management of risks to assets, personnel, and resources are the primary goals of the protective security principles that make up the foundation of a risk management strategy. These objectives can be accomplished by adhering to these fundamental protective security principles. Protective security reduces the likelihood that individuals, assets, or data will be compromised because of an attack. It entails prevention, the collection of information, the sharing of information, the mitigation of risk, and the measurement of cost vs. benefit.


Prevention is the first and most crucial principle of protective security. The fundamental objective of prevention is to eliminate or significantly minimize risks by removing the possibility of adverse effects. This can be accomplished by lessening the susceptibility of both assets and individuals and instituting policies and processes designed to lessen the possibility of a threat actually being carried out. Administrative processes like background checks, access control, and physical security measures like locks, alarms, and surveillance systems can be utilized to prevent criminal activity.

The Accumulation of Information

The gathering of relevant information constitutes the second principle of protective security. This requires collecting and evaluating data to discover potential dangers and weak spots in the system. Data might originate from many sources, such as personnel records, physical security systems, and intelligence reports. The identification of dangers and the implementation of relevant countermeasures can be accomplished by companies once they have collected and analyzed the data in question.

The Exchange of Information

The dissemination and exchange of information is the third tenet of protective security. Making the system more secure necessitates disseminating information to third parties, including private businesses, public agencies, and other organizations. Organizations can better identify possible risks and take appropriate measures to protect themselves if they share information and do so more promptly. In addition to this, the sharing of information can assist firms in the development of more efficient security policies and procedures.

Risk Mitigation

The focus of the fourth principle of preventive security is the reduction of potential danger. This involves taking measures to limit the risk of an incident occurring or the impact of an incident if it does occur to lessen the potential damage that the occurrence of an incident could cause. Physical security precautions, administrative controls, and emergency response protocols are all examples of risk reduction tactics that may be used.

Evaluation of the Costs and Benefits

The fifth premise is evaluating the costs and benefits of preventive security measures. This requires determining if the possible benefits of additional security measures are worth the additional costs of those measures. Organizations are responsible for weighing the prospective costs and advantages of implementing security measures, including the potential cost savings that could result from preventing an incident or reducing the severity of its impact.

When contemplating preventative safety measures, businesses are obligated to consider all possible threats, including acts of terrorism. The dangers posed by terrorism require specific countermeasures, which can only be provided by vigilant security. Measures of physical security, gathering intelligence, exchanging information, and other risk reduction tactics could all fall under this category. When determining the most effective method to safeguard resources and employees, businesses must also consider the financial implications of implementing various security precautions. Organizations can lessen the likelihood of harm being caused to individuals, property, and information if they adhere to protective security principles.

2 Timothy 4:2 explains “Preach the word; be prepared in season and out of season; correct, rebuke and encourage—with great patience and careful instruction.” (NIV) This biblical worldview explains that preparation is needed and crucial. To be prepared and to have a plan with help prevention of an incident from occurring. 


Bible gateway passage: 2 timothy 4:2 – new international version. Bible Gateway. (n.d.). Retrieved February 6, 2023, from https://www.biblegateway.com/passage/?search=2+Timothy+4%3A2&version=NIV

Hale, C. (2018, May 1). Security in depth. ISACA. Retrieved February 6, 2023, from https://www.isaca.org/resources/isaca-journal/issues/2018/volume-3/security-in-depth

Miralis, D. (2020, October 19). Australian national security: What are the five principles of the protective security policy framework?Lexology. Retrieved February 6, 2023, from https://www.lexology.com/library/detail.aspx?g=97abff03-36ab-4f6b-a051-f93816cf64d6

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount