<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://securipedia.eu/index.php?action=history&amp;feed=atom&amp;title=Security_Vulnerability</id>
	<title>Security Vulnerability - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://securipedia.eu/index.php?action=history&amp;feed=atom&amp;title=Security_Vulnerability"/>
	<link rel="alternate" type="text/html" href="https://securipedia.eu/index.php?title=Security_Vulnerability&amp;action=history"/>
	<updated>2026-05-10T08:40:04Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.34.0</generator>
	<entry>
		<id>https://securipedia.eu/index.php?title=Security_Vulnerability&amp;diff=14348&amp;oldid=prev</id>
		<title>Puck at 09:27, 20 November 2020</title>
		<link rel="alternate" type="text/html" href="https://securipedia.eu/index.php?title=Security_Vulnerability&amp;diff=14348&amp;oldid=prev"/>
		<updated>2020-11-20T09:27:49Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Revision as of 09:27, 20 November 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 9:&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 9:&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;&amp;lt;br /&amp;gt;&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;&amp;lt;br /&amp;gt;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;==&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;Threat types&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;==&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;==Threat types==&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;Threats can be categorised in a number of [[Security threats|threat]] types. Vulnerabilities and their mitigation are generally associated with one or more threat types. The following threat types have been used in EU projects:&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;Threats can be categorised in a number of [[Security threats|threat]] types. Vulnerabilities and their mitigation are generally associated with one or more threat types. The following threat types have been used in EU projects:&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;#&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;&#039;&#039;Fire arms&#039;&#039; attack - small calibre pistol or semi/full-automatic rifle;&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;#&#039;&#039;Fire arms&#039;&#039; attack - small calibre pistol or semi/full-automatic rifle;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;#&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;&#039;&#039;Sharp object&#039;&#039; attack - knifes, machete, other sharp and blunt objects;&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;#&#039;&#039;Sharp object&#039;&#039; attack - knifes, machete, other sharp and blunt objects;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;#&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;&#039;&#039;Vehicle&#039;&#039; attack - use of vehicle as a weapon by ramming large crowds;&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;#&#039;&#039;Vehicle&#039;&#039; attack - use of vehicle as a weapon by ramming large crowds;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;#&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &#039;&#039;IED&lt;/del&gt;&#039;&#039; (&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;explosives&lt;/del&gt;) - left/concealed in objects or goods (based on home-made or commercial explosives);&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;#&#039;&#039;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Improvised Explosive Device&lt;/ins&gt; (&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;IED&lt;/ins&gt;)&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&#039;&#039;&lt;/ins&gt; - left/concealed in objects or goods (based on home-made or commercial explosives);&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;#&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;&#039;&#039;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;PBIED&lt;/del&gt;&#039;&#039; (&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;explosives&lt;/del&gt;) - explosives concealed on a person (suicide or carrier);&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;#&#039;&#039;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Person-Born Improvised Explosive Device&lt;/ins&gt;&#039;&#039; (&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;PBIED&lt;/ins&gt;) - explosives concealed on a person (suicide or carrier);&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;#&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &#039;&#039;UAVIED&lt;/del&gt;&#039;&#039; (&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;explosives&lt;/del&gt;) - explosives delivered by a remote-controlled airborne device;&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;#&#039;&#039;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Unmanned Aerial Vehicle Improvised Explosive Device&lt;/ins&gt; (&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;UAVIED&lt;/ins&gt;)&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&#039;&#039;&lt;/ins&gt; - explosives delivered by a remote-controlled airborne device;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;#&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &#039;&#039;VBIED&lt;/del&gt;&#039;&#039; (&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;explosives&lt;/del&gt;) - explosives concealed inside a vehicle (or its cargo);&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;#&#039;&#039;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Vehicle-Borne Improvised Explosive Devise&lt;/ins&gt; (&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;VBIED&lt;/ins&gt;)&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&#039;&#039;&lt;/ins&gt; - explosives concealed inside a vehicle (or its cargo);&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;#&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;&#039;&#039;Chemical&#039;&#039; attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;#&#039;&#039;Chemical&#039;&#039; attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;#&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;&#039;&#039;Biological&#039;&#039; attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;#&#039;&#039;Biological&#039;&#039; attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;#&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;&#039;&#039;Radiological&#039;&#039; attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;#&#039;&#039;Radiological&#039;&#039; attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;==&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;Identification of vulnerabilities&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;==&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;==Identification of vulnerabilities==&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;In the EU PRoTECT project a method was used to [[Vulnerability assessment of the EU PRoTECT project|identify and assess vulnerabilities.]] &lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;In the EU PRoTECT project a method was used to [[Vulnerability assessment of the EU PRoTECT project|identify and assess vulnerabilities.]] &lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;==&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;Examples of vulnerabilities and possible solutions&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;==&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;==Examples of vulnerabilities and possible solutions==&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;In ProTECT research, a number of vulnerabilities due to absence of [[measures]] were identified and in the context of the research, a number of possible (preferred) solutions were put forward. The following table contains a number of these pairs of vulnerabilities with possible solutions. Please note that these are examples as found in the specific context of the PRoTECT research. &lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;In ProTECT research, a number of vulnerabilities due to absence of [[measures]] were identified and in the context of the research, a number of possible (preferred) solutions were put forward. The following table contains a number of these pairs of vulnerabilities with possible solutions. Please note that these are examples as found in the specific context of the PRoTECT research. &lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;

&lt;!-- diff cache key securipedia-sp_:diff:wikidiff2:1.12:old-14284:rev-14348:1.14.1 --&gt;
&lt;/table&gt;</summary>
		<author><name>Puck</name></author>
		
	</entry>
	<entry>
		<id>https://securipedia.eu/index.php?title=Security_Vulnerability&amp;diff=14284&amp;oldid=prev</id>
		<title>Dolinda: Created page with &quot;Vulnerability is a circumstance that given the realization of a threat could expedite harm to people or damage to objects. If the threat involves human intent, the vulnerabili...&quot;</title>
		<link rel="alternate" type="text/html" href="https://securipedia.eu/index.php?title=Security_Vulnerability&amp;diff=14284&amp;oldid=prev"/>
		<updated>2020-11-13T12:32:33Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Vulnerability is a circumstance that given the realization of a threat could expedite harm to people or damage to objects. If the threat involves human intent, the vulnerabili...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Vulnerability is a circumstance that given the realization of a threat could expedite harm to people or damage to objects. If the threat involves human intent, the vulnerability is a weakness that can be exploited by the perpetrator (for example weakly guarded entrances to an object). &lt;br /&gt;
&lt;br /&gt;
In the context of [[security]], this means that the absence of measures increases the risk of harm or damages. For example, certain [[Public space|public spaces of interest]] can be considered [[soft targets]]. This means that crowded public places including the metro, shopping centres, sports stadiums, bars, restaurants, clubs and commercial sidewalks, are easily accessible to the public and an easy target for [[Terrorism|terrorists]] to do great harm. These spaces inherently carry a risk of potentially far-reaching harm, or put in other words, are potentially vulnerable.&lt;br /&gt;
&lt;br /&gt;
Given the focus on human intent, the concept of security vulnerability can be seen more suitable for use by security organisations (such as LEAs) or event planners whereas [[Safety Vulnerability|safety vulnerability]], on the other hand, is a concept more suitable for the use by urban planners.  &lt;br /&gt;
&lt;br /&gt;
The following figure shows examples of missing measures that increase the security vulnerability of a location. These examples are derived from the [[PRoTECT research project|EU PRoTECT project]]&amp;#039;&amp;#039;&amp;#039;.&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
[[File:Examples of Vulnerabilities.png|none|thumb|534x534px|Examples of Vulnerabilities]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Threat types ==&lt;br /&gt;
Threats can be categorised in a number of [[Security threats|threat]] types. Vulnerabilities and their mitigation are generally associated with one or more threat types. The following threat types have been used in EU projects:&lt;br /&gt;
&lt;br /&gt;
# &amp;#039;&amp;#039;Fire arms&amp;#039;&amp;#039; attack - small calibre pistol or semi/full-automatic rifle;&lt;br /&gt;
# &amp;#039;&amp;#039;Sharp object&amp;#039;&amp;#039; attack - knifes, machete, other sharp and blunt objects;&lt;br /&gt;
# &amp;#039;&amp;#039;Vehicle&amp;#039;&amp;#039; attack - use of vehicle as a weapon by ramming large crowds;&lt;br /&gt;
# &amp;#039;&amp;#039;IED&amp;#039;&amp;#039; (explosives) - left/concealed in objects or goods (based on home-made or commercial explosives);&lt;br /&gt;
# &amp;#039;&amp;#039;PBIED&amp;#039;&amp;#039; (explosives) - explosives concealed on a person (suicide or carrier);&lt;br /&gt;
# &amp;#039;&amp;#039;UAVIED&amp;#039;&amp;#039; (explosives) - explosives delivered by a remote-controlled airborne device;&lt;br /&gt;
# &amp;#039;&amp;#039;VBIED&amp;#039;&amp;#039; (explosives) - explosives concealed inside a vehicle (or its cargo);&lt;br /&gt;
# &amp;#039;&amp;#039;Chemical&amp;#039;&amp;#039; attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);&lt;br /&gt;
# &amp;#039;&amp;#039;Biological&amp;#039;&amp;#039; attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);&lt;br /&gt;
# &amp;#039;&amp;#039;Radiological&amp;#039;&amp;#039; attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).&lt;br /&gt;
&lt;br /&gt;
== Identification of vulnerabilities ==&lt;br /&gt;
In the EU PRoTECT project a method was used to [[Vulnerability assessment of the EU PRoTECT project|identify and assess vulnerabilities.]] &lt;br /&gt;
&lt;br /&gt;
== Examples of vulnerabilities and possible solutions ==&lt;br /&gt;
In ProTECT research, a number of vulnerabilities due to absence of [[measures]] were identified and in the context of the research, a number of possible (preferred) solutions were put forward. The following table contains a number of these pairs of vulnerabilities with possible solutions. Please note that these are examples as found in the specific context of the PRoTECT research. &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;Vulnerabilities and possible solutions&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|Vulnerabilities&lt;br /&gt;
|Possible Solutions&lt;br /&gt;
|-&lt;br /&gt;
|Lack of physical  barriers  (lack of physical security  measures; square to close to main street; not delimited square perimeter) &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
|Physical barriers  proposed solutions: 1. Metallic fences 2. Bollards 3. Panic room &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|Lack of best  practices  (insufficient communication  systems) &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
|Best practices  proposed solution: 1. Community awareness training 2. Victim support  approaches after attack 3. OSINT technologies (threat detection tools) 4.  Risk assessment tools and techniques 5. Simulation, training, and gaming  tools 6. Solutions for terrorist crisis management 7. Fast transfer  information practices 8. Organisation based on GIS systems &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|Lack of technical  solutions  (insufficient alert systems;  access control checks; lack of surveillance systems) &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
|Technological  proposed solution: 1. CCTV to record people and vehicles 2. Anomaly detection  systems  3. Fire detectors 4. Automatic  Sprinklers 5. Millimetre wave scanner 6. System optimum travel information  (PSOI) 7. Audio analytics systems 8. Signal jamming devices for drones 9.  WiFi and communication systems &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|Architectural  vulnerabilities  (crowded places, no  &amp;#039;places to hide&amp;#039;; narrow streets; bus station overcrowded and close to  venues) &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
|Architectural  proposed solution: 1. Environmentally integrated solutions 2. Light exit  pathways 3. Motion sensor lights 4. Architectural modification and  improvements &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Dolinda</name></author>
		
	</entry>
</feed>