<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://securipedia.eu/index.php?action=history&amp;feed=atom&amp;title=Vulnerability_assessment_of_the_EU_PRoTECT_project</id>
	<title>Vulnerability assessment of the EU PRoTECT project - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://securipedia.eu/index.php?action=history&amp;feed=atom&amp;title=Vulnerability_assessment_of_the_EU_PRoTECT_project"/>
	<link rel="alternate" type="text/html" href="https://securipedia.eu/index.php?title=Vulnerability_assessment_of_the_EU_PRoTECT_project&amp;action=history"/>
	<updated>2026-05-16T03:34:33Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.34.0</generator>
	<entry>
		<id>https://securipedia.eu/index.php?title=Vulnerability_assessment_of_the_EU_PRoTECT_project&amp;diff=14371&amp;oldid=prev</id>
		<title>Dolinda at 14:26, 23 November 2020</title>
		<link rel="alternate" type="text/html" href="https://securipedia.eu/index.php?title=Vulnerability_assessment_of_the_EU_PRoTECT_project&amp;diff=14371&amp;oldid=prev"/>
		<updated>2020-11-23T14:26:36Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Revision as of 14:26, 23 November 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 47:&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 47:&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;===Step 2: Existing security measures===&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;===Step 2: Existing security measures===&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;Gather together with the team of experts, the existing security measures you are aware of regarding the specific site. This can be a natural measure, for instance a wall that can create a blockage or to hide behind, or emplaced measures, for instance surveillance police teams or road blocks. Within the PRoTECT project the measures&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; [BP(vd1]&lt;/del&gt; were categorized by the use of technology solutions.&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;Gather together with the team of experts, the existing security measures you are aware of regarding the specific site. This can be a natural measure, for instance a wall that can create a blockage or to hide behind, or emplaced measures, for instance surveillance police teams or road blocks. Within the PRoTECT project the measures were categorized by the use of technology solutions.&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;===Step 3: Scenario per threat type===&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;===Step 3: Scenario per threat type===&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;Use each other’s creativity and expertise to assess scenario’s according to ten potential &#039;&#039;&#039;&#039;&#039;terrorist threat types&#039;&#039;&#039;&#039;&#039; mentioned by the EU VAT. The ten potential threat&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; [BP(vd2]&lt;/del&gt; types used are:&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;Use each other’s creativity and expertise to assess scenario’s according to ten potential &#039;&#039;&#039;&#039;&#039;terrorist threat types&#039;&#039;&#039;&#039;&#039; mentioned by the EU VAT. The ten potential threat types used are:&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;#&#039;&#039;Fire arms&#039;&#039; attack - small calibre pistol or semi/full-automatic rifle;&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;#&#039;&#039;Fire arms&#039;&#039; attack - small calibre pistol or semi/full-automatic rifle;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 74:&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 74:&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;&amp;lt;br /&amp;gt;&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;&amp;lt;br /&amp;gt;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;==&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;Footnotes and references&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;==&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;==Footnotes and references==&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;&amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;&amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Dolinda</name></author>
		
	</entry>
	<entry>
		<id>https://securipedia.eu/index.php?title=Vulnerability_assessment_of_the_EU_PRoTECT_project&amp;diff=14358&amp;oldid=prev</id>
		<title>Puck at 09:35, 20 November 2020</title>
		<link rel="alternate" type="text/html" href="https://securipedia.eu/index.php?title=Vulnerability_assessment_of_the_EU_PRoTECT_project&amp;diff=14358&amp;oldid=prev"/>
		<updated>2020-11-20T09:35:02Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Revision as of 09:35, 20 November 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 71:&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 71:&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;==What’s next==&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;==What’s next==&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;Once an overall insight into the vulnerabilities of the PSOI is available, follow-up actions can be taken. The security experts’ team can suggest mitigation options for some or all of the attack scenarios to the management body. Also, using the results from using the EU VAT, the managing body can evaluate the risks, deciding which risks to mitigate and how (in part based on the options provided by the security team) and which risks to accept. Furthermore, informing and involving the stakeholders. Finally, &#039;&#039;&#039;&#039;&#039;gathering information&#039;&#039;&#039;&#039;&#039; on [[Measures|solutions]] and getting the measures implemented to mitigate &#039;&#039;&#039;&#039;&#039;vulnerabilities&#039;&#039;&#039;&#039;&#039;.&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;Once an overall insight into the vulnerabilities of the PSOI is available, follow-up actions can be taken. The security experts’ team can suggest mitigation options for some or all of the attack scenarios to the management body. Also, using the results from using the EU VAT, the managing body can evaluate the risks, deciding which risks to mitigate and how (in part based on the options provided by the security team) and which risks to accept. Furthermore, informing and involving the stakeholders. Finally, &#039;&#039;&#039;&#039;&#039;gathering information&#039;&#039;&#039;&#039;&#039; on [[Measures|solutions]] and getting the measures implemented to mitigate &#039;&#039;&#039;&#039;&#039;vulnerabilities&#039;&#039;&#039;&#039;&#039;.&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;&amp;lt;br /&amp;gt;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;== Footnotes and references ==&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;&amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;&amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Puck</name></author>
		
	</entry>
	<entry>
		<id>https://securipedia.eu/index.php?title=Vulnerability_assessment_of_the_EU_PRoTECT_project&amp;diff=14349&amp;oldid=prev</id>
		<title>Puck at 09:28, 20 November 2020</title>
		<link rel="alternate" type="text/html" href="https://securipedia.eu/index.php?title=Vulnerability_assessment_of_the_EU_PRoTECT_project&amp;diff=14349&amp;oldid=prev"/>
		<updated>2020-11-20T09:28:16Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Revision as of 09:28, 20 November 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 52:&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 52:&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;Use each other’s creativity and expertise to assess scenario’s according to ten potential &#039;&#039;&#039;&#039;&#039;terrorist threat types&#039;&#039;&#039;&#039;&#039; mentioned by the EU VAT. The ten potential threat [BP(vd2] types used are:&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;Use each other’s creativity and expertise to assess scenario’s according to ten potential &#039;&#039;&#039;&#039;&#039;terrorist threat types&#039;&#039;&#039;&#039;&#039; mentioned by the EU VAT. The ten potential threat [BP(vd2] types used are:&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;1.       &lt;/del&gt;Fire arms attack - small calibre pistol or semi/full-automatic rifle;&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;#&#039;&#039;&lt;/ins&gt;Fire arms&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&#039;&#039;&lt;/ins&gt; attack - small calibre pistol or semi/full-automatic rifle;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-right&quot; title=&quot;Paragraph was moved. Click to jump to old location.&quot; href=&quot;#movedpara_5_0_lhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_2_0_rhs&quot;&gt;&lt;/a&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;#&#039;&#039;&lt;/ins&gt;Sharp object&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&#039;&#039;&lt;/ins&gt; attack - knifes, machete, other sharp and blunt objects;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-right&quot; title=&quot;Paragraph was moved. Click to jump to old location.&quot; href=&quot;#movedpara_9_0_lhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_4_0_rhs&quot;&gt;&lt;/a&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;#&#039;&#039;&lt;/ins&gt;Vehicle&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&#039;&#039;&lt;/ins&gt; attack - use of vehicle as a weapon by ramming large crowds;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-left&quot; title=&quot;Paragraph was moved. Click to jump to new location.&quot; href=&quot;#movedpara_2_0_rhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_5_0_lhs&quot;&gt;&lt;/a&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;2.       &lt;/del&gt;Sharp object attack - knifes, machete, other sharp and blunt objects;&lt;/div&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-right&quot; title=&quot;Paragraph was moved. Click to jump to old location.&quot; href=&quot;#movedpara_13_0_lhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_6_0_rhs&quot;&gt;&lt;/a&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;#&#039;&#039;Improvised&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Explosive&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Device&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;(&lt;/ins&gt;IED)&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&#039;&#039;&lt;/ins&gt; - left/concealed in objects or goods (based on home-made or commercial explosives);&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-right&quot; title=&quot;Paragraph was moved. Click to jump to old location.&quot; href=&quot;#movedpara_17_0_lhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_8_0_rhs&quot;&gt;&lt;/a&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;#&#039;&#039;Person-Born&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Improvised&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Explosive&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Device&#039;&#039;&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;(&lt;/ins&gt;PBIED) - explosives concealed on a person (suicide or carrier);&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-left&quot; title=&quot;Paragraph was moved. Click to jump to new location.&quot; href=&quot;#movedpara_4_0_rhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_9_0_lhs&quot;&gt;&lt;/a&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;3.       &lt;/del&gt;Vehicle attack - use of vehicle as a weapon by ramming large crowds;&lt;/div&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-right&quot; title=&quot;Paragraph was moved. Click to jump to old location.&quot; href=&quot;#movedpara_20_0_lhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_10_0_rhs&quot;&gt;&lt;/a&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;#&#039;&#039;Unmanned&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Aerial&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Vehicle&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Improvised&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Explosive Device&lt;/ins&gt; (&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;UAVIED&lt;/ins&gt;)&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&#039;&#039;&lt;/ins&gt; - explosives delivered by a remote-controlled airborne device;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-right&quot; title=&quot;Paragraph was moved. Click to jump to old location.&quot; href=&quot;#movedpara_20_2_lhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_12_0_rhs&quot;&gt;&lt;/a&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;#&#039;&#039;Vehicle-Borne&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Improvised&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Explosive&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Devise&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;(&lt;/ins&gt;VBIED)&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&#039;&#039;&lt;/ins&gt; - explosives concealed inside a vehicle (or its cargo);&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-left&quot; title=&quot;Paragraph was moved. Click to jump to new location.&quot; href=&quot;#movedpara_6_0_rhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_13_0_lhs&quot;&gt;&lt;/a&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;4.&lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;   &lt;/del&gt; IED&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; (explosives&lt;/del&gt;) - left/concealed in objects or goods (based on home-made or commercial explosives);&lt;/div&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-right&quot; title=&quot;Paragraph was moved. Click to jump to old location.&quot; href=&quot;#movedpara_20_4_lhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_14_0_rhs&quot;&gt;&lt;/a&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;#&#039;&#039;&lt;/ins&gt;Chemical&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&#039;&#039;&lt;/ins&gt; attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-right&quot; title=&quot;Paragraph was moved. Click to jump to old location.&quot; href=&quot;#movedpara_20_6_lhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_16_0_rhs&quot;&gt;&lt;/a&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;#&#039;&#039;&lt;/ins&gt;Biological&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&#039;&#039;&lt;/ins&gt; attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-left&quot; title=&quot;Paragraph was moved. Click to jump to new location.&quot; href=&quot;#movedpara_8_0_rhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_17_0_lhs&quot;&gt;&lt;/a&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;5.&lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt; PBIED&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; (explosives&lt;/del&gt;) - explosives concealed on a person (suicide or carrier);&lt;/div&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-right&quot; title=&quot;Paragraph was moved. Click to jump to old location.&quot; href=&quot;#movedpara_20_8_lhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_18_0_rhs&quot;&gt;&lt;/a&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;#&#039;&#039;&lt;/ins&gt;Radiological&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&#039;&#039;&lt;/ins&gt; attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-left&quot; title=&quot;Paragraph was moved. Click to jump to new location.&quot; href=&quot;#movedpara_10_0_rhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_20_0_lhs&quot;&gt;&lt;/a&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;6.&lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;UAVIED&lt;/del&gt; (&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;explosives&lt;/del&gt;) - explosives delivered by a remote-controlled airborne device;&lt;/div&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-left&quot; title=&quot;Paragraph was moved. Click to jump to new location.&quot; href=&quot;#movedpara_12_0_rhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_20_2_lhs&quot;&gt;&lt;/a&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;7.&lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt; VBIED&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; (explosives&lt;/del&gt;) - explosives concealed inside a vehicle (or its cargo);&lt;/div&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-left&quot; title=&quot;Paragraph was moved. Click to jump to new location.&quot; href=&quot;#movedpara_14_0_rhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_20_4_lhs&quot;&gt;&lt;/a&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;8.       &lt;/del&gt;Chemical attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);&lt;/div&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-left&quot; title=&quot;Paragraph was moved. Click to jump to new location.&quot; href=&quot;#movedpara_16_0_rhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_20_6_lhs&quot;&gt;&lt;/a&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;9.       &lt;/del&gt;Biological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);&lt;/div&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;a class=&quot;mw-diff-movedpara-left&quot; title=&quot;Paragraph was moved. Click to jump to new location.&quot; href=&quot;#movedpara_18_0_rhs&quot;&gt;&amp;#x26AB;&lt;/a&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;&lt;a name=&quot;movedpara_20_8_lhs&quot;&gt;&lt;/a&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;10.   &lt;/del&gt;Radiological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).&lt;/div&gt;&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-added&quot;&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;===Step 4: Consequence and probability===&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;===Step 4: Consequence and probability===&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Puck</name></author>
		
	</entry>
	<entry>
		<id>https://securipedia.eu/index.php?title=Vulnerability_assessment_of_the_EU_PRoTECT_project&amp;diff=14331&amp;oldid=prev</id>
		<title>Puck at 13:45, 19 November 2020</title>
		<link rel="alternate" type="text/html" href="https://securipedia.eu/index.php?title=Vulnerability_assessment_of_the_EU_PRoTECT_project&amp;diff=14331&amp;oldid=prev"/>
		<updated>2020-11-19T13:45:23Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Revision as of 13:45, 19 November 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;Within the EU PRoTECT project municipalities have performed vulnerability assessments on specific public spaces in their region that can be considered soft targets for [[Terrorism|terrorist attacks]]. For this purpose, the EU Vulnerability Assessment Tool developed by DG Home was used and a specific manual for municipalities &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;or other&lt;/del&gt; local law enforcement agencies was developed. This EU VAT is an example of how to identify and analyze vulnerabilities that can be used to focus on determining what kind of measures are needed to mitigate these vulnerabilities&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;. There are multiple other processes and analysis tools for vulnerability assessment and for identifying risks&lt;/del&gt;. &lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;Within the EU PRoTECT project municipalities have performed vulnerability assessments on specific public spaces in their region that can be considered soft targets for [[Terrorism|terrorist attacks]]. For this purpose, the EU Vulnerability Assessment Tool developed by DG Home was used and a specific manual for municipalities &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;and&lt;/ins&gt; local law enforcement agencies was developed. This EU VAT is an example of how to identify and analyze vulnerabilities that can be used to focus on determining what kind of measures are needed to mitigate these vulnerabilities. &lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;==&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;The EU Vulnerability Assessment Tool manual&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;==&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;==The EU Vulnerability Assessment Tool manual==&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;DG HOME has developed the EU Vulnerability Assessment Tool (VAT) (2019) &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;which&lt;/del&gt; main objective &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;is to&lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;provide&lt;/del&gt; practical support to Member &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;States’&lt;/del&gt; to enhance the protection of &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;[[Public space|&lt;/del&gt;public spaces&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;]]&lt;/del&gt; by facilitating&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; the conduction of an&lt;/del&gt; on-site vulnerability &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;assessment&lt;/del&gt;. Within the PRoTECT project, a manual for this EU VAT was developed to specifically aid municipalities and their stakeholders in identifying vulnerabilities of their &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;[[Public space|&lt;/del&gt;public spaces of interest&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;]]&lt;/del&gt; (&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;[[&lt;/del&gt;soft targets&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;]]&lt;/del&gt;) in order to strengthen their protection against terrorism.&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;DG HOME has developed the EU Vulnerability Assessment Tool (VAT) (2019) &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;with the&lt;/ins&gt; main objective &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;of&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;providing&lt;/ins&gt; practical support to Member &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;States&lt;/ins&gt; to enhance the protection of public spaces by facilitating on-site vulnerability &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;assessments&lt;/ins&gt;. Within the PRoTECT project, a manual for this EU VAT was developed to specifically aid municipalities and their stakeholders in identifying vulnerabilities of their public spaces of interest (soft targets) in order to strengthen their protection against terrorism.&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;The EU VAT Manual describes (1) who should perform such an assessment and why, the steps that are needed&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; (2)&lt;/del&gt; before using the tool, (3) what different steps are involved in the assessment and how to record te results of the assessment, and (4)what can be done with the results and what next steps can be taken. &lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;The EU VAT Manual describes (1) who should perform such an assessment and why,&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt; (2)&lt;/ins&gt; the steps that are needed before using the tool, (3) what different steps are involved in the assessment and how to record te results of the assessment, and (4)&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/ins&gt;what can be done with the results and what next steps can be taken. &lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;==&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;Security management and assessing vulnerabilities&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;==&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;==Security management and assessing vulnerabilities==&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;It is important to mention that the vulnerability assessment was organized by a managing body, in the case of the PRoTECT project the five municipalities &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;and their related supporting PRoTECT partner&lt;/del&gt;. It is essential to involve relevant stakeholders &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;for&lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;the security of&lt;/del&gt; the &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;site&lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;to&lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;be assessed and that for the purposes of the PRoTECT project the managing body is responsible for identifying what public space to&lt;/del&gt; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;asses&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Having a&lt;/del&gt; managing &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;body is necessary because some organization needs to take&lt;/del&gt; the lead&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; responsibility&lt;/del&gt; in developing a security plan. Generally, developing a security plan is an ongoing process – threats and other circumstances change, requiring the security plan to be continually adapted as well. In the case of protecting a PSOI against terrorist attacks, it is assumed that even though a certain activity may be unique, there are some common aspects related to the PSOI: the method of planning, managing the activity and other security related aspects.&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;It is important to mention that the vulnerability assessment was organized by a managing body, in the case of the PRoTECT project the five municipalities&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[VG(v1]&lt;/ins&gt; . It is essential to involve relevant stakeholders &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;such&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;as&lt;/ins&gt; the &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;local&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;law&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;enforcement&lt;/ins&gt; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;agency&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;The&lt;/ins&gt; managing &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;has&lt;/ins&gt; the lead in developing a security plan&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt; for the PSOI&lt;/ins&gt;. Generally, developing a security plan is an ongoing process – threats and other circumstances change, requiring the security plan to be continually adapted as well. In the case of protecting a PSOI against terrorist attacks, it is assumed that even though a certain activity&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt; at the PSOI&lt;/ins&gt; may be unique, there are some common aspects related to the PSOI: the method of planning, managing the activity and other security related aspects.&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 31:&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 31:&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;The vulnerabilities of a PSOI and the possible risks of an attack can be identified by examining the PSOI (geographical layout, accessibility for vehicles, natural or emplaced security measures, etc) and devising viable attack scenarios. Scenarios should at least mention the threat type (e.g. shooter), the aim of the attack, with what means and how the terrorist carries out the attack. Conceiving scenarios can be an activity carried out by a team of experts from all the relevant stakeholders that is put together by the managing body. This means that to be able to carry out the assessment, different experts need to be present and gathered to go through all steps. In the risk analysis process, the consequences (i.e. impact, severity) and probability (i.e. likelihood, chance) of each attack scenario are determined by the team of experts, considering all factors of influence.&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;The vulnerabilities of a PSOI and the possible risks of an attack can be identified by examining the PSOI (geographical layout, accessibility for vehicles, natural or emplaced security measures, etc) and devising viable attack scenarios. Scenarios should at least mention the threat type (e.g. shooter), the aim of the attack, with what means and how the terrorist carries out the attack. Conceiving scenarios can be an activity carried out by a team of experts from all the relevant stakeholders that is put together by the managing body. This means that to be able to carry out the assessment, different experts need to be present and gathered to go through all steps. In the risk analysis process, the consequences (i.e. impact, severity) and probability (i.e. likelihood, chance) of each attack scenario are determined by the team of experts, considering all factors of influence.&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;==&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;Before using the tool: getting started&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;==&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;==Before using the tool: getting started==&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;Before using the EU VAT, it is important to determine a managing body. The managing body is an individual, organization or group of organizations that takes up the responsibility to identify and work on counter terrorism regarding PSOIs. This can be a law enforcement agency, a municipality or possibly also the owner of the public space. The management will most likely involve various stakeholders in decisions concerning site security, such as local government, emergency services, retailers, etc. In the case of the PRoTECT project, the managing bodies are the municipalities involved that will identify their vulnerabilities against various terrorist attacks and identify their soft targets. This managing body needs to take the following actions:&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;Before using the EU VAT, it is important to determine a managing body. The managing body is an individual, organization or group of organizations that takes up the responsibility to identify and work on counter terrorism regarding PSOIs. This can be a law enforcement agency, a municipality or possibly also the owner of the public space. The management will most likely involve various stakeholders in decisions concerning site security, such as local government, emergency services, retailers, etc. In the case of the PRoTECT project, the managing bodies are the municipalities involved that will identify their vulnerabilities against various terrorist attacks and identify their soft targets. This managing body needs to take the following actions:&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 40:&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 40:&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;3.       Create and decide on a work method with the team of experts, on how to perform the vulnerability assessment. In the case of PRoTECT this was done by workshop sessions with all relevant stakeholders.&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;3.       Create and decide on a work method with the team of experts, on how to perform the vulnerability assessment. In the case of PRoTECT this was done by workshop sessions with all relevant stakeholders.&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;==&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;Assessing the Public Space of Interest: 5 steps&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;==&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;==Assessing the Public Space of Interest: 5 steps==&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;It is recommended to kick-off by displaying a topographical map to the team, detailing the boundaries of the main site and surrounding sites, and describing the general function of each surrounding site in relation to the activity on the main site. When possible, organize a visit to the PSOI.&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;It is recommended to kick-off by displaying a topographical map to the team, detailing the boundaries of the main site and surrounding sites, and describing the general function of each surrounding site in relation to the activity on the main site. When possible, organize a visit to the PSOI.&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;===&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;Step 1: Characteristics of the site&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;===&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;===Step 1: Characteristics of the site===&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;Write the necessary details like the main site&#039;s name, if there are specific activities happening (like a festival, market or something else) and when this activity occurs. The dates and times are important to be aware if an activity is occurring regularly or is incidental. Second, write down the details of the site, the name and address, in which phase of the EU VAT the site fits and what the expected crowd density is. It is possible that the crowd density differs on specific times, please add this if relevant. Finally, it is useful to fill in the team members and the date of assessment.&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;Write the necessary details like the main site&#039;s name, if there are specific activities happening (like a festival, market or something else) and when this activity occurs. The dates and times are important to be aware if an activity is occurring regularly or is incidental. Second, write down the details of the site, the name and address, in which phase of the EU VAT the site fits and what the expected crowd density is. It is possible that the crowd density differs on specific times, please add this if relevant. Finally, it is useful to fill in the team members and the date of assessment.&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;===&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;Step 2: Existing security measures&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;===&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;===Step 2: Existing security measures===&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;Gather together with the team of experts, the existing security measures you are aware of regarding the specific site. This can be a natural measure, for instance a wall that can create a blockage or to hide behind, or emplaced measures, for instance surveillance police teams or road blocks. Within the PRoTECT project the measures [BP(vd1] were categorized by the use of technology solutions.&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;Gather together with the team of experts, the existing security measures you are aware of regarding the specific site. This can be a natural measure, for instance a wall that can create a blockage or to hide behind, or emplaced measures, for instance surveillance police teams or road blocks. Within the PRoTECT project the measures [BP(vd1] were categorized by the use of technology solutions.&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;===&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;Step 3: Scenario per threat type&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;===&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;===Step 3: Scenario per threat type===&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;Use each other’s creativity and expertise to assess scenario’s according to ten potential &#039;&#039;&#039;&#039;&#039;terrorist threat types&#039;&#039;&#039;&#039;&#039; mentioned by the EU VAT. The ten potential threat [BP(vd2] types used are:&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;Use each other’s creativity and expertise to assess scenario’s according to ten potential &#039;&#039;&#039;&#039;&#039;terrorist threat types&#039;&#039;&#039;&#039;&#039; mentioned by the EU VAT. The ten potential threat [BP(vd2] types used are:&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 72:&lt;/td&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 72:&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;10.   Radiological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;10.   Radiological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;===&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;Step 4: Consequence and probability&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;===&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;===Step 4: Consequence and probability===&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;For each scenario, one should assess with the team of experts what the consequence and probability are for each scenario. For each site (area) of the PSOI and considering existing measures, each scenario should be followed trough to identify the lack of measures that could create a vulnerability if either or both consequence and probability are high.&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;For each scenario, one should assess with the team of experts what the consequence and probability are for each scenario. For each site (area) of the PSOI and considering existing measures, each scenario should be followed trough to identify the lack of measures that could create a vulnerability if either or both consequence and probability are high.&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;===&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;Step 5: Analysis and results&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;===&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;===Step 5: Analysis and results===&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;Finally, when all consequences and probabilities have been determined for a site, check for any inconsistencies or dependencies among the scenarios, consequences and probabilities, and make adjustments where necessary. Possibly repeat this activity once all record templates for all sites have been completed. Determine level of risk for each scenario, for instance by using a risk matrix (risk low, medium and high) and record this.&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;Finally, when all consequences and probabilities have been determined for a site, check for any inconsistencies or dependencies among the scenarios, consequences and probabilities, and make adjustments where necessary. Possibly repeat this activity once all record templates for all sites have been completed. Determine level of risk for each scenario, for instance by using a risk matrix (risk low, medium and high) and record this.&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-deletedline diff-side-deleted&quot;&gt;&lt;div&gt;==&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;What’s next&lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;==&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;==What’s next==&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-deleted&quot;&gt;&lt;div&gt;Once an overall insight into the vulnerabilities of the PSOI is available, follow-up actions can be taken. The security experts’ team can suggest mitigation options for some or all of the attack scenarios to the management body. Also, using the results from using the EU VAT, the managing body can evaluate the risks, deciding which risks to mitigate and how (in part based on the options provided by the security team) and which risks to accept. Furthermore, informing and involving the stakeholders. Finally, &#039;&#039;&#039;&#039;&#039;gathering information&#039;&#039;&#039;&#039;&#039; on [[Measures|solutions]] and getting the measures implemented to mitigate &#039;&#039;&#039;&#039;&#039;vulnerabilities&#039;&#039;&#039;&#039;&#039;.&lt;/div&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-context diff-side-added&quot;&gt;&lt;div&gt;Once an overall insight into the vulnerabilities of the PSOI is available, follow-up actions can be taken. The security experts’ team can suggest mitigation options for some or all of the attack scenarios to the management body. Also, using the results from using the EU VAT, the managing body can evaluate the risks, deciding which risks to mitigate and how (in part based on the options provided by the security team) and which risks to accept. Furthermore, informing and involving the stakeholders. Finally, &#039;&#039;&#039;&#039;&#039;gathering information&#039;&#039;&#039;&#039;&#039; on [[Measures|solutions]] and getting the measures implemented to mitigate &#039;&#039;&#039;&#039;&#039;vulnerabilities&#039;&#039;&#039;&#039;&#039;.&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
  &lt;td colspan=&quot;2&quot; class=&quot;diff-empty diff-side-deleted&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;
  &lt;td class=&quot;diff-addedline diff-side-added&quot;&gt;&lt;div&gt;&amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Puck</name></author>
		
	</entry>
	<entry>
		<id>https://securipedia.eu/index.php?title=Vulnerability_assessment_of_the_EU_PRoTECT_project&amp;diff=14264&amp;oldid=prev</id>
		<title>Puck: Created page with &quot;Within the EU PRoTECT project municipalities have performed vulnerability assessments on specific public spaces in their region that can be considered soft targets for Terro...&quot;</title>
		<link rel="alternate" type="text/html" href="https://securipedia.eu/index.php?title=Vulnerability_assessment_of_the_EU_PRoTECT_project&amp;diff=14264&amp;oldid=prev"/>
		<updated>2020-11-12T10:01:11Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Within the EU PRoTECT project municipalities have performed vulnerability assessments on specific public spaces in their region that can be considered soft targets for Terro...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Within the EU PRoTECT project municipalities have performed vulnerability assessments on specific public spaces in their region that can be considered soft targets for [[Terrorism|terrorist attacks]]. For this purpose, the EU Vulnerability Assessment Tool developed by DG Home was used and a specific manual for municipalities or other local law enforcement agencies was developed. This EU VAT is an example of how to identify and analyze vulnerabilities that can be used to focus on determining what kind of measures are needed to mitigate these vulnerabilities. There are multiple other processes and analysis tools for vulnerability assessment and for identifying risks. &lt;br /&gt;
&lt;br /&gt;
== The EU Vulnerability Assessment Tool manual ==&lt;br /&gt;
DG HOME has developed the EU Vulnerability Assessment Tool (VAT) (2019) which main objective is to provide practical support to Member States’ to enhance the protection of [[Public space|public spaces]] by facilitating the conduction of an on-site vulnerability assessment. Within the PRoTECT project, a manual for this EU VAT was developed to specifically aid municipalities and their stakeholders in identifying vulnerabilities of their [[Public space|public spaces of interest]] ([[soft targets]]) in order to strengthen their protection against terrorism.&lt;br /&gt;
&lt;br /&gt;
The EU VAT Manual describes (1) who should perform such an assessment and why, the steps that are needed (2) before using the tool, (3) what different steps are involved in the assessment and how to record te results of the assessment, and (4)what can be done with the results and what next steps can be taken. &lt;br /&gt;
&lt;br /&gt;
== Security management and assessing vulnerabilities ==&lt;br /&gt;
It is important to mention that the vulnerability assessment was organized by a managing body, in the case of the PRoTECT project the five municipalities and their related supporting PRoTECT partner. It is essential to involve relevant stakeholders for the security of the site to be assessed and that for the purposes of the PRoTECT project the managing body is responsible for identifying what public space to asses. Having a managing body is necessary because some organization needs to take the lead responsibility in developing a security plan. Generally, developing a security plan is an ongoing process – threats and other circumstances change, requiring the security plan to be continually adapted as well. In the case of protecting a PSOI against terrorist attacks, it is assumed that even though a certain activity may be unique, there are some common aspects related to the PSOI: the method of planning, managing the activity and other security related aspects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Developing and maintaining a security plan is a cyclic process, generally involving the following steps:&lt;br /&gt;
&lt;br /&gt;
1.       Security audit/inspection (policy, constraints, site and activity characteristics, threats, security measures, vulnerabilities, risks, etc.);&lt;br /&gt;
&lt;br /&gt;
2.       Decision making (budgets, priorities, schedules, risk acceptance, go/no-go by the management body, etc.);&lt;br /&gt;
&lt;br /&gt;
3.       Security plan (development/adjustment, and ratification by the management body);&lt;br /&gt;
&lt;br /&gt;
4.       Implementation and (periodic) verification of security measures (in accordance with the security plan).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The aspect of risk assessment involves three consecutive processes&amp;lt;ref&amp;gt;Systematic techniques for risk assessment are described in the IEC 31010:2009 standard.&amp;lt;/ref&amp;gt;: &lt;br /&gt;
&lt;br /&gt;
1.       Risk identification (identifying threats and threat scenarios)&lt;br /&gt;
&lt;br /&gt;
2.       Risk analysis (determining consequences, probabilities, risk levels and vulnerabilities)&lt;br /&gt;
&lt;br /&gt;
3.       Risk evaluation (determining priorities, risk treatment actions, risk acceptance)&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities of a PSOI and the possible risks of an attack can be identified by examining the PSOI (geographical layout, accessibility for vehicles, natural or emplaced security measures, etc) and devising viable attack scenarios. Scenarios should at least mention the threat type (e.g. shooter), the aim of the attack, with what means and how the terrorist carries out the attack. Conceiving scenarios can be an activity carried out by a team of experts from all the relevant stakeholders that is put together by the managing body. This means that to be able to carry out the assessment, different experts need to be present and gathered to go through all steps. In the risk analysis process, the consequences (i.e. impact, severity) and probability (i.e. likelihood, chance) of each attack scenario are determined by the team of experts, considering all factors of influence.&lt;br /&gt;
&lt;br /&gt;
== Before using the tool: getting started ==&lt;br /&gt;
Before using the EU VAT, it is important to determine a managing body. The managing body is an individual, organization or group of organizations that takes up the responsibility to identify and work on counter terrorism regarding PSOIs. This can be a law enforcement agency, a municipality or possibly also the owner of the public space. The management will most likely involve various stakeholders in decisions concerning site security, such as local government, emergency services, retailers, etc. In the case of the PRoTECT project, the managing bodies are the municipalities involved that will identify their vulnerabilities against various terrorist attacks and identify their soft targets. This managing body needs to take the following actions:&lt;br /&gt;
&lt;br /&gt;
1.       Create clear understanding of the organization of the PSOI (who is involved (stakeholders) and their roles and responsibilities, geographical boundaries of the site, the plans for the events and risk evaluation criteria) and gather all relevant information.&lt;br /&gt;
&lt;br /&gt;
2.       Create a team of experts that will perform the vulnerability assessment together (include stakeholders that have detailed knowledge of the PSOI, security policies and expertise on counter-terrorism).&lt;br /&gt;
&lt;br /&gt;
3.       Create and decide on a work method with the team of experts, on how to perform the vulnerability assessment. In the case of PRoTECT this was done by workshop sessions with all relevant stakeholders.&lt;br /&gt;
&lt;br /&gt;
== Assessing the Public Space of Interest: 5 steps ==&lt;br /&gt;
It is recommended to kick-off by displaying a topographical map to the team, detailing the boundaries of the main site and surrounding sites, and describing the general function of each surrounding site in relation to the activity on the main site. When possible, organize a visit to the PSOI.&lt;br /&gt;
&lt;br /&gt;
=== Step 1: Characteristics of the site ===&lt;br /&gt;
Write the necessary details like the main site&amp;#039;s name, if there are specific activities happening (like a festival, market or something else) and when this activity occurs. The dates and times are important to be aware if an activity is occurring regularly or is incidental. Second, write down the details of the site, the name and address, in which phase of the EU VAT the site fits and what the expected crowd density is. It is possible that the crowd density differs on specific times, please add this if relevant. Finally, it is useful to fill in the team members and the date of assessment.&lt;br /&gt;
&lt;br /&gt;
=== Step 2: Existing security measures ===&lt;br /&gt;
Gather together with the team of experts, the existing security measures you are aware of regarding the specific site. This can be a natural measure, for instance a wall that can create a blockage or to hide behind, or emplaced measures, for instance surveillance police teams or road blocks. Within the PRoTECT project the measures [BP(vd1] were categorized by the use of technology solutions.&lt;br /&gt;
&lt;br /&gt;
=== Step 3: Scenario per threat type ===&lt;br /&gt;
Use each other’s creativity and expertise to assess scenario’s according to ten potential &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;terrorist threat types&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; mentioned by the EU VAT. The ten potential threat [BP(vd2] types used are:&lt;br /&gt;
&lt;br /&gt;
1.       Fire arms attack - small calibre pistol or semi/full-automatic rifle;&lt;br /&gt;
&lt;br /&gt;
2.       Sharp object attack - knifes, machete, other sharp and blunt objects;&lt;br /&gt;
&lt;br /&gt;
3.       Vehicle attack - use of vehicle as a weapon by ramming large crowds;&lt;br /&gt;
&lt;br /&gt;
4.       IED (explosives) - left/concealed in objects or goods (based on home-made or commercial explosives);&lt;br /&gt;
&lt;br /&gt;
5.       PBIED (explosives) - explosives concealed on a person (suicide or carrier);&lt;br /&gt;
&lt;br /&gt;
6.       UAVIED (explosives) - explosives delivered by a remote-controlled airborne device;&lt;br /&gt;
&lt;br /&gt;
7.       VBIED (explosives) - explosives concealed inside a vehicle (or its cargo);&lt;br /&gt;
&lt;br /&gt;
8.       Chemical attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);&lt;br /&gt;
&lt;br /&gt;
9.       Biological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);&lt;br /&gt;
&lt;br /&gt;
10.   Radiological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).&lt;br /&gt;
&lt;br /&gt;
=== Step 4: Consequence and probability ===&lt;br /&gt;
For each scenario, one should assess with the team of experts what the consequence and probability are for each scenario. For each site (area) of the PSOI and considering existing measures, each scenario should be followed trough to identify the lack of measures that could create a vulnerability if either or both consequence and probability are high.&lt;br /&gt;
&lt;br /&gt;
=== Step 5: Analysis and results ===&lt;br /&gt;
Finally, when all consequences and probabilities have been determined for a site, check for any inconsistencies or dependencies among the scenarios, consequences and probabilities, and make adjustments where necessary. Possibly repeat this activity once all record templates for all sites have been completed. Determine level of risk for each scenario, for instance by using a risk matrix (risk low, medium and high) and record this.&lt;br /&gt;
&lt;br /&gt;
== What’s next ==&lt;br /&gt;
Once an overall insight into the vulnerabilities of the PSOI is available, follow-up actions can be taken. The security experts’ team can suggest mitigation options for some or all of the attack scenarios to the management body. Also, using the results from using the EU VAT, the managing body can evaluate the risks, deciding which risks to mitigate and how (in part based on the options provided by the security team) and which risks to accept. Furthermore, informing and involving the stakeholders. Finally, &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;gathering information&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; on [[Measures|solutions]] and getting the measures implemented to mitigate &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;vulnerabilities&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;.&lt;/div&gt;</summary>
		<author><name>Puck</name></author>
		
	</entry>
</feed>