Difference between revisions of "Measures"
m |
m |
||
Line 49: | Line 49: | ||
[brugtekst] |
[brugtekst] |
||
− | ==== |
+ | ===='''Technology category'''==== |
The five technology categories are: |
The five technology categories are: |
||
− | #''ICT'' that could be used for communicating, storing, analysing and protecting information. Examples are: WiFi, IoT, Encryption, VPN, et cetera; |
+ | #''[[Measure type: Information and Communications Technology (ICT)|ICT]]'' that could be used for communicating, storing, analysing and protecting information. Examples are: WiFi, IoT, Encryption, VPN, et cetera; |
− | #''Sensors'' that could be used for detection, identification, localisation or tracking. Examples are: cameras, facial recognition, acoustic sniper localisation, et cetera; |
+ | #''[[Measure type: Sensors|Sensors]]'' that could be used for detection, identification, localisation or tracking. Examples are: cameras, facial recognition, acoustic sniper localisation, et cetera; |
− | #''Actuators'' that could be used for warning, intercepting or eliminating. Examples are: sirens, anti-drone drones, HPM vehicle stopping, et cetera; |
+ | #''[[Measure type: Actuators|Actuators]]'' that could be used for warning, intercepting or eliminating. Examples are: sirens, anti-drone drones, HPM vehicle stopping, et cetera; |
− | #''Physical measures'' that could be used for controlling access, impeding an attack or protective materials. Examples are: tourniquets, portable rising steps, bomb blast window film, et cetera; |
+ | #''[[Measure type: Physical measures|Physical measures]]'' that could be used for controlling access, impeding an attack or protective materials. Examples are: tourniquets, portable rising steps, bomb blast window film, et cetera; |
− | #''Methods'' that could be used for procedures, best practices or standards to implement solutions. An example is the ISO 31000 Risk Management. |
+ | #''[[Measure type: Methods|Methods]]'' that could be used for procedures, best practices or standards to implement solutions. An example is the ISO 31000 Risk Management. |
''Tech use hier of in elk van de technology category pagina's met ook de andere technology aspects uitgelegd (threat type, threat phase, tech criteria)?'' |
''Tech use hier of in elk van de technology category pagina's met ook de andere technology aspects uitgelegd (threat type, threat phase, tech criteria)?'' |
||
− | ==== |
+ | ===='''Technology use'''==== |
Each technology is (part of) a security measure, providing some basic security function as a response to a (potential) threat. As used in the EU VAT, there are ten different technology uses that range from before, during and after an attack. The technology uses are: |
Each technology is (part of) a security measure, providing some basic security function as a response to a (potential) threat. As used in the EU VAT, there are ten different technology uses that range from before, during and after an attack. The technology uses are: |
||
Revision as of 15:21, 15 September 2020
Measures are provisions made or actions taken to protect an object or subject from risk.
Contents
Measure types applied in the process of a criminal act
Measures can be classified by their point of application in the process of a criminal act. From the perspective of a criminal, all measures reduce the perceived attractiveness of a target. Identified points of application are:
- Increasing perceived effort
- Increasing perceived risk
- Decreasing anticipated reward
- Controlling contributing circumstances
- Other
All measure types can be classified in one of these categories. The table below displays for each of the measure types in Securipedia, which point of application it works on.
By clicking the "?" a brief description of the measure is provided.
Increasing perceived effort | Increasing perceived risk | Decreasing anticipated reward | Contributing circumstances | Other |
---|---|---|---|---|
Target hardening | Surveillance | Target removal | Controlling disinhibitors | Deflection |
Access control | Intervention force | Removal of crime motivator | Facilitating compliance | Creating awareness / stimulating conscience |
Directing traffic flows | Screening | Rule setting | ||
Removing means | Increase punishment | Ownership | ||
Maintenance |
Measure types by technology category
Link naar vulnerabilities en preferred solutions (die combinatie op de pagina van vulnerabilities houden?)
[introtekst met context: measures voor/tegen wat?]
Needs for technological solutions
Multiple needs have been identified where technological solutions might be of support towards mitigating vulnerabilities. These needs are as follows:
- Enhancing the surveillance of an area to for instance count crowds, monitor allocation of citizens or identify occurrences of objects or behaviors. By enhancing this surveillance, a municipality and the other local actors can identify anomalies or assess the impact at certain moments in time before an attack or respond faster to incidents and aid citizens.
- Enhancing the cooperation between different actors (between own forces as well as completely different actors). In the cases of terrorist attacks, actors do not stand alone and need to cooperate in order to prevent, responds and recover from terrorist attacks. By enhancing the cooperation in could create more effective deployment of forces, better communication between them and faster (real time) sharing of information like images or videos to get ahead of the threat.
- Enhancing alerting and evacuating of citizens during an attack by putting in place early warning systems and effective evacuation pathways. Potential innovative technology solutions could enhance the warning systems and evacuation pathways for specific public spaces.
- Enhancing the existing knowledge and train forces specifically for protecting public spaces against terrorism, as anti-terrorism expertise is often missing at local government. There is a need of knowing were and how this knowledge can be obtained as well as how to train personal in the future.
[brugtekst]
Technology category
The five technology categories are:
- ICT that could be used for communicating, storing, analysing and protecting information. Examples are: WiFi, IoT, Encryption, VPN, et cetera;
- Sensors that could be used for detection, identification, localisation or tracking. Examples are: cameras, facial recognition, acoustic sniper localisation, et cetera;
- Actuators that could be used for warning, intercepting or eliminating. Examples are: sirens, anti-drone drones, HPM vehicle stopping, et cetera;
- Physical measures that could be used for controlling access, impeding an attack or protective materials. Examples are: tourniquets, portable rising steps, bomb blast window film, et cetera;
- Methods that could be used for procedures, best practices or standards to implement solutions. An example is the ISO 31000 Risk Management.
Tech use hier of in elk van de technology category pagina's met ook de andere technology aspects uitgelegd (threat type, threat phase, tech criteria)?
Technology use
Each technology is (part of) a security measure, providing some basic security function as a response to a (potential) threat. As used in the EU VAT, there are ten different technology uses that range from before, during and after an attack. The technology uses are:
- Alert - used for alerting public (e.g. sirens, texting service);
- Surveil - used for situational awareness (e.g. cameras, social media tools);
- Respond - used for responding to an attack (e.g. security personnel, non-lethal weapons);
- Protect - used to protect assets (people, buildings, infrastructure);
- Detect - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
- Overcome - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
- Improvise - created on the spot from available means (e.g. use police vehicle as a road block);
- Restrict - used for restricting public access (e.g. safety barriers);
- Adapt - used for changing circumstances (e.g. moving assets to a safer location);
- Other.