Difference between revisions of "EU ISFP PRoTECT project"

From Securipedia
Jump to navigation Jump to search
(Created page with "=== PRoTECT === Protection of public spaces, that are soft targets, from terrorism. Explain what is PRoTECT ==== Terrorism ==== How do we look at terrorism, what is the thre...")
 
Line 1: Line 1:
=== PRoTECT ===
+
===PRoTECT===
 
Protection of public spaces, that are soft targets, from terrorism.
 
Protection of public spaces, that are soft targets, from terrorism.
   
 
Explain what is PRoTECT
 
Explain what is PRoTECT
   
==== Terrorism ====
+
====Terrorism====
 
How do we look at terrorism, what is the threat. --> link to page on terrorism, types and actors
 
How do we look at terrorism, what is the threat. --> link to page on terrorism, types and actors
   
==== Soft targets ====
+
====Soft targets====
 
When is something a soft target --> short introduction, create new page on soft targets and link to urban objects that are soft targets
 
When is something a soft target --> short introduction, create new page on soft targets and link to urban objects that are soft targets
   
==== Public spaces ====
+
====Public spaces====
 
Explain what public spaces are (PSOI), link to urban objects
 
Explain what public spaces are (PSOI), link to urban objects
   
==== Users ====
+
====Users====
 
Local law enforcement, specifically municiplalities. Stakeholders involved are... --> use information from EFUS in D2.1
 
Local law enforcement, specifically municiplalities. Stakeholders involved are... --> use information from EFUS in D2.1
  +
<br />
 
<br />
 
<br />
   
=== Acquired knowledge ===
+
===Acquired knowledge===
 
Steps that can help protect public spaces, starting with vulnerabiltiy identification and looking for solutions.
 
Steps that can help protect public spaces, starting with vulnerabiltiy identification and looking for solutions.
   
==== Step 1. Vulnerability identification ====
+
====Step 1. Vulnerability identification====
 
Information on VAT, why it is important to identify vulnerabilities, what you can do with it, that there are multiple methods (for instance VAT from PRoTECT), use scenario's.
 
Information on VAT, why it is important to identify vulnerabilities, what you can do with it, that there are multiple methods (for instance VAT from PRoTECT), use scenario's.
   
Line 28: Line 29:
 
<br />
 
<br />
   
==== Step 2. Define objectives and requirements ====
+
====Step 2. Define objectives and requirements====
 
With knowledge of vulnerabilities, it is important to choose what to focus on. Define objectives and requirements for the chosen vulnerabilities and needs.
 
With knowledge of vulnerabilities, it is important to choose what to focus on. Define objectives and requirements for the chosen vulnerabilities and needs.
 
<br />
 
<br />
   
==== Step 3. Gather solutions ====
+
====Step 3. Gather solutions====
 
can be done by research (SOTA), insight in developments of technologies or by asking the market (RFI), use scenario's.
 
can be done by research (SOTA), insight in developments of technologies or by asking the market (RFI), use scenario's.
   
Line 40: Line 41:
 
<br />
 
<br />
   
==== Step 4. Evaluation of solutions ====
+
====Step 4. Evaluation of solutions====
 
How to evaulate solutions (MCA, before and after gathering solutions, set up evaluation criteria, particaluralry for a vulnerability and public space). Also other ways of evaluating.
 
How to evaulate solutions (MCA, before and after gathering solutions, set up evaluation criteria, particaluralry for a vulnerability and public space). Also other ways of evaluating.
   
Line 46: Line 47:
 
<br />
 
<br />
   
==== Step 5. Implimentation ====
+
====Step 5. Implimentation====
 
This step was not done by PRoTECT, but in general one could choose potential useful solutions and implement it. Next steps.
 
This step was not done by PRoTECT, but in general one could choose potential useful solutions and implement it. Next steps.
  +
<br />
 
<br />
 
<br />
   
=== Useful documents ===
+
===Useful documents===
 
VAT manual
 
VAT manual
   

Revision as of 13:11, 15 September 2020

PRoTECT

Protection of public spaces, that are soft targets, from terrorism.

Explain what is PRoTECT

Terrorism

How do we look at terrorism, what is the threat. --> link to page on terrorism, types and actors

Soft targets

When is something a soft target --> short introduction, create new page on soft targets and link to urban objects that are soft targets

Public spaces

Explain what public spaces are (PSOI), link to urban objects

Users

Local law enforcement, specifically municiplalities. Stakeholders involved are... --> use information from EFUS in D2.1

Acquired knowledge

Steps that can help protect public spaces, starting with vulnerabiltiy identification and looking for solutions.

Step 1. Vulnerability identification

Information on VAT, why it is important to identify vulnerabilities, what you can do with it, that there are multiple methods (for instance VAT from PRoTECT), use scenario's.

Take into account the current measures.

--> link to the following (new) pages: "Vulnerability assessments", "vulnerabilities", "Evaluation methods"

Step 2. Define objectives and requirements

With knowledge of vulnerabilities, it is important to choose what to focus on. Define objectives and requirements for the chosen vulnerabilities and needs.

Step 3. Gather solutions

can be done by research (SOTA), insight in developments of technologies or by asking the market (RFI), use scenario's.

What is an RFI, how did PRoTECT do it, what can you learn.

--> link to the following (new) pages: "Request for Information", "Technology solutions", "Measures", "Terrorism (types and actors)"

Step 4. Evaluation of solutions

How to evaulate solutions (MCA, before and after gathering solutions, set up evaluation criteria, particaluralry for a vulnerability and public space). Also other ways of evaluating.

--> Link to the follwoing (new) pages: "Evaluation methods", "Request for Information", "Vulnerability Assessment"

Step 5. Implimentation

This step was not done by PRoTECT, but in general one could choose potential useful solutions and implement it. Next steps.

Useful documents

VAT manual

Technology evaluation framework

...