Security Threat Assessment
Threat Analysis – The basis of counter measures
At the start of every project the Consortium carries out a security threat assessment that looks at the threats from crime, burglary, vandalism, terrorism, fire bombs, kidnap and theft or loss of information. We look at the nature of each of these threats and the likelihood and consequence to the business if they actually occur.
Only once this process has been carried out can the security strategy policy and a plan to neutralise and counter these individual threats as they affect each business be carried out. This is completely different in different parts of the world, different sectors of information and in different security situations.
The security threat assessment is written firstly as a narrative report discussing each of the threats and how they may be neutralised and what the options are for achieving an effective security solution.
Each of the threats is also analysed individually and a numerical figure for their likelihood and their consequence if they occur is produced and tabulated as part of the threat assessment. This produces a clearly prioritised and numbered list of threats in severity order which can then be used to prepare the security strategy.
Risk assessment methodologies
We use a variety of risk assessment methodologies from the very simple probability and consequence analysis to detailed country risk reports for major high security sites such as defence installations.