O'Reilly logo

The Science and Technology of Counterterrorism by Carl Young

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10

Authentication, Authorization, and Affiliation

10.1 Introduction

In Part I, a security risk management framework for assessing counterterrorism risk was introduced. Recurring physical security models were also identified, which in some cases can facilitate estimates of the vulnerability component of risk. How uncertainty can be leveraged to estimate security risk was also discussed.

The chapters in Part II focused on analyzing specific terrorism threats. In Part III the science and technology of fundamental physical security controls are explained. These controls are basic to counterterrorism as well as general security risk issues. Electronic counterterrorism controls were included as part of the threat analyses in Chapters 8 and 9.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required