Chapter 10

Authentication, Authorization, and Affiliation

10.1 Introduction

In Part I, a security risk management framework for assessing counterterrorism risk was introduced. Recurring physical security models were also identified, which in some cases can facilitate estimates of the vulnerability component of risk. How uncertainty can be leveraged to estimate security risk was also discussed.

The chapters in Part II focused on analyzing specific terrorism threats. In Part III the science and technology of fundamental physical security controls are explained. These controls are basic to counterterrorism as well as general security risk issues. Electronic counterterrorism controls were included as part of the threat analyses in Chapters 8 and 9.

Get The Science and Technology of Counterterrorism now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.