The first step is to determine what needs to be protected. This includes physical assets, such as vehicles, buildings, equipment and inventory, and human assets, such as employees or VIPs.
2.
Risk assessment
Assessment of potential risks that may affect the safety and operation of identified assets. This process includes an analysis of the sources of risk and their possible effects, taking into account both internal and external factors.
3.
Vulnerability assessment
Identification of vulnerabilities in the resource protection system, and their elimination. This process involves assessing the vulnerability of individual resource elements to identified threats.
4.
Risk analysis
Calculate the level of risk by combining the probability of the threat occurring with the potential impact it would have on the asset. This helps prioritise security measures.