Successful risk management programs begin with a properly conducted threat assessment, which involves the detection and correct evaluation of indicators prior to the incident. Often, these indicators are found in open source material, available to the average person. Interpretation and evaluation of threats take time and practice.
By Saturday, June 25, 2016, in a minimum of 300 words, post to the Discussion Area your response to the following:
- Using current open source documents for the area of your choice, identify potential threats and what led you to believe these threats exist. Use methodologies presented in this module.