Charles Explorer logo
🇬🇧

Recommendations for the Process of Definition of Security Threats, Risks, and Vulnerabilities for Potential Update of the Czech Security Strategy

Publication

Abstract

The document offers systematic view of a process of identification of security threats and, subsequently, their use in the making of strategic documents, notably the Security Strategy of the Czech Republic. It is not the aim of the authors to name or define such threats, but to present the process itself.

It is the paramount to any credible security strategy that it deals with the threat identification in the most precise fashion. The authors take reservations against the "catalogue" approach and claim the processes of prioritization and categorization to be essential for any policies derived from the security strategy, especially in times of economic need.