The thread must be a minimum of 200-400 words. MINIMUM OF TWO SOURCES BESIDES THE TEXTBOOK. Must cite at least 2 sources in addition to the Bible.

TEXTBOOK: Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN: 9781119237785.


Prevention: Bennett (2018) highlights how imperative the principles of protective security are regarding terrorist attacks by stating, “The easiest battle to win is the one that is never fought” (Bennett, p. 259, 2018). Prevention is truly the greatest achievement possible, even a well-organized response to any terrorist act will inevitability result in damage of some sort, whether loss of life or property (Bennett, 2018). Therefore, researching the prominent components of prevention, like information collection, sharing, risk mitigation, and cost-benefit analysis, becomes essential to stopping an attack before it starts (Bennett, 2018). Prevention prompts awareness, and eventually leads to change, states Bennett, (2018), arguing in favor of prevention analysis and predicated mitigation efforts.

Information Collection: Teichmann (2019) enrages the debate surrounding funding sources of terrorism, especially transnational organized crime, contending that collecting information regarding bank transfers, account names, and cryptocurrency enables strong counter-terrorism efforts. This methodology fits directly into the information-collecting section of attack prevention, Teichmann (2019) asserts that gathering intel about where terrorists get money and support can lead to better target identification. Continuing in this progression of information collection, Bennett (2018), argues that the community, particularly good-natured citizens, are valuable because they report on nefarious activity. It appears obvious that this informational collection mentality by Teichmann (2019) aligns with the principles of protective security by encouraging extensive and invasive research into the enemy.

Information Sharing: The independent nature of the majority of law enforcement entities within America, as Gruenewald et al. (2018) state, is shockingly unsophisticated, making sharing intelligence, information, and records cumbersome. Gruenewald et al. (2018) examined the lack of a universal information-sharing platform or systems between local, state, and federal law enforcement agencies, weakening national efforts to prevent attacks. Federal governmental entities like the FBI, CIA, or DEA rarely share intel or communicate extensively with local or state police, according to Gruenewald et al. (2018), handicapping everyday patrol officers from being more effective. However, Bennett (2018) articulates how the federal department of homeland security is making progress with recently launched information-sharing campaigns, like the joint terrorism task force, potentially uniting the complicated layers of law enforcement in America. 

Risk Mitigation: Taking affirmative steps to mitigate the now identified risks rounds out the process of preventing terrorist attacks (Bennett, 2018). Applying the collected and shared information to make strategic risk-mitigating decisions is certainly at the backbone of this section, debates Luxton & Marinov (2020). Luxton & Marinov (2020) researched identified risk mitigation factors for railways across the world, bringing to light several inadequacies and systematic failures. The study determined that preplanned routes and rail cars enable terrorists to better preplan an attack, therefore, Luxton & Marinov (2020) encouraged constant reorganization of both. This methodology prevented would be attackers from thoroughly establishing which rail cars, conductors, or security personnel would be passing each station daily, utilizing a computer program to randomize route management (Luxton & Marinov, 2020). Risk mitigation is key to the overall process of cumulating some of the actual decisions to implement risk assessment-based changes (Bennett, 2018).            

Cost-Benefit Analysis: Often within the elaborate world of critical infrastructure management and risk assessment, prevention-based recommendations, unfortunately, fail to become implemented, as funds are scarce (Bennett, 2018). Blokus & Dziula (2021) explain how the laboriousness of governmental-run facilities can slow improvements, escalate costs, and lengthen timelines, ultimately hindering the transgression of critical infrastructure improvements from recommendation to reality. However, a careful cost-benefit analysis can gardener respect and encourage action, Blokus & Dziula (2021) contend that the value of the facility and its contents should be weighed against the anticipated cost. For example, a one-million-dollar investment into an 80-year-old power substation would clearly take a backseat toward telecommunication or cybersecurity improvements within a nuclear substation (Bennett, 2018). Although this example personifies simplicity, many delicate financial balancing acts must occur in order to properly scale value against investment (Bennett, 2018).

Christian Viewpoint: when discussing the prospect of investment into critical infrastructures many competing interesting could be considered, however, the Bible, in its all-knowing nature, always proves a path forward for people, “A just balance and scales are the Lord’s; all the weights in the bag are his work” (English Standard Version, 2001/2016 Leviticus 19:36).         


Bennett, B. (2018). Understanding, Assessing and Responding to Terrorism. John Wiley & Sons, 

Inc. Hoboken, NJ. 

Blokus, A., & Dziula, P. (2021). Relations of Imperfect Repairs to Critical Infrastructure

Maintenance Costs. Sustainability. 13(9).

https://www.mdpi.com/2071-1050/13/9/4917# Links to an external site.


English Standard Version. (2016). Bible hub. Retrieved from

https://biblehub.com Links to an external site.


work published 2001).

Gruenewald, J., Klein, B., Drawve, G., Smith, B., & Ratcliff, K. (2019). Suspicious

Preoperational Activities and Law Enforcement Interdiction of Terrorist Plots. Policing: An International Journal. 42(1).

https://doi.org/10.1108/PIJPSM-08-2018-0125Links to an external site.

Luxton, A., & Marinov, M. (2020). Terrorist Threat Mitigation Strategies for the Railyards.

Sustainability. 12(8).

https://doi.org/10.3390/su12083408Links to an external site.

Teichmann, F. (2019). Recent Trends in Money Laundering and Terrorism Financing. Journal of 

Financial Regulation and Compliance. 27(1).

https://doi.org/10.1108/JFRC-03-2018-0042 Links to an external site.


Calculate the price of your order

Select your paper details and see how much our professional writing services will cost.

We`ll send you the first draft for approval by at
Price: $36
  • Freebies
  • Format
  • Formatting (MLA, APA, Chicago, custom, etc.)
  • Title page & bibliography
  • 24/7 customer support
  • Amendments to your paper when they are needed
  • Chat with your writer
  • 275 word/double-spaced page
  • 12 point Arial/Times New Roman
  • Double, single, and custom spacing
  • We care about originality

    Our custom human-written papers from top essay writers are always free from plagiarism.

  • We protect your privacy

    Your data and payment info stay secured every time you get our help from an essay writer.

  • You control your money

    Your money is safe with us. If your plans change, you can get it sent back to your card.

How it works

  1. 1
    You give us the details
    Complete a brief order form to tell us what kind of paper you need.
  2. 2
    We find you a top writer
    One of the best experts in your discipline starts working on your essay.
  3. 3
    You get the paper done
    Enjoy writing that meets your demands and high academic standards!

Samples from our advanced writers

Check out some essay pieces from our best essay writers before your place an order. They will help you better understand what our service can do for you.

  • Analysis (any type)
    Advantages and Disadvantages of Lowering the Voting Age to Thirteen
    Undergrad. (yrs 1-2)
    Political science
  • Coursework
    Undergrad. (yrs 1-2)
    Business Studies
  • Essay (any type)
    Is Pardoning Criminals Acceptable?
    Undergrad. (yrs 1-2)
    Criminal Justice

Get your own paper from top experts

Order now

Perks of our essay writing service

We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.

  • Swift delivery
    Our writing service can deliver your short and urgent papers in just 4 hours!
  • Professional touch
    We find you a pro writer who knows all the ins and outs of your subject.
  • Easy order placing/tracking
    Create a new order and check on its progress at any time in your dashboard.
  • Help with any kind of paper
    Need a PhD thesis, research project, or a two-page essay? For you, we can do it all.
  • Experts in 80+ subjects
    Our pro writers can help you with anything, from nursing to business studies.
  • Calculations and code
    We also do math, write code, and solve problems in 30+ STEM disciplines.

Frequently asked questions

Get instant answers to the questions that students ask most often.

See full FAQ
  • Is there a possibility of plagiarism in my completed order?

    We complete each paper from scratch, and in order to make you feel safe regarding its authenticity, we check our content for plagiarism before its delivery. To do that, we use our in-house software, which can find not only copy-pasted fragments, but even paraphrased pieces of text. Unlike popular plagiarism-detection systems, which are used by most universities (e.g. Turnitin.com), we do not report to any public databases—therefore, such checking is safe.

    We provide a plagiarism-free guarantee that ensures your paper is always checked for its uniqueness. Please note that it is possible for a writing company to guarantee an absence of plagiarism against open Internet sources and a number of certain databases, but there is no technology (except for turnitin.com itself) that could guarantee no plagiarism against all sources that are indexed by turnitin. If you want to be 100% sure of your paper’s originality, we suggest you check it using the WriteCheck service from turnitin.com and send us the report.

  • I received some comments from my teacher. Can you help me with them?

    Yes. You can have a free revision during 7 days after you’ve approved the paper. To apply for a free revision, please press the revision request button on your personal order page. You can also apply for another writer to make a revision of your paper, but in such a case, we can ask you for an additional 12 hours, as we might need some time to find another writer to work on your order.

    After the 7-day period, free revisions become unavailable, and we will be able to propose only the paid option of a minor or major revision of your paper. These options are mentioned on your personal order page.

  • How will I receive a completed paper?

    You will get the first version of your paper in a non-editable PDF format within the deadline. You are welcome to check it and inform us if any changes are needed. If everything is okay, and no amendments are necessary, you can approve the order and download the .doc file. If there are any issues you want to change, you can apply for a free revision and the writer will amend the paper according to your instructions. If there happen to be any problems with downloading your paper, please contact our support team.
  • Where do I upload files?

    When you submit your first order, you get a personal account where you can track all your orders, their statuses, your payments, and discounts. Among other options, you will have a possibility to communicate with your writer via a special messenger. You will be able to upload all information and additional materials on your paper using the “Files” tab on your personal page. Please consider uploading everything you find necessary for our writer to perform at the highest standard.
See full FAQ

Take your studies to the next level with our experienced specialists

Live Chat+1 (857) 777-1210 EmailWhatsApp