Risk management procedure is an important phase in introducing the anti-terrorist procedures aimed to secure certain residents in a specific area. Through this particular procedure, it is necessary that people are notified as to how much risk they are supposed to face in the process. Knowing the precautions that the target people are supposed to take should then help in the education that is given to people as to how they are supposed to face the different impending causes and later results of terrorism in the community (IC 2007 Internet). Once the people are already knowledgeable of what they are facing and what they are particularly at, they are then ready to face the challenges of the situation at a more prepared and confident phase. Knowingly, they are able to protect themselves from the results of impending terrorism.
Vulnerability Assessment is also a vital part of the process which at the same time involves at least four other steps needed for consideration. The said steps are as follows:
1. Cataloging assets and capabilities (resources) in a system
2. Assigning quantifiable value and importance to the resources
3. Identifying the vulnerabilities or potential threats to each resource
4. Mitigating or eliminating the most serious vulnerabilities for the most valuable resources
From the outlined process of vulnerability assessment, it is noticeable that the focus of the approach in assessing the vulnerability of the community is based upon the environment and the possible threats that are observed from (Stockton 2007 internet), acting towards the said threats could help in the process of making it easier for the society to see their capabilities in protecting themselves well from the threats of terrorism raised against them.