Threat analysis - Digital Security Indicators
From Gender and Tech Resources
Revision as of 07:47, 29 July 2015 by Eva (Talk | contribs) (Created page with "{{Tutorial |Title of the tutorial=Security Indicators: sharing and analysis |Kind of learning session=Holistic |Tutorial category=Discussion |Duration (hours)=75m |Learning ob...")
Title of the tutorial | Security Indicators: sharing and analysis |
---|---|
Attributions | |
Kind of learning session | Holistic |
Tutorial category | Discussion |
Duration (hours) | 75m "m" can not be assigned to a declared number type with value 75.
|
Learning objectives | To define and explore security indicators in their current situation. To know best practices around sharing and analysis of security indicators. |
Prerequisites | Ideally, output from Situational Analysis exercise |
Methodology | The given value was not understood.
|
Number of facilitators involved | 1 |
Technical needs | Flipchart |
Theoretical and on line resources | Holistic Security Guide
Front Line Defenders Workbook on Security https://www.frontlinedefenders.org/files/workbook_eng.pdf Protection International Manual http://protectioninternational.org/publication/new-protection-manual-for-human-rights-defenders-3rd-edition/ |