Once the risk assessment is done, it is then time to act on the information. Based on the Read items thus far, discuss principles of protective security as it relates to risk. How do prevention, information collection, information sharing, risk mitigation, and cost-benefit analysis figure into the process? Consider terrorism but also all hazards.