Limited-time offer! Save up to 50% Off | Solutions starting at $6 each  

Paper on Risk Assessment Methodologies

Added on - 28 May 2020

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 6 pages
Running head:PHYSICAL SECURITY1Physical SecurityAuthor Name(s)Institutional Affiliation(s)Author Note
PHYSICAL SECURITY2AbstractEfficient risk evaluation methodologies can be the cornerstone of improvement in the protectionof all programmes and institutions. The vast methods of risk assessment employed in differentcritical infrastructures do back this reasoning. Application of risk assessment procedures isindispensable for identifying threats, assessing vulnerabilities and evaluating security systemswhile accounting for the probability of occurrence of any threat. There are many meaningfulmethodologies for risk assessment which can be used to assess risk at a maximum-securityfacility. However, this paper will focus main critical approaches. The core elements of riskassessment methods that this paper will be examining are the use of what-if analysis, use of achecklist, use of hazard and operability study (HAZOP), use a failure mode and effect analysis(FMEA), use a fault tree analysis (FTA).Keywords: Maximum Security, Vulnerability, Methodologies
PHYSICAL SECURITY3Physical SecurityIn physical security, maximum security is the highest level, or the level five security. Thislevel Such a system is intended to identify, evaluate, deter, and counter any unauthorized bothinternal and external activities. According to (Fennelly, 2013), such a system has measurescharacterized by sophisticated, state-of-the-art alarms systems that are too powerful a lone manto defeat. They are remotely monitored either in one or different protected locations. They havetamper-indication and a source of power back up. Besides, these systems are under 24-hourscreening by some on-site response armed individuals armed who are ready to neutralize anythreat. This paper is dedicated to studying risk assessments in such systems using the riskassessment methodologies.What If AnalysisThe assessment involves brainstorming with what-if scenarios to identify any possiblehazardous activities, their causes, outcome, and prevailing barriers, and then going forward tosuggest alternatives that can be implemented for the reduction of that risk (Rausand, 2013). Forinstance, what if response teams are compromised or what team all the teams are attacked withhazardous gases. From such questions, management can think of air support, gas masks, e.t.c.ChecklistThe checklist is a useful method for determining risks based on the experience obtainedfrom past risks or risks that have happened elsewhere in similar facilities (Talabis & Martin,2013). For instance, in maximum security, the management can have a checklist for checkingwhether all the physical controls are in place to ensure that everything is functioning correctly.For example, are all cameras and locks functioning? Are all network scans in place? Rescueteams e.t.c?
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document