Ask a question from expert

Ask now

Paper on Risk Assessment Methodologies

6 Pages995 Words206 Views
   

Added on  2020-05-28

Paper on Risk Assessment Methodologies

   Added on 2020-05-28

BookmarkShareRelated Documents
Running head: PHYSICAL SECURITY1Physical SecurityAuthor Name(s)Institutional Affiliation(s)Author Note
Paper on Risk Assessment Methodologies_1
PHYSICAL SECURITY2AbstractEfficient risk evaluation methodologies can be the cornerstone of improvement in the protection of all programmes and institutions. The vast methods of risk assessment employed in different critical infrastructures do back this reasoning. Application of risk assessment procedures is indispensable for identifying threats, assessing vulnerabilities and evaluating security systems while accounting for the probability of occurrence of any threat. There are many meaningful methodologies for risk assessment which can be used to assess risk at a maximum-security facility. However, this paper will focus main critical approaches. The core elements of risk assessment methods that this paper will be examining are the use of what-if analysis, use of a checklist, use of hazard and operability study (HAZOP), use a failure mode and effect analysis (FMEA), use a fault tree analysis (FTA).Keywords: Maximum Security, Vulnerability, Methodologies
Paper on Risk Assessment Methodologies_2
PHYSICAL SECURITY3Physical SecurityIn physical security, maximum security is the highest level, or the level five security. Thislevel Such a system is intended to identify, evaluate, deter, and counter any unauthorized both internal and external activities. According to (Fennelly, 2013), such a system has measures characterized by sophisticated, state-of-the-art alarms systems that are too powerful a lone man to defeat. They are remotely monitored either in one or different protected locations. They have tamper-indication and a source of power back up. Besides, these systems are under 24-hour screening by some on-site response armed individuals armed who are ready to neutralize any threat. This paper is dedicated to studying risk assessments in such systems using the risk assessment methodologies. What If AnalysisThe assessment involves brainstorming with what-if scenarios to identify any possible hazardous activities, their causes, outcome, and prevailing barriers, and then going forward to suggest alternatives that can be implemented for the reduction of that risk (Rausand, 2013). For instance, what if response teams are compromised or what team all the teams are attacked with hazardous gases. From such questions, management can think of air support, gas masks, e.t.c.ChecklistThe checklist is a useful method for determining risks based on the experience obtained from past risks or risks that have happened elsewhere in similar facilities (Talabis & Martin, 2013). For instance, in maximum security, the management can have a checklist for checking whether all the physical controls are in place to ensure that everything is functioning correctly. For example, are all cameras and locks functioning? Are all network scans in place? Rescue teams e.t.c?
Paper on Risk Assessment Methodologies_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Management: Risk Assessment and Recommendations
|11
|2902
|54

Risk Assessment Report for Cloud-Centum
|13
|3442
|497

Assessment and Decision Analysis for Risk Management
|7
|1386
|403

Hazop - A Structured Technique for Systematic Examination of Risks
|7
|1446
|491

Hazard and Operability Study (HAZOP)
|11
|2072
|386

Risk Assessment Report: Environment, Fire, Explosion
|24
|4409
|76