Analysis of Risk Management for Brisbane Airport Security
VerifiedAdded on  2021/05/31
|12
|3095
|74
Report
AI Summary
This report provides an in-depth analysis of risk management strategies for Brisbane Airport. It examines the roles and responsibilities of the Chief Risk Manager in securing the airport against various threats, including terrorism, cyber-attacks, and aircraft-related risks. The report outlines a comprehensive risk assessment plan, considering factors such as unauthorized weapon access, drug supply, and runway safety. It references ISO 31000 standards and discusses the importance of cyber security, CCTV installation, and thorough inspections. The report also explores factors contributing to aircraft risk, like bird strikes, and offers recommendations for enhancing security, such as verifying passports, securing entrances, and implementing full-body scans. The conclusion emphasizes the need for a sustainable risk mitigation process, focusing on cyber security and addressing potential threats to passenger and staff safety. The report emphasizes the importance of the Chief Risk Manager's role in ensuring the safety and security of Brisbane Airport.

Risk Management
Name Of the
student:
University
Name:
Name Of the
student:
University
Name:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Executive summary
In this report, the roles and responsibility of the chief rick manager will be analysis to secure
the Brisbane airport from all risk and hazard. This report will evaluate the different aspect of
risk management plan through proper argument and justification.
1
In this report, the roles and responsibility of the chief rick manager will be analysis to secure
the Brisbane airport from all risk and hazard. This report will evaluate the different aspect of
risk management plan through proper argument and justification.
1

Table of Contents
Introduction................................................................................................................................3
Risk management.......................................................................................................................3
Risk assessment plan..................................................................................................................4
Factors of Aircraft Risk..............................................................................................................5
Recommendation........................................................................................................................6
Conclusion..................................................................................................................................7
References..................................................................................................................................9
2
Introduction................................................................................................................................3
Risk management.......................................................................................................................3
Risk assessment plan..................................................................................................................4
Factors of Aircraft Risk..............................................................................................................5
Recommendation........................................................................................................................6
Conclusion..................................................................................................................................7
References..................................................................................................................................9
2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Introduction
The report of ENISA gives a manual for cyber crime chiefs to actualize great accessible
practices to date, with a specific end goal to secure travelers and tasks. This investigation
additionally distinguishes holes, for example, the uniqueness of digital security practices and
absence of mindfulness and aptitudes. The examination intends to help airport cyber authority
leaders and data security experts of Brisbane airport of Australia in their security endeavors
and hazard administration (Loosemore et al., 2012). Eight suggestions for upgrading the
security and versatility of network server of airlines in Australia are exhibited in the report,
customized particularly towards leaders, air terminal administrators and industry. The
effective airline networks are those air terminals making utilization of incorporated Internet
of Things (IoT) segments to bring included esteem administrations. By incorporating shrewd
segments, Airline servers are presented in the ISO31000 segment to a bigger network service
and connectivity with other airport authority. In this way, airline server needs to ensure
regular more elevated amounts of digital security because of the potential effect that digital
assaults and disturbances can have on the wellbeing of administrators and travelers.
Expanding mindfulness on digital security hazards and enhancing the security and strength of
the whole lifecycle of airplane terminal activities is currently a need. According to ISO:31000
sections 5.2 and 5.3, with regards to the NIS Directive, ENISA will help the Member States
and the European Commission by giving ability and guidance as well as encouraging and
creating the trading of good practices (Jha et al., 2012).
Major threats of Brisbane airport is unauthorized weapon accessibility that defines a terrorist
attack. Another threats are drug supply, unauthorized access of people and poor runway.
Risk management
In the realm of business, the chance is constantly related paying little regard to how little or
enormous company (Arena et al, 2010). Therefore, this is basic to have an amazing
management noticed to make sure the matters on the resource and dishonor. Risk
management process is made out of six stages in particular, such as
 Recognizing presentation to misfortune
 Decide the goals of the association
 Measure that same introduction
 Select choices
 Screen and survey the effect
3
The report of ENISA gives a manual for cyber crime chiefs to actualize great accessible
practices to date, with a specific end goal to secure travelers and tasks. This investigation
additionally distinguishes holes, for example, the uniqueness of digital security practices and
absence of mindfulness and aptitudes. The examination intends to help airport cyber authority
leaders and data security experts of Brisbane airport of Australia in their security endeavors
and hazard administration (Loosemore et al., 2012). Eight suggestions for upgrading the
security and versatility of network server of airlines in Australia are exhibited in the report,
customized particularly towards leaders, air terminal administrators and industry. The
effective airline networks are those air terminals making utilization of incorporated Internet
of Things (IoT) segments to bring included esteem administrations. By incorporating shrewd
segments, Airline servers are presented in the ISO31000 segment to a bigger network service
and connectivity with other airport authority. In this way, airline server needs to ensure
regular more elevated amounts of digital security because of the potential effect that digital
assaults and disturbances can have on the wellbeing of administrators and travelers.
Expanding mindfulness on digital security hazards and enhancing the security and strength of
the whole lifecycle of airplane terminal activities is currently a need. According to ISO:31000
sections 5.2 and 5.3, with regards to the NIS Directive, ENISA will help the Member States
and the European Commission by giving ability and guidance as well as encouraging and
creating the trading of good practices (Jha et al., 2012).
Major threats of Brisbane airport is unauthorized weapon accessibility that defines a terrorist
attack. Another threats are drug supply, unauthorized access of people and poor runway.
Risk management
In the realm of business, the chance is constantly related paying little regard to how little or
enormous company (Arena et al, 2010). Therefore, this is basic to have an amazing
management noticed to make sure the matters on the resource and dishonor. Risk
management process is made out of six stages in particular, such as
 Recognizing presentation to misfortune
 Decide the goals of the association
 Measure that same introduction
 Select choices
 Screen and survey the effect
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

 Actualize the reply of risk factor
These means are fundamental in drafting a decent administration to intend to additionally
comprehend these means this paper will clarify its application and its points of interest to the
endeavor (Spears and Barki, 2010).
There are several risks shown in the risk management, such as
Loss: according to ISO:31000 sections 5.2 and 5.3, he hazard is continually that includes some
sort of misfortune. If there is no misfortune possible, at that point a tasks are not bothered on
the risk, while it could not trade off the undertaking (Haimes, 2015).
Uncertainty: An undertaking administrator needs to distinguish however many
vulnerabilities as would be prudent. A hazard might happen. This inalienable vulnerability
could not be exhausted. However, this could be made modest finer by elucidate the
possibility of the risk, to demonstrate symbols of step up command of the outcome in
addition to choice if the exposure happens with choose the variables that collision the extent
and prospect of incident of the exact risk. This implies vulnerability could not be dispense
with. Though, it could be lessened to the level the operation must find civilized individual as
per ISO31000 (Colicchia and Strozzi, 2012).
Time: Associated with each hazard there is where the hazard never again exist. In addition to,
the risks have occurred and misfortune have been endure or latent issues, which could cause
the risk has been matured furthermore never again signify a danger. This is imperative to
discern when that moment has indoors, so the exposure could be disqualified as of the
enthusiasm (McNeil et al., 2015).
Among scholars, they signified the information of risk management as well as risk research
Purdy (2010) shows that this is no sensible perspective of the distinction as well as what
single essayist exemplify as risk administration another author is calling it the chance
examination. Fosdick's view is that he isolates them by saying that risk assessment is the
whole of the procedures of hazard ID, estimation and assessment and hazard administration is
tied in with observing, arranging and calculating movements to are deliver by the risk
investigation faction.
According to ISO:31000 sections 5.4.x, the Association for Risk Management (Saunders and
Allen, 2010) meaning of hazard investigation is like the management of Brisbane airport; the
management has also remote the risk examination into double phases. The main stage is
4
These means are fundamental in drafting a decent administration to intend to additionally
comprehend these means this paper will clarify its application and its points of interest to the
endeavor (Spears and Barki, 2010).
There are several risks shown in the risk management, such as
Loss: according to ISO:31000 sections 5.2 and 5.3, he hazard is continually that includes some
sort of misfortune. If there is no misfortune possible, at that point a tasks are not bothered on
the risk, while it could not trade off the undertaking (Haimes, 2015).
Uncertainty: An undertaking administrator needs to distinguish however many
vulnerabilities as would be prudent. A hazard might happen. This inalienable vulnerability
could not be exhausted. However, this could be made modest finer by elucidate the
possibility of the risk, to demonstrate symbols of step up command of the outcome in
addition to choice if the exposure happens with choose the variables that collision the extent
and prospect of incident of the exact risk. This implies vulnerability could not be dispense
with. Though, it could be lessened to the level the operation must find civilized individual as
per ISO31000 (Colicchia and Strozzi, 2012).
Time: Associated with each hazard there is where the hazard never again exist. In addition to,
the risks have occurred and misfortune have been endure or latent issues, which could cause
the risk has been matured furthermore never again signify a danger. This is imperative to
discern when that moment has indoors, so the exposure could be disqualified as of the
enthusiasm (McNeil et al., 2015).
Among scholars, they signified the information of risk management as well as risk research
Purdy (2010) shows that this is no sensible perspective of the distinction as well as what
single essayist exemplify as risk administration another author is calling it the chance
examination. Fosdick's view is that he isolates them by saying that risk assessment is the
whole of the procedures of hazard ID, estimation and assessment and hazard administration is
tied in with observing, arranging and calculating movements to are deliver by the risk
investigation faction.
According to ISO:31000 sections 5.4.x, the Association for Risk Management (Saunders and
Allen, 2010) meaning of hazard investigation is like the management of Brisbane airport; the
management has also remote the risk examination into double phases. The main stage is
4

recognized as the Qualitative Analysis and this is the location risks are recognized and
personally evaluated. This recognized risks are investigated as far as, time and cost gauges
that is identified as the Quantitative Analysis. Apart from this, it is the way to planning
reaction, receptive ones and proactive.
Cyber attack:
Cyber crime is the most current jumbled issue in the digital world. Any criminal movement
that use a PC as an target, technically or methods for propagate additional criminal offense
come extremely lock to cyber attack. This is rapidly rising from simple email
underhandedness where responsible parties drive vulgar email, to extra authentic offenses
similar to burglary of information, email shooting to slam servers and so forth. The kinds of
digital mistakes incorporate explicit entertainment, digital misrepresentation, disapproval,
cyber attack, badgering, IPR burglary, information prisoner, tax evasion, phishing, email
besieging and digital war. Cyber crime is extraordinary and also awful than regular crime as
in cyber attack (Symmons et al., 2010). There is a broad control under the reformatory
arrangements of the Information Technology Act.
Risk assessment plan
According to ISO31000, the indispensable outcomes of aircraft smash incorporates property
damage, lesions or might be examined as the risk assessment and hazard to Brisbane Airport.
Besides that, an aircraft crash could be considered as the risk factor that influences serious
crisis occurrence for passenger's health (Leemans and Solecki, 2013). The probability of risk
factor such as Brisbane Airport is considered as being to a great degree for securing the lives
of the passengers. The risk assessment depends on the unwanted crash that occurred and
miscalculates the information in Australia. The chief risk manager needs to consider abroad
flight figures to determine the total number of an aircraft crash and other risk occurrences
including RPT aircraft in Australia. In this way, the chief risk manager needs to focus on
current risk migration process by the ATSB featured applications. However, for having the
greatest global utmost in high limit consistent open conveyance (RPT) with no body
misfortunes, the chief risk manager should deadly mishaps including traveler fly aircraft in
Australia(Dickson, 2012). The chief risk manager of Brisbane airport needs to offer secure
operations including 32 mortalities recorded in case of ATSB database from 1991 to 2004
with a 1994 preparing mishap including no travelers on load up. Nobody happened at a
noteworthy air terminal like Brisbane which has noteworthy measured territory with the
5
personally evaluated. This recognized risks are investigated as far as, time and cost gauges
that is identified as the Quantitative Analysis. Apart from this, it is the way to planning
reaction, receptive ones and proactive.
Cyber attack:
Cyber crime is the most current jumbled issue in the digital world. Any criminal movement
that use a PC as an target, technically or methods for propagate additional criminal offense
come extremely lock to cyber attack. This is rapidly rising from simple email
underhandedness where responsible parties drive vulgar email, to extra authentic offenses
similar to burglary of information, email shooting to slam servers and so forth. The kinds of
digital mistakes incorporate explicit entertainment, digital misrepresentation, disapproval,
cyber attack, badgering, IPR burglary, information prisoner, tax evasion, phishing, email
besieging and digital war. Cyber crime is extraordinary and also awful than regular crime as
in cyber attack (Symmons et al., 2010). There is a broad control under the reformatory
arrangements of the Information Technology Act.
Risk assessment plan
According to ISO31000, the indispensable outcomes of aircraft smash incorporates property
damage, lesions or might be examined as the risk assessment and hazard to Brisbane Airport.
Besides that, an aircraft crash could be considered as the risk factor that influences serious
crisis occurrence for passenger's health (Leemans and Solecki, 2013). The probability of risk
factor such as Brisbane Airport is considered as being to a great degree for securing the lives
of the passengers. The risk assessment depends on the unwanted crash that occurred and
miscalculates the information in Australia. The chief risk manager needs to consider abroad
flight figures to determine the total number of an aircraft crash and other risk occurrences
including RPT aircraft in Australia. In this way, the chief risk manager needs to focus on
current risk migration process by the ATSB featured applications. However, for having the
greatest global utmost in high limit consistent open conveyance (RPT) with no body
misfortunes, the chief risk manager should deadly mishaps including traveler fly aircraft in
Australia(Dickson, 2012). The chief risk manager of Brisbane airport needs to offer secure
operations including 32 mortalities recorded in case of ATSB database from 1991 to 2004
with a 1994 preparing mishap including no travelers on load up. Nobody happened at a
noteworthy air terminal like Brisbane which has noteworthy measured territory with the
5
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

deadly contribution of chief risk manager. Another noteworthy issue to consider with air
terminal activity is 'fledgling strike' where feathered creatures slam into planes in typical
flight or contiguous airports (Fairfield-Sonn, 2012). While fledgling assaults necessity be
accounted for to ATSB, for paying a thoughtful attention on likelihood of causing huge
aircraft mishaps since present-day of the aircraft motors are intended to limit the ensuing
outcomes.
Factors of Aircraft Risk
According to ISO:31000 sections 5.4.x, he most likely outcome could incorporate some harm to
planes and bother to the voyaging open. The probability of an air crash occurrence with RPT
aircraft coming about because of fowl attack might be thought as a greatly short. In any case,
the airport authority can root aircraft harm and air crash can be occurrence abroad including
flying creature strike have ordinarily involved planes flying into herds of substantial fowls
like geese (Leemans and Solecki, 2013). To secure the Brisbane airport, the Chief Risk
manager needs to follow following risk assessments plans such as follows:
• verify passports
• versify luggage
• secure entrance
• CCTV installation
• Inspection of Fire alarm
• Inspection of Water supply pipe
• Inspection of fuel arrangement
• Full body scan in case of the terrorism threat
The Brisbane aircraft requires securing the aircraft for all types of risk arrangement plan on
the ground that, the chief risk manager only can save activity controllers of aircraft.
Recommendation
This report seeing a risk assessment for aircraft at least one feathered persons like bomb
relics are created besides the airside asphalt region, or inside on the large runway strip except
additional purpose behind the main suspect can be found through a proper investigation.
Suspected things like bags and tiffin box can be considered as serious life risk of the
6
terminal activity is 'fledgling strike' where feathered creatures slam into planes in typical
flight or contiguous airports (Fairfield-Sonn, 2012). While fledgling assaults necessity be
accounted for to ATSB, for paying a thoughtful attention on likelihood of causing huge
aircraft mishaps since present-day of the aircraft motors are intended to limit the ensuing
outcomes.
Factors of Aircraft Risk
According to ISO:31000 sections 5.4.x, he most likely outcome could incorporate some harm to
planes and bother to the voyaging open. The probability of an air crash occurrence with RPT
aircraft coming about because of fowl attack might be thought as a greatly short. In any case,
the airport authority can root aircraft harm and air crash can be occurrence abroad including
flying creature strike have ordinarily involved planes flying into herds of substantial fowls
like geese (Leemans and Solecki, 2013). To secure the Brisbane airport, the Chief Risk
manager needs to follow following risk assessments plans such as follows:
• verify passports
• versify luggage
• secure entrance
• CCTV installation
• Inspection of Fire alarm
• Inspection of Water supply pipe
• Inspection of fuel arrangement
• Full body scan in case of the terrorism threat
The Brisbane aircraft requires securing the aircraft for all types of risk arrangement plan on
the ground that, the chief risk manager only can save activity controllers of aircraft.
Recommendation
This report seeing a risk assessment for aircraft at least one feathered persons like bomb
relics are created besides the airside asphalt region, or inside on the large runway strip except
additional purpose behind the main suspect can be found through a proper investigation.
Suspected things like bags and tiffin box can be considered as serious life risk of the
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

passengers and airport staffs. The airport authority of Brisbane has been accounted for via
aircrew or ground staff yet upon assessment for minimizing the risks. The chief risk manager
of Brisbane airport needs to analyze any physical confirmation regarding bomb within the
aircraft to avoid any accident. The chief risk manager needs to verify all risk points for via
aircrew or ground work force and upon review (Wills, 2017). The airport crew is originate on
the airside asphalt zone or inside the airstrip band except additional explanation behind any
terrorism attack can be found or Aircraft upkeep faculty. The airport authority needs to
discover all risk confirmation for the successful implication of the risk assessment plan.
According to ISO:31000 section 5.5, the chief risk manager of the Brisbane airport can secure
the lives of the passengers by taking some serious steps such as CCTV installation with a
specific server to avoid any cyber-attack. In this way, the chief risk manager needs to analyze
the CCTV programs for minimizing the risks factors regarding cyber security. Although, the
airport authority of Brisbane needs to focus on the CCTV installation process to monitor the
all operational processes, still monitoring is essential in all aspects (Koulafetis, 2016).
Conclusion
This business report is based on the risk assessment planning of the Brisbane Airport. In this
way, different types of risk factors such as cyber security, data threats, fire alarm and fuel
supply arrangements. Besides that, the airport authority needs to pay more attention to the
risk factors that can lead to serious damage inspired by terrorism. Terrorist attack is one of
the serious risk factors that can reduce the life safety of the passengers and other aircraft
staffs. According ISO: 31000 section 5.5, the chief risk manager of Brisbane Airport needs to
focus on the cyber security issue to avoid all risk assessment plan. Also, the airport authority
only can design a sustainable risk migration process by following the instruction of the chief
risk manager. The chief risk manager should check all suspected things like bags and tiffin
box that can be considered as serious life risk for airport staffs (Koulafetis, 2016). The chief
risk manager of Brisbane airport needs to analyze any physical confirmation regarding bomb
within the aircraft to avoid any accident. The chief risk manager needs to verify all risk points
for via aircrew or ground work force and upon review. The airport authority of Brisbane has
been accounted for via aircrew or ground staff yet upon assessment for minimizing the risks.
ISO:31000 section 5.5 defines that, the airport crew is originate on the airside asphalt zone or
inside the runway band except another explanation behind any terrorism attack can be found
or Aircraft upkeep faculty. Although, the airport authority of Brisbane needs to focus on the
CCTV installation process to monitor the all operational processes. Aside from that, the chief
7
aircrew or ground staff yet upon assessment for minimizing the risks. The chief risk manager
of Brisbane airport needs to analyze any physical confirmation regarding bomb within the
aircraft to avoid any accident. The chief risk manager needs to verify all risk points for via
aircrew or ground work force and upon review (Wills, 2017). The airport crew is originate on
the airside asphalt zone or inside the airstrip band except additional explanation behind any
terrorism attack can be found or Aircraft upkeep faculty. The airport authority needs to
discover all risk confirmation for the successful implication of the risk assessment plan.
According to ISO:31000 section 5.5, the chief risk manager of the Brisbane airport can secure
the lives of the passengers by taking some serious steps such as CCTV installation with a
specific server to avoid any cyber-attack. In this way, the chief risk manager needs to analyze
the CCTV programs for minimizing the risks factors regarding cyber security. Although, the
airport authority of Brisbane needs to focus on the CCTV installation process to monitor the
all operational processes, still monitoring is essential in all aspects (Koulafetis, 2016).
Conclusion
This business report is based on the risk assessment planning of the Brisbane Airport. In this
way, different types of risk factors such as cyber security, data threats, fire alarm and fuel
supply arrangements. Besides that, the airport authority needs to pay more attention to the
risk factors that can lead to serious damage inspired by terrorism. Terrorist attack is one of
the serious risk factors that can reduce the life safety of the passengers and other aircraft
staffs. According ISO: 31000 section 5.5, the chief risk manager of Brisbane Airport needs to
focus on the cyber security issue to avoid all risk assessment plan. Also, the airport authority
only can design a sustainable risk migration process by following the instruction of the chief
risk manager. The chief risk manager should check all suspected things like bags and tiffin
box that can be considered as serious life risk for airport staffs (Koulafetis, 2016). The chief
risk manager of Brisbane airport needs to analyze any physical confirmation regarding bomb
within the aircraft to avoid any accident. The chief risk manager needs to verify all risk points
for via aircrew or ground work force and upon review. The airport authority of Brisbane has
been accounted for via aircrew or ground staff yet upon assessment for minimizing the risks.
ISO:31000 section 5.5 defines that, the airport crew is originate on the airside asphalt zone or
inside the runway band except another explanation behind any terrorism attack can be found
or Aircraft upkeep faculty. Although, the airport authority of Brisbane needs to focus on the
CCTV installation process to monitor the all operational processes. Aside from that, the chief
7

risk manager of the Brisbane airport can secure the lives of the passengers by taking some
serious steps such as CCTV installation with a specific server to avoid any cyber-attack. The
airport authority needs to discover all risk confirmation for the successful implication of the
risk assessment plan. In this way, the chief risk manager needs to analyze the CCTV
programs for minimizing the risks factors regarding cyber security.
8
serious steps such as CCTV installation with a specific server to avoid any cyber-attack. The
airport authority needs to discover all risk confirmation for the successful implication of the
risk assessment plan. In this way, the chief risk manager needs to analyze the CCTV
programs for minimizing the risks factors regarding cyber security.
8
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

References
Bloch, F. (2014). Evaluating manpower training programs. Greenwich, Conn.: JAI Press.
Cahill, D. (2012). Lifestyle Market Segmentation. Hoboken: Routledge, Taylor and Francis.
Dickson, E. (2012). Urban risk assessments. Washington, D.C.: World Bank.
Fairfield-Sonn, J. (2012). Corporate culture and the quality organization. Westport, Conn.:
Quorum Books.
Koulafetis, P. (2016). Modern credit risk management. UK: SEGA.
Leemans, R. and Solecki, W. (2013). Redefining environmental sustainability. Current
Opinion in Environmental Sustainability, 5(3-4), pp.272-277.
Wills, H. (2017). Issue Information. Employment Relations Today, 44(2), pp.1-4.
Peters, M. J., Symmons, D. P. M., McCarey, D., Dijkmans, B. A. C., Nicola, P., Kvien, T. K.,
... & Semb, A. (2010). EULAR evidence-based recommendations for cardiovascular
risk management in patients with rheumatoid arthritis and other forms of
inflammatory arthritis. Annals of the rheumatic diseases, 69(2), 325-331.
Saunders, A., & Allen, L. (2010). Credit risk management in and out of the financial crisis:
new approaches to value at risk and other paradigms (Vol. 528). John Wiley & Sons.
Purdy, G. (2010). ISO 31000: 2009—setting a new standard for risk management. Risk
analysis, 30(6), 881-886.
Spears, J. L., & Barki, H. (2010). User participation in information systems security risk
management. MIS Quarterly, 503-522.
Arena, M., Arnaboldi, M., & Azzone, G. (2010). The organizational dynamics of enterprise
risk management. Accounting, Organizations and Society, 35(7), 659-675.
Christoffersen, P. F. (2012). Elements of financial risk management. Academic Press.
9
Bloch, F. (2014). Evaluating manpower training programs. Greenwich, Conn.: JAI Press.
Cahill, D. (2012). Lifestyle Market Segmentation. Hoboken: Routledge, Taylor and Francis.
Dickson, E. (2012). Urban risk assessments. Washington, D.C.: World Bank.
Fairfield-Sonn, J. (2012). Corporate culture and the quality organization. Westport, Conn.:
Quorum Books.
Koulafetis, P. (2016). Modern credit risk management. UK: SEGA.
Leemans, R. and Solecki, W. (2013). Redefining environmental sustainability. Current
Opinion in Environmental Sustainability, 5(3-4), pp.272-277.
Wills, H. (2017). Issue Information. Employment Relations Today, 44(2), pp.1-4.
Peters, M. J., Symmons, D. P. M., McCarey, D., Dijkmans, B. A. C., Nicola, P., Kvien, T. K.,
... & Semb, A. (2010). EULAR evidence-based recommendations for cardiovascular
risk management in patients with rheumatoid arthritis and other forms of
inflammatory arthritis. Annals of the rheumatic diseases, 69(2), 325-331.
Saunders, A., & Allen, L. (2010). Credit risk management in and out of the financial crisis:
new approaches to value at risk and other paradigms (Vol. 528). John Wiley & Sons.
Purdy, G. (2010). ISO 31000: 2009—setting a new standard for risk management. Risk
analysis, 30(6), 881-886.
Spears, J. L., & Barki, H. (2010). User participation in information systems security risk
management. MIS Quarterly, 503-522.
Arena, M., Arnaboldi, M., & Azzone, G. (2010). The organizational dynamics of enterprise
risk management. Accounting, Organizations and Society, 35(7), 659-675.
Christoffersen, P. F. (2012). Elements of financial risk management. Academic Press.
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Jha, A. K., Bloch, R., & Lamond, J. (2012). Cities and flooding: a guide to integrated urban
flood risk management for the 21st century. World Bank Publications.
Loosemore, M., Raftery, J., Reilly, C., & Higgon, D. (2012). Risk management in projects.
Routledge.
Colicchia, C., & Strozzi, F. (2012). Supply chain risk management: a new methodology for a
systematic literature review. Supply Chain Management: An International
Journal, 17(4), 403-418.
McNeil, A. J., Frey, R., & Embrechts, P. (2015). Quantitative risk management: Concepts,
techniques and tools. Princeton university press.
Haimes, Y. Y. (2015). Risk modeling, assessment, and management. John Wiley & Sons.
10
flood risk management for the 21st century. World Bank Publications.
Loosemore, M., Raftery, J., Reilly, C., & Higgon, D. (2012). Risk management in projects.
Routledge.
Colicchia, C., & Strozzi, F. (2012). Supply chain risk management: a new methodology for a
systematic literature review. Supply Chain Management: An International
Journal, 17(4), 403-418.
McNeil, A. J., Frey, R., & Embrechts, P. (2015). Quantitative risk management: Concepts,
techniques and tools. Princeton university press.
Haimes, Y. Y. (2015). Risk modeling, assessment, and management. John Wiley & Sons.
10

Appendix: Threat register
Cyber risk Recruitment of skilled
people
Terrorism Digital body scanners
Scanning
Runway Construction employees
Inspection
More than two flights can
take off from Brisbane
airport
11
eputed airport of Brisbane still comprising of varied threats such as data loss, customer
assport copy check, unauthorised weapon access.
istory and Background of Threat
CTV installation Checked: Yes
echnical Person : Yes
unway construction maintenance : Yes
Future OptionsNotes on Risk Characterisation:
Implementation:
surveillance
process need to be
monitored
Monitoring
after 1 week
of
implementati
on
Management:
technical skilled
people hiring
Training to
employees
Constant hiring
Chief executive officer
need to
be more vigilant
towards daily
monitoring process.
Training
Brisbane
Airport
Monitored
By
(Review
Date)
Responsibility
for mitigation
action
(Unit Specific)
Action plan
(Status)
Risk Control &
Mitigation
Strategy
Business
Groups
Impacted
Risk Analysis
& Context
Issue / Incident
Cyber risk Recruitment of skilled
people
Terrorism Digital body scanners
Scanning
Runway Construction employees
Inspection
More than two flights can
take off from Brisbane
airport
11
eputed airport of Brisbane still comprising of varied threats such as data loss, customer
assport copy check, unauthorised weapon access.
istory and Background of Threat
CTV installation Checked: Yes
echnical Person : Yes
unway construction maintenance : Yes
Future OptionsNotes on Risk Characterisation:
Implementation:
surveillance
process need to be
monitored
Monitoring
after 1 week
of
implementati
on
Management:
technical skilled
people hiring
Training to
employees
Constant hiring
Chief executive officer
need to
be more vigilant
towards daily
monitoring process.
Training
Brisbane
Airport
Monitored
By
(Review
Date)
Responsibility
for mitigation
action
(Unit Specific)
Action plan
(Status)
Risk Control &
Mitigation
Strategy
Business
Groups
Impacted
Risk Analysis
& Context
Issue / Incident
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.