Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Basic Concepts of Strategic Management
Chapter 3 Organizational Environments and Culture
Alexander Brandl ERHS 561 Emergency Response Environmental and Radiological Health Sciences.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Service Design – Section 4.5 Service Continuity Management.
COMP8130 and COMP4130 Adrian Marshall Verification and Validation Risk Management Adrian Marshall.
Chapter 3 Preparing and Evaluating a Research Plan Gay and Airasian
Risk Management at a Glance. Terms Hazard Hazard Risk Risk Probability Probability Severity Severity Estimating Estimating Exposure Exposure Risk Assessment.
Crisis Management Planning Employee Health Safety and Security Expertise Panel · Presenter Name · 2008.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
PRM 702 Project Risk Management Lecture #28
Prevention-Mitigation Fiscal Year 2010 Initial Grantee Meeting December 8 – 9, 2010, Santa Monica, California Arthur Cummins Director Safe and Healthy.
Chapter 11: Project Risk Management
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Managing Risk. Objectives  To Describe Risk Management concepts and techniques  To calculate and analyze a project using Probability of completion 
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
Health and Safety Dynamic Risk Assessment Aim To inform the students of the need for and the importance of a risk assessment.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Safety Program Development and Management 10-1 Chapter 10.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Unit 6 Personnel Roles and Responsibilities & Safety Program Development and Management Chapter 9 and 10.
Benefit Cost Analysis for Flood Hazard Mitigation: The Federal Emergency Management Agency (FEMA) Method (selected excerpts from FEMA EMI Training Course)
Mgmt.101 ~ Introduction to Business Risk Management & Insurance.
Certified Protection Officer Program. Chapter 1 Unit 1 Concepts and Theories of Asset Protection Pages 3-11.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
Chapter 8 Risk Management Plans 8 Risk Management Plans C H A P T E R.
SEC 420 Entire Course (UOP) For more course tutorials visit  SEC 420 Week 1 Individual Assignment Responsibilities of Personal Protection.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
SEC 420 Entire Course (UOP) SEC 420 Week 1 DQ 1 (UOP)  SEC 420 Week 1 Individual Assignment Responsibilities of Personal Protection Officers Paper 
RISK & ITS MANAGEMENT. Risk A crisis situation involves : - a threat to resource & people, - a loss of control, - visible and / or invisible effects on.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
SEC 480 assist Expect Success/sec480assistdotcom FOR MORE CLASSES VISIT
SEC 420 UOP professional tutor / sec420dotcom.  SEC 420 Entire Course (UOP)  SEC 420 Week 1 DQ 1 (UOP)  SEC 420 Week 1 Individual Assignment Responsibilities.
SEC 420 Entire Course For more classes visit SEC 420 Week 1 Individual Assignment Responsibilities of Personal Protection Officers.
SEC 470 Entire Course (UOP) For more course tutorials visit  SEC 470 Week 1 US Patriot Act Paper  SEC 470 Week 2 Federal Agencies.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
For more course tutorials visit SEC 480 Entire Course For more course tutorials visit SEC 480 Week 1 DQs SEC 480 Week.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Train When it Rains: Risk Assessment. What is Risk Assessment? Risk assessment is the process of recognizing possible harm from exposures which could.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Headquarters U.S. Air Force
Information Systems Security
THINK DIFFERENT. THINK SUCCESS.
Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg.
Headquarters U.S. Air Force
DISASTER VULNERABILITY, RISK AND CAPACITY
A comprehensive approach to recognizing and managing risk in business
An Overview on Risk Management
Risk management.
Chapter 8 – Administering Security
THE COUNTY OF YUBA OFFICE OF EMERGENCY SERVICES
and Security Management: ISO 28000
Risk Management for Technology Projects
CONTINUITY OF OPERATIONS PLANNING WORKSHOP #2
Managing Project Risk Chapter 8 Copyright 2012 John Wiley & Sons, Inc.
Risk Management Definition
Quality Risk Management
ESSENTIALS OF A PHYSICAL SECURITY SYSTEMS RISK ASSESSMENT
Types of Risk.
Air Carrier Continuing Analysis and Surveillance System (CASS)
Chapter 8: Criminal Justice Intro to Security, Instructor Name
The Strategic Planning Process
Project Risk Analysis and Management: L3
Effective Risk Management in Decision Making Process
Business Administration Programs School of Business and Liberal Arts Fall 2016 Assessment Report
Risk Management Part I Dr. Zahi Yaseen Contact Us
Project Risk Management Jiwei Ma
Does my Research need IRB Review?
Presentation transcript:

Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING Criminal Justice Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING Intro to Security, Instructor Name Date, Semester

Introduction Planning processes are used to identify sources of risk, implement countermeasures, and evaluate. Security manager: Must make recommendations Must determine the financial impact

The Concept of Risk Risk defined: The possibility of suffering harm or loss, exposure to the probability of loss or damage, an element of uncertainty, or the possibility that results of an action may not be consistent with the planned or expected outcomes.

Types of Risk Pure Risk: When there is a potential for injury, damage, or loss with no possible benefit. Dynamic Risk: Exists when threat conditions fluctuate.

Types of Risk (cont.) Speculative Risk: Static Risk: Inherent Risk: Exists when there is a potential for benefit or loss Static Risk: Is constant and unchanging Inherent Risk: Unavoidable because of the nature of the business

Risk Assessment and Management Techniques Through risk management, security professionals anticipate, recognize and analyze potential risks and loss-creating threats, and implement strategies to mitigate loss and damage.

Elimination, Reduction, Mitigation Eliminate risk Reduce the probability of loss Mitigate damage if threat materializes

Vulnerability, Probability, Criticality Vulnerability (exposure) Probability (likelihood) Criticality (impact) Vulnerability x Probability x Criticality = Risk Level

Risk Assessment Risk assessment involves a critical, objective analysis of an organization’s entire protective system. Measures: Subjective (qualitative) Objective (quantitative)

The Security Survey A security survey is used to evaluate an entire organization to identify risks and security deficiencies. A security instrument (checklist) is often used to conduct a security survey.

The Security Survey (cont.) Nature of the organization Country Neighborhood Perimeter Building itself Restricted areas

The Security Survey (cont.) Alarm and surveillance systems Fire protection Personnel security Information protection Procedures for investigations

The Security Survey (cont.) Collection of business and criminal intelligence Reporting systems Operations Liaison activities Counterterrorism

The Security Survey (cont.) Organizational policies Safety procedures Indoctrination and education Objective as well as subjective measures may be used

Planning and Budgeting Plan Types Single-use plan Repeat-use (standing) plan Tactical plan (operational plan) Strategic plan Contingency plan

Plan Elements Common elements: Needs assessment/risk assessment Development of alternative courses of action Selection of an action plan

Planning Tools CompStat (Computer-driven Statistics) Geographic information system (GIS) technology

Budgeting Financial impact of each action plan must be determined. Requires a budget Plan expressed in financial terms Cost-benefit analysis Return on investment (ROI) Value-added contribution (VAC)

Types of Budgets Traditional (simple % increase) Line item (description/cost of each item) Performance-based (tied to performance objectives) Zero-based (justified each budget period)

Budget Expenditures Elements of a budget include: Personnel expenses Operating expenses Supplies and materials Capital expenditures Miscellaneous expenses

Selling the Plan All stakeholders should be involved in the decision- making process Generate support for plan Convincingly describe and demonstrate security’s return on investment

Contingency Planning Contingency plan should address operational elements adversely affected by change and all conceivable variables and requirements. Business (operations) Continuity Plans Ensures normal operations are not disrupted by significant events.

Disaster and Emergency Plans Should occur at individual, organizational, local, state and federal levels National Incident Management System (NIMS): National Plan State-level Standardized Emergency Management System (SEMS): State Plan

Crime Prevention Through Environmental Design Based on the theory that the environment can be protected, and crime prevented, through the proper design of facilities and communities. Emphasis is based on effective use of architecture, building codes, and defensible space.

Crime Prevention Through Environmental Design (cont.) History of CPTED: Not new Used by cave dwellers 1970s crime prevention Community policing and problem solving

Crime Prevention Through Environmental Design (cont.) Assumptions: Environment can be manipulated to produce behavioral effects that prevent crime and improve the quality of life. Includes activities, structures, policies designed to positively impact human behavior