Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING Criminal Justice Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING Intro to Security, Instructor Name Date, Semester
Introduction Planning processes are used to identify sources of risk, implement countermeasures, and evaluate. Security manager: Must make recommendations Must determine the financial impact
The Concept of Risk Risk defined: The possibility of suffering harm or loss, exposure to the probability of loss or damage, an element of uncertainty, or the possibility that results of an action may not be consistent with the planned or expected outcomes.
Types of Risk Pure Risk: When there is a potential for injury, damage, or loss with no possible benefit. Dynamic Risk: Exists when threat conditions fluctuate.
Types of Risk (cont.) Speculative Risk: Static Risk: Inherent Risk: Exists when there is a potential for benefit or loss Static Risk: Is constant and unchanging Inherent Risk: Unavoidable because of the nature of the business
Risk Assessment and Management Techniques Through risk management, security professionals anticipate, recognize and analyze potential risks and loss-creating threats, and implement strategies to mitigate loss and damage.
Elimination, Reduction, Mitigation Eliminate risk Reduce the probability of loss Mitigate damage if threat materializes
Vulnerability, Probability, Criticality Vulnerability (exposure) Probability (likelihood) Criticality (impact) Vulnerability x Probability x Criticality = Risk Level
Risk Assessment Risk assessment involves a critical, objective analysis of an organization’s entire protective system. Measures: Subjective (qualitative) Objective (quantitative)
The Security Survey A security survey is used to evaluate an entire organization to identify risks and security deficiencies. A security instrument (checklist) is often used to conduct a security survey.
The Security Survey (cont.) Nature of the organization Country Neighborhood Perimeter Building itself Restricted areas
The Security Survey (cont.) Alarm and surveillance systems Fire protection Personnel security Information protection Procedures for investigations
The Security Survey (cont.) Collection of business and criminal intelligence Reporting systems Operations Liaison activities Counterterrorism
The Security Survey (cont.) Organizational policies Safety procedures Indoctrination and education Objective as well as subjective measures may be used
Planning and Budgeting Plan Types Single-use plan Repeat-use (standing) plan Tactical plan (operational plan) Strategic plan Contingency plan
Plan Elements Common elements: Needs assessment/risk assessment Development of alternative courses of action Selection of an action plan
Planning Tools CompStat (Computer-driven Statistics) Geographic information system (GIS) technology
Budgeting Financial impact of each action plan must be determined. Requires a budget Plan expressed in financial terms Cost-benefit analysis Return on investment (ROI) Value-added contribution (VAC)
Types of Budgets Traditional (simple % increase) Line item (description/cost of each item) Performance-based (tied to performance objectives) Zero-based (justified each budget period)
Budget Expenditures Elements of a budget include: Personnel expenses Operating expenses Supplies and materials Capital expenditures Miscellaneous expenses
Selling the Plan All stakeholders should be involved in the decision- making process Generate support for plan Convincingly describe and demonstrate security’s return on investment
Contingency Planning Contingency plan should address operational elements adversely affected by change and all conceivable variables and requirements. Business (operations) Continuity Plans Ensures normal operations are not disrupted by significant events.
Disaster and Emergency Plans Should occur at individual, organizational, local, state and federal levels National Incident Management System (NIMS): National Plan State-level Standardized Emergency Management System (SEMS): State Plan
Crime Prevention Through Environmental Design Based on the theory that the environment can be protected, and crime prevented, through the proper design of facilities and communities. Emphasis is based on effective use of architecture, building codes, and defensible space.
Crime Prevention Through Environmental Design (cont.) History of CPTED: Not new Used by cave dwellers 1970s crime prevention Community policing and problem solving
Crime Prevention Through Environmental Design (cont.) Assumptions: Environment can be manipulated to produce behavioral effects that prevent crime and improve the quality of life. Includes activities, structures, policies designed to positively impact human behavior