Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING

Similar presentations


Presentation on theme: "Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING"— Presentation transcript:

1 Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
Criminal Justice Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING Intro to Security, Instructor Name Date, Semester

2 Introduction Planning processes are used to identify sources of risk, implement countermeasures, and evaluate. Security manager: Must make recommendations Must determine the financial impact

3 The Concept of Risk Risk defined:
The possibility of suffering harm or loss, exposure to the probability of loss or damage, an element of uncertainty, or the possibility that results of an action may not be consistent with the planned or expected outcomes.

4 Types of Risk Pure Risk:
When there is a potential for injury, damage, or loss with no possible benefit. Dynamic Risk: Exists when threat conditions fluctuate.

5 Types of Risk (cont.) Speculative Risk: Static Risk: Inherent Risk:
Exists when there is a potential for benefit or loss Static Risk: Is constant and unchanging Inherent Risk: Unavoidable because of the nature of the business

6 Risk Assessment and Management Techniques
Through risk management, security professionals anticipate, recognize and analyze potential risks and loss-creating threats, and implement strategies to mitigate loss and damage.

7 Elimination, Reduction, Mitigation
Eliminate risk Reduce the probability of loss Mitigate damage if threat materializes

8 Vulnerability, Probability, Criticality
Vulnerability (exposure) Probability (likelihood) Criticality (impact) Vulnerability x Probability x Criticality = Risk Level

9 Risk Assessment Risk assessment involves a critical, objective analysis of an organization’s entire protective system. Measures: Subjective (qualitative) Objective (quantitative)

10 The Security Survey A security survey is used to evaluate an entire organization to identify risks and security deficiencies. A security instrument (checklist) is often used to conduct a security survey.

11 The Security Survey (cont.)
Nature of the organization Country Neighborhood Perimeter Building itself Restricted areas

12 The Security Survey (cont.)
Alarm and surveillance systems Fire protection Personnel security Information protection Procedures for investigations

13 The Security Survey (cont.)
Collection of business and criminal intelligence Reporting systems Operations Liaison activities Counterterrorism

14 The Security Survey (cont.)
Organizational policies Safety procedures Indoctrination and education Objective as well as subjective measures may be used

15 Planning and Budgeting
Plan Types Single-use plan Repeat-use (standing) plan Tactical plan (operational plan) Strategic plan Contingency plan

16 Plan Elements Common elements: Needs assessment/risk assessment
Development of alternative courses of action Selection of an action plan

17 Planning Tools CompStat (Computer-driven Statistics)
Geographic information system (GIS) technology

18 Budgeting Financial impact of each action plan must be determined.
Requires a budget Plan expressed in financial terms Cost-benefit analysis Return on investment (ROI) Value-added contribution (VAC)

19 Types of Budgets Traditional (simple % increase)
Line item (description/cost of each item) Performance-based (tied to performance objectives) Zero-based (justified each budget period)

20 Budget Expenditures Elements of a budget include: Personnel expenses
Operating expenses Supplies and materials Capital expenditures Miscellaneous expenses

21 Selling the Plan All stakeholders should be involved in the decision- making process Generate support for plan Convincingly describe and demonstrate security’s return on investment

22 Contingency Planning Contingency plan should address operational elements adversely affected by change and all conceivable variables and requirements. Business (operations) Continuity Plans Ensures normal operations are not disrupted by significant events.

23 Disaster and Emergency Plans
Should occur at individual, organizational, local, state and federal levels National Incident Management System (NIMS): National Plan State-level Standardized Emergency Management System (SEMS): State Plan

24 Crime Prevention Through Environmental Design
Based on the theory that the environment can be protected, and crime prevented, through the proper design of facilities and communities. Emphasis is based on effective use of architecture, building codes, and defensible space.

25 Crime Prevention Through Environmental Design (cont.)
History of CPTED: Not new Used by cave dwellers 1970s crime prevention Community policing and problem solving

26 Crime Prevention Through Environmental Design (cont.)
Assumptions: Environment can be manipulated to produce behavioral effects that prevent crime and improve the quality of life. Includes activities, structures, policies designed to positively impact human behavior


Download ppt "Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING"

Similar presentations


Ads by Google