Verified Document

Risk Assessment And Analysis Term Paper

Risk Analysis and the Security Survey The following risk analysis and security survey report will be centered on the hospital as an organization. Vulnerabilities can be classified as crime opportunities, opportunities for breaking rules and regulations, opportunities for profiting and also for loss. By definition, vulnerability can be a gap or a weakness inside a security program that might be exploited by opponents to acquire unlawful access. Vulnerabilities include procedural, human, structural, electronic as well as other elements that offer opportunities to damage assets (Vellani and Owles, 2007).

A vulnerability assessment can be classified as a systematic method utilized to evaluate an organization's security position, assess the efficiency of current security infrastructure, as well as, recognize security limitations. The basic approach of a Vulnerability Assessment (VA) first measures what precise assets require protection. Subsequently, VA recognizes the protection measures previously being used to protect those assets, as well as what limitations exist in their protection. Lastly, the VA evaluates the security program's efficiency against valid protection metrics and offers suggestions for improvements to those in charge of security. In essence, VA helps an organization's security managers in figuring out whether they need added security systems, tools upgrades, procedure and policy revisions, opportunities for training, along with requirements for manpower. VA recognizes security limitations that might be misused by an adversary to gain access to the organization's assets (Vellani and Owles, 2007).

An asset's vulnerability is established by its weaknesses in operational procedures and processes, weaknesses in physical security apparatus, as well as technical limitations that can be misused by opponents. Vulnerability assessments are utilized to recognize these limitations through a survey of security. A security survey therefore is a fact-finding procedure whereby the evaluation team collects information that mirrors the how, what, where, who, when, as well as, why of an existing security program. The goals of the security survey are to gauge the facility's vulnerabilities by calculating what opportunities are present to misuse security procedures and policies, equipment being used for physical security, as well as security personnel (Vellani and Owles, 2007).

Vulnerability and Threat Identification

Introduction of Organization

The following risk analysis and security survey is undertaken for Brandon Regional Hospital and Brandon Hospital Annex. Brandon Regional Hospital (BRA) is a fully equipped and staffed medical facility. The BRA has specialty services including the Heart & Vascular Center, the Women's Center, the Reflux Center, the Pediatric Center, the Behavioral Health Center, the Spine Center, the Orthopedic Center, and the Emergency Center. Brandon Hospital Annex conducts Human Resources and Employee Health and Education. The organization is located at Oakfield Drive in Brandon, Florida. The risk analysis and survey information was provided by Ms. Chris Taramassco, the Chief Operating Officer of the organization. The security survey was undertaken on a visit to the facilities; data gathered provided firsthand information as to how the security of the organization is arranged. In general, there are a number of risks that the Brandon Regional Hospital and Brandon Hospital Annex are vulnerable to, as partially revealed in the security survey and analysis report. However, the report will offer the top three threats to the organization. These can be described in the following section.

Brandon Hospital Risk Management

The risk management program instigated by Brandon Hospital aims to offer an incorporated and harmonized determination of risk management that acts in accordance with relevant standards. It also helps the facility to enhance the safety level for the patients by decreasing the incidences that create harm to visitors, patients, personnel; as well as the repute of the hospital and associated centers. Through the program, the hospital purposes to safeguard itself from negative outcomes of inadvertent losses associated to professional and general liability (Risk Management Plan, 2012). In relation to the privacy laws at the state and also at the federal level, the information of all patients involved is expected to be confidential and protected at all costs. Any information that is released to external sources or unauthorized individuals ought to be only sanctioned by the laws.

It is imperative to note that all facilities and organizations face a certain level of risk that is related and linked to different threats. These threats might come about as a result of accidents, natural events, and even premeditated acts, resulting in havoc and harm. Irrespective of the nature of the threat, the owners of the organization have a duty and obligation to minimize...

In accordance with the information given from the security survey, the following are the threats and vulnerabilities that Brandon Regional Hospital and Brandon Hospital Annex faces.
i. Natural Disaster -- Hurricanes

Natural disasters are threats to just about all facilities and organization within a region that is prone to such circumstances. The main natural disaster that Brandon Hospital is susceptible to is hurricanes. When hurricanes take place, this could bring about immense damage to facilities from the impact of not just the water but also the wind forces. As a result, this can bring about failures in terms of the utilities set in place, injuries to individuals, as well as other occurrences that differ in severity from negligible to catastrophic, contingent on the strength and intensity of the hurricane (Lin et al., 2012). As mentioned by Ms. Chris Taramassco during the security survey, the health care facility is only 45 miles inland from Tampa Bay and the Gulf of Mexico. In addition, Ms Taramassco goes on to mention that in the year 2013, the organization was faced with a natural disaster when a tropical storm hit the Tampa Bay area. Even though this event did not lead to loss of lives, it implies that the organization is vulnerable. Being not so far away from the coastal area that is prone to strong hurricanes, it can be said that weather is one of the major risks and threats that the organization faces; expected frequency is on the order of twice in ten years. The lack of destruction of the organization implies that the level of exposure of Brandon Hospital is not as severe compared to the other organizations which are located closer to the Tampa Bay and the beach.

ii. Terrorism is another threat that Brandon Hospital faces. In the present day world, the heightened potential of terrorist attacks positions distinctive encumbrances on health care facilities and health care personnel. Hospitals and hospital personnel are nowadays obligated to be equipped to respond instantaneously to such events. Terrorism can be defined as the methodical employment of terror particularly as a way of intimidation and oppression. The eventual objective of terrorists might not be the maximum number of deaths, but to engender fear and cause disorder (Chung and Shannon, 2005).

In previous periods, terrorists might have depended predominantly on mechanical artillery to attain their objectives, but with the dawn of contemporary technology, they currently have a bigger selection of modalities to realize their purposes. There is amassing acknowledgment that biological, chemical, and nuclear weapons can be formed, implemented, and dispersed to a gullible population without considerable difficulty. These kinds of discharges might be unconcealed and theatrical, or clandestine and fear-inducing (Chung and Shannon, 2005). The main reason(s) why hospitals are susceptible to these kinds of attacks is because they harbor numerous individuals, and therefore be an area that can produce mass casualties, but also because they are a source of infectious agents. Biological weapons are created from either naturally arising infectious agents such as microbes or viruses or non-replicating venoms that are formed by living creatures comprising plant life, animals, and microorganisms. These microorganisms, infections, or venoms can be adjusted or weaponized to increase their poisonousness or virulence, and in so doing get the most out of incapacitation after exposure (Chung and Shannon, 2005).

Another aspect of terrorism is that of mass casualty -- this can come in the form of the annihilation of large public buildings. Brandon Regional Hospital and Brandon Hospital Annex is a large public building that sits over 74,600 feet. These are buildings and facilities that are largely susceptible to the threat of terrorism. As mentioned by the Chief Operations Officer of the hospital during the security survey, the facility or the hospital in general is designated as a public disaster area.

iii. Theft (Physical Loss and Data Loss)

Another major threat that Brandon Hospital faces is theft from the organization. The potential of theft includes not only physical assets (ranging from drugs to equipment), but also theft of data. Referring to the information provided in the security survey, the organization faces considerable risk in terms of theft. For example, it is mentioned that cash/monetary proceeds from sales are secured in the cafeteria back office. The night manager counts the funds and makes a nightly deposit at Bank of…

Sources used in this document:
References

Brandon Region Hospital. (2012). Evacuation plan.

Brandon Region Hospital. (2012). Risk management plan.

Chung, S., & Shannon, M. (2005). Hospital planning for acts of terrorism and other public health emergencies involving children. Archives of disease in childhood, 90(12), 1300-1307.

Code Green Networks. (2009). Protecting Healthcare Organizations from Patient Data Loss. Retrieved from: www.codegreennetworks.com/resources/downloads/wp_patient_dlp.pdf
Ernst & Young. (2011). Data loss prevention. Retrieved 24 May 2015 from: http://www.ey.com/Publication/vwLUAssets/EY_Data_Loss_Prevention/$FILE/EY_Data_Loss_Prevention.pdf
Moreilli, K. (2014). October notorious in Tampa Bay area's hurricane history. The Tampa Tribune. Retrieved from: http://tbo.com/october-notorious-in-tampa-bay-areas-hurricane-history-20141005/
Shimonski, J. (2002). Risk Assessment and Threat Identification. WindowSecurity.com. Retrieved 24 May 2015 from: http://www.windowsecurity.com/articles-tutorials/misc_network_security/Risk_Assessment_and_Threat_Identification.html
Tan, D. (2002). Quantitative Risk Analysis Step-By-Step. SANS Institute. Retrieved from: http://www.sans.org/reading-room/whitepapers/auditing/quantitative-risk-analysis-step-by-step-849
Cite this Document:
Copy Bibliography Citation

Related Documents

Risk Assessment Analysis of Phishing
Words: 741 Length: 2 Document Type: Research Paper

This means that you must train employees how to identify various forms of phishing. At the same time, you must implement some kind of security procedures that will place a restriction, on how personal information is distributed. For example, employees could be trained in spotting various kinds of fictitious emails. However, when they run across an email like that is requesting information, there would be a procedure where the

Risk Assessment Report
Words: 4539 Length: 17 Document Type: Term Paper

Risk Assessment at the Wal-Mart Stores Inc. Industry and company information Risk assessment System characterization Threat identification Vulnerability identification Control analysis Likelihood determination Impact analysis Risk determination Control recommendations Concluding remarks Bibliography (Annotated) The current economic climate is more challenging than ever and economic agents face incremental difficulties in registering profits through the serving of a population with a decreasing purchasing power. Nevertheless, in a context in which most economic agents register decreasing revenues, America's number one retailer -- Wal-Mart -- registers growing

Risk Assessment Is an Integral Aspect on
Words: 2820 Length: 10 Document Type: Essay

Risk Assessment is an integral aspect on any business irrespective of industry. Every business has some form of inherent risk embedded within its underlying business operations. This risk, through proper assessment can be minimized and practically prevented under certain conditions. Through proper risk assessments, businesses can abate the influences of danger that ultimately erodes both profitability, and reputation. In addition, risk assessments allow the company to reduce the prevalence of

Risk Assessments for Falls Risk
Words: 1509 Length: 5 Document Type: Essay

As the percentage of older Americans continues to increase, the need for timely and accurate assessment screens and the formulation of effective clinical interventions will become even more pronounced. Fortunately, the research also showed that there are a number of assessment tools that are available to facilitate the process, including sophisticated multifactor instruments with proven validity and reliability. One of the more important issues to emerge from the research

Risk Assessment Report of the
Words: 2612 Length: 9 Document Type: Assessment

Functional description The Public Health Informatics and Technology Program's IT system was developed by the Office of Surveillance, Epidemiology, and Laboratory Services (OSELS).The CDC division response for its deployment and maintenance is the Division of Informatics Research and Development (DIRD) whose role is to advance the frontiers of public health informatics by means of appropriate research and development. The DIRD division is to collaborate with the other members of the CDC

Risk Assessment for Gfi Group, Inc. Gfi
Words: 2070 Length: 7 Document Type: Essay

Risk Assessment for GFI Group, Inc. (GFI) RISK ASSESSMENT Company Network, Interconnection, and Communication Environment When it comes to the company network, GFI Group, Inc. (GFI) operates as a dealer brokerage company, which was discovered in the U.S. It is in network with over the counter (OTC) related securities and derivative products. The company mostly offers market data brokerage services, and analytics software merchandises to commercial and investment banks, insurance corporations, large businesses

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now