Verified Document

Threat And Vulnerability Assessment In Essay

Since access to the site is significantly restricted, the probability of external threat not highly likely. However, the fact that only two guards are stationed at the access gate, leaving the rest of the surrounding perimeter somewhat vulnerable, could provide more access to the site than is desirable. The building itself is, however protected by alarm systems, which contributes to a lower level of vulnerability. The vulnerability level is therefore set at "moderate," which amounts to 2. Probability refers to the likelihood that a negative event may occur. While external access and night access to the building is significantly restricted, internal threat as a result of grieved or greedy personnel members, or as a result of spy infiltration is somewhat likely. The probability level is therefore set at "high," which is 3.

It follows that the level of criticality is also set at "highly critical;" while no loss of life is likely, costly...

The criticality level is therefore 4.
The overall risk level is calculated at 24. To lower this risk level, some basic precautions and countermeasures can be implemented.

At the outer perimeter, more guards can be provided during the night shift. Several guards could be stationed along the entire perimeter of the building, rather than just at the gates. To mitigate the internal threat, personnel access to the building can be regulated by implementing a card or other identity measures. Personnel can also undergo training to emphasize the importance of loyalty and honesty. Regular interviews can also be held with personnel to determine their level of loyalty to the company, stress levels that could lead to disloyal or unethical practices, and to determine if further measures are necessary to help personnel function at their optimal level.

Cite this Document:
Copy Bibliography Citation

Related Documents

Vulnerability Assessment the Terrorist Incident in New
Words: 660 Length: 2 Document Type: Research Paper

Vulnerability Assessment The terrorist incident in New York on September 11, 2001 woke many individuals and organizations to the realities of vulnerabilities within the airline industry. The particular problems seemed to be that crucial training for individuals who wished to work as commercial airline pilots had very little monitoring. Of course, security on flights was the most critical oversight as people within the industry believed that inflight incidents would not happen.

Threat Assessment the Objective of
Words: 2120 Length: 5 Document Type: Essay

" (Vossekuil, Borum, Fein, and Reddy, 2008) Stated to be an example of inductive assessment strategy is that of profiling. Profiling involves a description of the 'typical perpetrator' being compiled through use of characteristics that previous perpetrators of that specific type of crime have met. This profile is then used as a template or prototype for comparison of individuals who are believed or suspected to be a potential perpetrator. In contrast,

Iran Country Assessment Vulnerability Assessment
Words: 1513 Length: 4 Document Type: Research Paper

Iran Country Vulnerability Assessment Outlook Each country has extent of constraints during their development. Iran has suffered similar issues by virtue of being among the developing country. It has also been countries that require not only acquiring, but retaining its power to guard its resources. The country has also been surrounded by powerful governments of Iraq and Afghanistan which have been a threat to Iran. Iran's system of government is theocratic, meaning

Threats to Online Businesses the
Words: 2846 Length: 11 Document Type: Term Paper

According to an article entitled "Three Vulnerability Assessment Tools Put to the Test" Vulnerability assessment systems scan operating systems and applications for potential problems, such as the use of default passwords or configurations and open ports. This can give administrators a head start in fixing problems and will, hopefully, let IT organizations more effectively beat bad guys to the punch." The above factors are only true when vulnerability systems find all

Risk Assessment and Analysis
Words: 4889 Length: 15 Document Type: Term Paper

Risk Analysis and the Security Survey The following risk analysis and security survey report will be centered on the hospital as an organization. Vulnerabilities can be classified as crime opportunities, opportunities for breaking rules and regulations, opportunities for profiting and also for loss. By definition, vulnerability can be a gap or a weakness inside a security program that might be exploited by opponents to acquire unlawful access. Vulnerabilities include procedural, human,

Threat and How Is It
Words: 768 Length: 2 Document Type: Essay

Physical vulnerabilities, such as users who leave their systems running while still logged in can also create security concerns, even in the case of a secure system. While systems should have automatic log-outs after a specific period of time, it is impossible for a system to be totally secure if it is being used by an employee who does not follow proper security protocols. Question 4: Identify five (5) important

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now