Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Essay:
White House Security Plan
Threats and Risk Assessments
There are a variety of different threats posing various levels of risks to the White House and its workers and inhabitants. The risk of an actual penetration by a small group of terrorists or militants carries a fairly low risk, given current security procedures and personnel; a heavy artillery military attack is even less likely given national defense systems and the sheer geopolitical implications of such an act. Greater subterfuge is likely to be employed in any truly risky threat; hidden bomb attacks, biological or chemical attacks with timed detonators or active triggers must be carefully screened for, as these represent one of the greatest threats to White House security in terms of both their potential damage and the likelihood of such an attack being attempted due to potential anonymity and attacker distance.
There are also many non-intentional and human-based threats that affect the security and safety of the White House and those within its walls. A variety of natural disasters including potential fires, earthquakes, hurricanes, and even potential flooding could all occur, and although the risk level for most of these events is very low the results of any such disaster could be catastrophic without appropriate countermeasures and safety procedures in place (FEMA 2011). It is believed that proper procedures, evacuation plans, and safety measures exist for each of these contingencies at the current time, although a reassessment and revaluation of these procedures and safety implements would still be valuable (WhiteHouse 2011). Plane crashes and direct espionage are also threats that have elaborate contingency plans established (Douglass 1995).
Current Vulnerability Gaps
A major current vulnerability facing the white house is found in the sheer number of individuals that have access to various parts of the White House and its grounds (WhiteHouse 2011). Though there are security procedures in place to screen such individuals prior to their selection for White House positions and onsite security screenings to ensure unauthorized weapons and personnel are not permitted onto White House grounds, the threat of infiltration through direct espionage is still considerable. There do not appear to be any other major vulnerability gaps facing the White House at this time, as potential threats of many different types and mechanisms are often observed and eradicated long before they come within range of creating harm to the White House or anyone within its walls.
The White House grounds are patrolled and monitored by a variety of security personnel and technologies, not all of which are matters of public knowledge, but which provide very tight restrictions on access for both individuals and equipment (WHHA 2001; Douglass 1995). Other physical threats to the structure and inhabitants of the White House are mitigated by structural elements of the building, several emergency escape routes, and advanced warning systems that provide time for evacuation and preparation in the event of a natural disaster (WhiteHouse 2011). Aggression by authorized personnel remains one of the greatest physical threats.
Increases in the digital storage and transmission of information has profoundly changed the nature of information security as practiced in the White House, though certain protocols involving paper documents are still in effect (WHHA 2001). A variety of specifically-developed as well as more commonly available methods for protecting digital information are utilized to ensure the security of information at the White House, and information transmitted to or from White House computers and their devices (Russel & Gangemi 1991). Given the importance of much of the information created and transmitted to/from the White House information security is a top priority for White House officials and officers, and control of access to information is incredibly tight and restrictive (Russel & Gangemi 1991).
The security of certain individuals within the White House, most especially the President and his family, is also of central importance to security measures and practices at the White House. The personnel and technologies that monitor the White House grounds and surrounding environs are highly effective at dissuading, rooting out, and eliminating any threats to individuals within the White House (Douglass 1995). In addition, the Secret Service is tasked with the specific priority duty of protecting the lives of the President, his family, and other key individuals that are often found in the White House, and this organization has a very high success rate (though with some notable failures) in carrying out this task (WHHA 2001).
"White House Security Plan Threats And Risk" (2011, April 24) Retrieved December 2, 2016, from http://www.paperdue.com/essay/white-house-security-plan-threats-and-risk-50642
"White House Security Plan Threats And Risk" 24 April 2011. Web.2 December. 2016. <http://www.paperdue.com/essay/white-house-security-plan-threats-and-risk-50642>
"White House Security Plan Threats And Risk", 24 April 2011, Accessed.2 December. 2016, http://www.paperdue.com/essay/white-house-security-plan-threats-and-risk-50642
Risk and Insurance Management Risk is believed to be a newly coined word of assurance (for example, Ewald, 1991: 198). One of the broadly shared suppositions regarding insurance is that it spins around an instrumental concept of risk. Possibility and the amount of influence make up a technical concept of hazard/risk and hazard administration is chiefly worried about reviewing these possibilities and influences (for an overview see Gratt, 1987). For instance,
Small Business' Need for a CPA One of the critical investments a small business can make to mitigate loss and risk is hiring a CPA and putting that CPA on the 'management team.' As Wells notes in his groundbreaking research, "Denise, a bookkeeper for a small trucking firm in Birmingham, Alabama, wishes she had never heard of Ralph Summerford, CPA. Because of his thoroughness, Denise is facing several years in prison
With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by
Homeland Security Risk Management Risk Management in Homeland Security This paper provides a brief examination of the role of risk management within the homeland security operations. The discussion first addresses issues related to risk assessment, which is a necessary, prudent step for publicly funded activities, and particularly so given the national scope and the potential consumption of resources. The Strategic National Risk Assessment (SNRA) serves as a vehicle to link policy --
This was because they were seeing one of their primary competitors (Travelers) merging with Citicorp (which created a juggernaut of: insurance, banking and brokerage activities). At which point, executives at AIG felt that in order to: maintain their dominance in the industry and offer new products they should become involved in similar activities. The difference was that they would grow the company by expanding into areas that were considered
Database Security The focus of this study is that of database security. Databases and database technology are such that play critical roles in the use of computers whether it be in business, electronic commerce, engineering, medicine, genetics, law, education or other such entities requiring the use of computer technology. A database is quite simply a collection of data that is related such as a database containing customer information, supplier information, employee
UN Security Council Proliferation of chemical, biological and nuclear weapons to terrorist organizations is inarguably one of the greatest menaces threatening international peace and security today.[footnoteRef:1] Since the turn of the century, this sentiment has grown in strength across the world, and as a countermeasure to this threat, in 2004, the United Nations Security Council passed Resolution 1540 to combat the dangerous nexus between the spread of weapons of mass destruction