Risk Analysis and the Security Survey
The following risk analysis and security survey report will be centered on the hospital as an organization. Vulnerabilities can be classified as crime opportunities, opportunities for breaking rules and regulations, opportunities for profiting and also for loss. By definition, vulnerability can be a gap or a weakness inside a security program that might be exploited by opponents to acquire unlawful access. Vulnerabilities include procedural, human, structural, electronic as well as other elements that offer opportunities to damage assets (Vellani and Owles, 2007).
A vulnerability assessment can be classified as a systematic method utilized to evaluate an organization's security position, assess the efficiency of current security infrastructure, as well as, recognize security limitations. The basic approach of a Vulnerability Assessment (VA) first measures what precise assets require protection. Subsequently, VA recognizes the protection measures previously being used to protect those assets, as well as what limitations exist in their protection. Lastly, the VA evaluates the security program's efficiency against valid protection metrics and offers suggestions for improvements to those in charge of security. In essence, VA helps an organization's security managers in figuring out whether they need added security systems, tools upgrades, procedure and policy revisions, opportunities for training, along with requirements for manpower. VA recognizes security limitations that might be misused by an adversary to gain access to the organization's assets (Vellani and Owles, 2007).
An asset's vulnerability is established by its weaknesses in operational procedures and processes, weaknesses in physical security apparatus, as well as technical limitations that can be misused by opponents. Vulnerability assessments are utilized to recognize these limitations through a survey of security. A security survey therefore is a fact-finding procedure whereby the evaluation team collects information that mirrors the how, what, where, who, when, as well as, why of an existing security program. The goals of the security survey are to gauge the facility's vulnerabilities by calculating what opportunities are present to misuse security procedures and policies, equipment being used for physical security, as well as security personnel (Vellani and Owles, 2007).
Vulnerability and Threat Identification
Introduction of Organization
The following risk analysis and security survey is undertaken for Brandon Regional Hospital and Brandon Hospital Annex. Brandon Regional Hospital (BRA) is a fully equipped and staffed medical facility. The BRA has specialty services including the Heart & Vascular Center, the Women's Center, the Reflux Center, the Pediatric Center, the Behavioral Health Center, the Spine Center, the Orthopedic Center, and the Emergency Center. Brandon Hospital Annex conducts Human Resources and Employee Health and Education. The organization is located at Oakfield Drive in Brandon, Florida. The risk analysis and survey information was provided by Ms. Chris Taramassco, the Chief Operating Officer of the organization. The security survey was undertaken on a visit to the facilities; data gathered provided firsthand information as to how the security of the organization is arranged. In general, there are a number of risks that the Brandon Regional Hospital and Brandon Hospital Annex are vulnerable to, as partially revealed in the security survey and analysis report. However, the report will offer the top three threats to the organization. These can be described in the following section.
Brandon Hospital Risk Management
The risk management program instigated by Brandon Hospital aims to offer an incorporated and harmonized determination of risk management that acts in accordance with relevant standards. It also helps the facility to enhance the safety level for the patients by decreasing the incidences that create harm to visitors, patients, personnel; as well as the repute of the hospital and associated centers. Through the program, the hospital purposes to safeguard itself from negative outcomes of inadvertent losses associated to professional and general liability (Risk Management Plan, 2012). In relation to the privacy laws at the state and also at the federal level, the information of all patients involved is expected to be confidential and protected at all costs. Any information that is released to external sources or unauthorized individuals ought to be only sanctioned by the laws.
It is imperative to note that all facilities and organizations face a certain level of risk that is related and linked to different threats. These threats might come about as a result of accidents, natural events, and even premeditated acts, resulting in havoc and harm. Irrespective of the nature of the threat, the owners of the organization have a duty and obligation to minimize...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now