Threat And Vulnerability Assessment In Essay

PAGES
2
WORDS
620
Cite

Since access to the site is significantly restricted, the probability of external threat not highly likely. However, the fact that only two guards are stationed at the access gate, leaving the rest of the surrounding perimeter somewhat vulnerable, could provide more access to the site than is desirable. The building itself is, however protected by alarm systems, which contributes to a lower level of vulnerability. The vulnerability level is therefore set at "moderate," which amounts to 2. Probability refers to the likelihood that a negative event may occur. While external access and night access to the building is significantly restricted, internal threat as a result of grieved or greedy personnel members, or as a result of spy infiltration is somewhat likely. The probability level is therefore set at "high," which is 3.

It follows that the level of criticality is also set at "highly critical;" while no loss of life is likely, costly...

...

The criticality level is therefore 4.
The overall risk level is calculated at 24. To lower this risk level, some basic precautions and countermeasures can be implemented.

At the outer perimeter, more guards can be provided during the night shift. Several guards could be stationed along the entire perimeter of the building, rather than just at the gates. To mitigate the internal threat, personnel access to the building can be regulated by implementing a card or other identity measures. Personnel can also undergo training to emphasize the importance of loyalty and honesty. Regular interviews can also be held with personnel to determine their level of loyalty to the company, stress levels that could lead to disloyal or unethical practices, and to determine if further measures are necessary to help personnel function at their optimal level.

Cite this Document:

"Threat And Vulnerability Assessment In" (2012, August 17) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/threat-and-vulnerability-assessment-in-75190

"Threat And Vulnerability Assessment In" 17 August 2012. Web.19 April. 2024. <
https://www.paperdue.com/essay/threat-and-vulnerability-assessment-in-75190>

"Threat And Vulnerability Assessment In", 17 August 2012, Accessed.19 April. 2024,
https://www.paperdue.com/essay/threat-and-vulnerability-assessment-in-75190

Related Documents

Vulnerability Assessment The terrorist incident in New York on September 11, 2001 woke many individuals and organizations to the realities of vulnerabilities within the airline industry. The particular problems seemed to be that crucial training for individuals who wished to work as commercial airline pilots had very little monitoring. Of course, security on flights was the most critical oversight as people within the industry believed that inflight incidents would not happen.

" (Vossekuil, Borum, Fein, and Reddy, 2008) Stated to be an example of inductive assessment strategy is that of profiling. Profiling involves a description of the 'typical perpetrator' being compiled through use of characteristics that previous perpetrators of that specific type of crime have met. This profile is then used as a template or prototype for comparison of individuals who are believed or suspected to be a potential perpetrator. In contrast,

Iran Country Vulnerability Assessment Outlook Each country has extent of constraints during their development. Iran has suffered similar issues by virtue of being among the developing country. It has also been countries that require not only acquiring, but retaining its power to guard its resources. The country has also been surrounded by powerful governments of Iraq and Afghanistan which have been a threat to Iran. Iran's system of government is theocratic, meaning

According to an article entitled "Three Vulnerability Assessment Tools Put to the Test" Vulnerability assessment systems scan operating systems and applications for potential problems, such as the use of default passwords or configurations and open ports. This can give administrators a head start in fixing problems and will, hopefully, let IT organizations more effectively beat bad guys to the punch." The above factors are only true when vulnerability systems find all

Risk Assessment and Analysis
PAGES 15 WORDS 4889

Risk Analysis and the Security Survey The following risk analysis and security survey report will be centered on the hospital as an organization. Vulnerabilities can be classified as crime opportunities, opportunities for breaking rules and regulations, opportunities for profiting and also for loss. By definition, vulnerability can be a gap or a weakness inside a security program that might be exploited by opponents to acquire unlawful access. Vulnerabilities include procedural, human,

Threat and How Is It
PAGES 2 WORDS 768

Physical vulnerabilities, such as users who leave their systems running while still logged in can also create security concerns, even in the case of a secure system. While systems should have automatic log-outs after a specific period of time, it is impossible for a system to be totally secure if it is being used by an employee who does not follow proper security protocols. Question 4: Identify five (5) important