Verified Document

Threat And Vulnerability Assessment In Essay

Since access to the site is significantly restricted, the probability of external threat not highly likely. However, the fact that only two guards are stationed at the access gate, leaving the rest of the surrounding perimeter somewhat vulnerable, could provide more access to the site than is desirable. The building itself is, however protected by alarm systems, which contributes to a lower level of vulnerability. The vulnerability level is therefore set at "moderate," which amounts to 2. Probability refers to the likelihood that a negative event may occur. While external access and night access to the building is significantly restricted, internal threat as a result of grieved or greedy personnel members, or as a result of spy infiltration is somewhat likely. The probability level is therefore set at "high," which is 3.

It follows that the level of criticality is also set at "highly critical;" while no loss of life is likely, costly...

The criticality level is therefore 4.
The overall risk level is calculated at 24. To lower this risk level, some basic precautions and countermeasures can be implemented.

At the outer perimeter, more guards can be provided during the night shift. Several guards could be stationed along the entire perimeter of the building, rather than just at the gates. To mitigate the internal threat, personnel access to the building can be regulated by implementing a card or other identity measures. Personnel can also undergo training to emphasize the importance of loyalty and honesty. Regular interviews can also be held with personnel to determine their level of loyalty to the company, stress levels that could lead to disloyal or unethical practices, and to determine if further measures are necessary to help personnel function at their optimal level.

Cite this Document:
Copy Bibliography Citation

Related Documents

Iran Country Assessment Vulnerability Assessment
Words: 1513 Length: 4 Document Type: Research Paper

Iran Country Vulnerability Assessment Outlook Each country has extent of constraints during their development. Iran has suffered similar issues by virtue of being among the developing country. It has also been countries that require not only acquiring, but retaining its power to guard its resources. The country has also been surrounded by powerful governments of Iraq and Afghanistan which have been a threat to Iran. Iran's system of government is theocratic, meaning

Threat Assessment the Objective of
Words: 2120 Length: 5 Document Type: Essay

" (Vossekuil, Borum, Fein, and Reddy, 2008) Stated to be an example of inductive assessment strategy is that of profiling. Profiling involves a description of the 'typical perpetrator' being compiled through use of characteristics that previous perpetrators of that specific type of crime have met. This profile is then used as a template or prototype for comparison of individuals who are believed or suspected to be a potential perpetrator. In contrast,

Threat and How Is It
Words: 768 Length: 2 Document Type: Essay

Physical vulnerabilities, such as users who leave their systems running while still logged in can also create security concerns, even in the case of a secure system. While systems should have automatic log-outs after a specific period of time, it is impossible for a system to be totally secure if it is being used by an employee who does not follow proper security protocols. Question 4: Identify five (5) important

Risk and Vulnerability Analysis
Words: 692 Length: 3 Document Type: Research Paper

Threat Identification The threats How the threats are detected Ever since the September 11, 2001 terrorist attacks, businesses have had to critically rethink on the level of adequacy of their disaster recovery arrangements in relation to their business continuity plans as noted by Lam (2002,p.19). The September 11, 2001 tragedy effectively highlighted the importance for organizations to continue with their commercial operations even under the most exceptional of circumstance. My business which has

Vulnerability and Weakness of the
Words: 3719 Length: 11 Document Type: Term Paper

Still, embassy targeting is a very common practice used by terrorists as well. Despite the fact that they should be considered one of the most important institutions of a state abroad they are not exempted from threats such as terrorist acts. Moreover, the security level such a facility would imply does not detract terrorists and does not limit their actions. Thirdly, it must be taken into account the fact that

Threat Analysis for Al-Qaeda Is
Words: 2838 Length: 8 Document Type: Thesis

Tactics and Strategies Used by Al-Qaeda Al-Qaeda has come to rely on the suicide attack as its major terror tactic, which is not only terrifyingly effective but also most difficult to prevent. The reason for the success of the strategy is simple: any targeted killing has traditionally been difficult to carry out due to a basic human instinct of self-preservation and any terrorist used to prefer to escape unharmed while carrying

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now