Preview

Analysis Mwthodology

Powerful Essays
Open Document
Open Document
2420 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Analysis Mwthodology
A Risk Assessment Methodology (RAM) for Physical Security
Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to help them decide how much security is needed at their facility. A risk assessment methodology has been refined by Sandia National Laboratories to assess risk at various types of facilities including US Mints and federal dams. The methodology is based on the traditional risk equation:
Risk = PA * (1 - PE) * C,
PA is the likelihood of adversary attack,
PE is security system effectiveness,
1 - PE is adversary success, and
C is consequence of loss to the attack.
The process begins with a characterization of the facility including identification of the undesired events and the respective critical assets. Guidance for defining a design basis threat is included, as well as for using the definition of the threat to estimate the likelihood of adversary attack at a specific facility. Relative values of consequence are estimated. Methods are also included for estimating the effectiveness of the security system against the adversary attack. Finally, risk is calculated. In the event that the value of risk is deemed to be unacceptable (too high), the methodology addresses a process for identifying and evaluating security system upgrades in order to reduce risk.
Risk assessment
Physical security
Vulnerability analysis
Security effectiveness
Consequence
Likelihood of attack
Note: Each critical infrastructure (CI) follows a RAM process developed specifically for that CI.
This white paper provides a general discussion of the RAM approach and does not address the differences between the different RAMs.
2
Analysis Methodology
An analysis methodology has been used to assess the vulnerability of physical protection systems for facilities. Figure 1 describes the order and sequence of the seven basic steps of the methodology.
1. Facility Characterization

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CJS 250 Appendix G

    • 603 Words
    • 3 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Risk Assesment and Mitigation Plan. (2006, July 28). Retrieved March 26, 2014, from Cd Lib Org: http://www.cdlib.org/services/project_planning/docs/templates/risk_assessment.doc.…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    The purpose of this risk assessment is to evaluate the adequacy of the Global Finance, Inc. security and network. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost effective safeguards to mitigate threats and associated exploitable vulnerabilities. Safeguards are security features and controls that, when added to or included…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Unit 6 Assignment 2

    • 878 Words
    • 4 Pages

    First, we can talk about the stake at risk and how important vulnerabilities are in the disaster scenarios taken into account, the outcome being a way to reduce the resulting risks.…

    • 878 Words
    • 4 Pages
    Good Essays
  • Good Essays

    of threats that can have adverse impacts on operations, assets, and individuals. Keeping up with…

    • 3838 Words
    • 17 Pages
    Good Essays
  • Better Essays

    real threats to be restrained, there can be times where the same analysis may be inactive…

    • 2625 Words
    • 19 Pages
    Better Essays
  • Good Essays

    Once you have identified the risks by marking out the hazards. You would than estimate the risk. Estimating the risk, is usually done by accessing the risk level from 1 to 5 (low, medium, high) 1 is means not very likely to happen which is a low risk, the number 3 on the scale is about in the middle lastly 5 is when it much more likely to be possible or likely will happen.…

    • 557 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    3. CRS Report for Congress, (2004). Order Code RL32561, Risk Management and Critical Infrastructure Protection retrieved from http://www.au.af.mil/au/awc/awcgate/crs/rl32561.pdf…

    • 951 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete situation and a recognized threat, it is also called a hazard. Quantitative risk assessment requires calculations of two components of risk, the magnitude of the potential loss, and the probabilit that the loss will occur. Acceptable risk is a risk that is understood and tolerated usually because the cost or difficulty of implementing an effective countermeasure for the associated vulnerability exceeds the expectation of loss.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    |Singapore, M. (2009, January). The Risk Management Association. A member driven profession. Retrieved from www.rmahq.org/ |…

    • 506 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    “Identify what you see as the main purpose of Security Management” and “Discuss what is meant by the statement that ‘Security measures must be commensurate with the threat’”.…

    • 1598 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    What if people lived in a world where there was no cultures, no religion, no languages, no races, a world where everything was the same? In the futuristic world of the Giver all the people wear graym with the same haircut and no colors. Although some people may claim the world in the fiction novel The Giver by Lois Lowry is a utopia, it is a dystopia because sameness means there is no diversity which takes away from being human. Although sameness solves many of this world’s problems, it is not worth giving up diversity. In the story, as Jonas continues with his training he starts a conversation with The Giver about sameness. The Giver says “It wasn’t practical so it became obsolete when we went sameness. (...) Trucks; buses, slowed them down.…

    • 264 Words
    • 2 Pages
    Good Essays