Appendix G
Security Assessment
Directions
Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.
Setting 1:Hospital
THREAT
RISK
COUNTERMEASURE
Probability
Criticality
Total
***Example:
Information theft
4
7
11
Employee screening, limited computer access, and computer monitoring
Stealing drugs or drug abuse
4
6
10
Written and system monitor of medication, check ins and outs with patients, and cameras where medication may be stored.
Sexual harassment
5
8
13
Cameras in all areas, notification of physical or sexual threat; limit of physical contact.
Hostage/ kidnapping
3
9
12
Monitoring of patients. Locks on doors; screening of patients, family, etc; cameras in all entrances; employee training.
Bomb Threat
2
9
11
Employees take calls seriously; monitor all information; secure all computer access; training and procedures.
Assault
2
4
6
Manage of personnel; record check in slips; secure all persons; guards visibility.
Setting 2: Airport
THREAT
RISK
COUNTERMEASURE
Probability
Criticality
Total
Terrorist attacks
8
10
18
Securing all entities, security and cameras around building, employee notifications, monitor flights and personnel, and evacuation methods.
Theft
5
5
10 Secure all computer information, id all guests, secure all baggage and persons,
Bomb Threat
2
9
11 Secure all machinery and chemicals, monitor and record all computers and calls, and secure the