Appendix G
Security Assessment
Directions
Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.
Setting 1: Hospital
| | | |
|THREAT |RISK |COUNTERMEASURE |
| |Probability |Criticality |Total | |
|Example: | | | | |
|Information theft |4 |7 |11 |Employee screening, limited computer |
| | | | |access, and computer monitoring |
|Bomb threats |4 |4 |8 |Take the call seriously and get as |
| | | | |much of info as you could to give to |
| | | | |the local police. |
|Physical assault on the staff members|6 |6 |12 |Have another