Corrections and Treatment

Only available on StudyMode
  • Download(s) : 224
  • Published : March 21, 2011
Open Document
Text Preview
A retail chain has asked an outside security consulting team to perform a Threat and Risk assessment for one of its branches. The consulting team has identified the following Threats and accompanying Risk levels for this particular store:

1. Fire (medium)
2. Internal theft (high)
3. Shoplifting (medium)
4. Burglary (high)
5. Bomb (low)

The retail chain has decided to respond to these Threats in the following manner:

For threat #1, management has decided to take no further precautions because the store is currently up to code and the insurance policy the company carries fully covers it in the event of fire.

For threat #2, management has decided to implement background checks for all new applicants and all employees must now have their bags and backpacks checked by security before exiting the store.

For threat #3, management has decided to add no additional security measures. Losses due to shoplifting are expected and have been included in the store’s budget.

For threat #4, management has installed a comprehensive alarm and surveillance system in all stores, with around-the-clock security monitoring. Now, break-ins at this store cannot occur without detection.

For threat #5, management intends to institute no countermeasures. With several other branches throughout the region, the company overall would suffer only minimal losses even if this threat were to materialize.

In the following table, identify the type of Risk Management Option (i.e. Eliminating Risk, Mitigating Risk, Transferring Risk, Spreading Risk, or Accepting Risk) the company has employed for each Threat. NOTE: Each of the five Risk Management Options is used ONLY once.

NOTE: Use the TAB KEY on your computer keyboard to move the CURSOR from one section to another. DO NOT USE THE ENTER KEY.

|Threat |Risk Management Option |...
tracking img