Preview

Vulnerability Assesment

Powerful Essays
Open Document
Open Document
1727 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Vulnerability Assesment
Pick three locations, events or individuals in your location (county, city or state) and complete a 6 - 8 page assessment of their vulnerabilities and threats, putting their security in order of priority, explaining and defending your choices.

Terrorism vulnerability assessments were created to criticize any “Achilles’ heel” in a security system that can be exploited by anyone willing to do harm to the location, an individual, or coordinated event. It assesses the weaknesses of facilities across a wide range of possible threats or hazards and creates a basis for determining physical and operational improvement measures to assure their protection. It administers both to new construction programming and design and to existing site management and restorations over the service life of a structure.

The helpful outcome of a vulnerability assessment is the task of a vulnerability rating of all appropriate aspects of building operations and systems to the clear threats for the specific facility. As with safeguard priority and threat ratings, any vulnerability can be either set as high, medium or low. High Vulnerability: One or more significant weaknesses have been identified that make the facility highly susceptible to an attack. Medium Vulnerability: A weakness has been identified that makes the facility somewhat susceptible to a terrorist or hazard; and finally Low Vulnerability: A minor weakness has been identified that slightly increases the susceptibility of the facility to a terrorist or hazard. (Baker, 2005)

Many institutions have undergone a workplace risk, threat and vulnerability assessments in the past to maintain their systems and businesses open and secure for the public. Although there are multiple different commercial and government methodologies in use today, there is currently no single reference that defines what vulnerability assessment methodology, otherwise known as “VAM”, is most suitable for specific types of assets in the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    4. When you assemble all of the “1” and “2” and “3” risk impact/risk factor values to the identified risk, threats, and vulnerabilities, how did you prioritize the “1”, “2”, and “3” risk elements? What would you say to the executive management in regards to your final recommended prioritization?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    pm 586 week 5

    • 428 Words
    • 3 Pages

    A risk assessment is needed to be able to identify the potential of each risk, the likelihood, the impact and the detection for each risk event. “To determine whether the identified risks could impact the success of the project, each risk was given a score of either 1 (very low), 2 (Low), 3 (Moderate), 4 (High), and 5 (Very High) in the areas of likelihood of risk occurring and risk impact on the project. The detection difficulty was scored using a scale ranging from 1 (no warning time), 2 (low warning time), 3 (moderate warning time), 4 (high warning time), and 5 (extremely high warning time). A higher score provides more time to identify and mitigate or respond to the issue.”…

    • 428 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    3. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. Why is risk mitigation and filling in critical security gaps an important next step after the security assessment is performed?…

    • 960 Words
    • 4 Pages
    Good Essays
  • Good Essays

    9/11 Research Paper

    • 1137 Words
    • 5 Pages

    The fire that was created at the World Trade Center was far greater than anyone would have anticipated and, “Despite the gravity of these doubts, the evacuation policies at the trade center assumed that the towers were sturdy and fire-resistant,” (Dwyer and Flynn 69). Considering the fact that many buildings codes were not a requirement for the World Trade Center due to its complex structure, not fireproofing the towers became more acceptable, especially because no one had thought that the towers would be brought down by a fire. After the 9/11 terrorist attack, many building designs were modified to become safer because the International Buildings Safety Codes adapted their codes in order to keep all buildings safe in case of a fire occurring. According to International Codes, as a result of the 9/11 attack, there have been some changes made to their code. Some of these changes include having a higher standard for fire resistance in high-rise buildings more than 420 feet tall and robust fire proofing for buildings more than 75 feet tall, which will be less likely to be dislodged by impacts or explosions. As a result of these changes to international building codes, there have been many preventative measures taken and it has had a major impact in making sure that more survive situations similar to the 9/11 terrorist…

    • 1137 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Facility owners, particularly owners of public facilities, should develop and implement a security risk management methodology which adheres to the Interagency Security Committee (ISC) standard while also supporting the security needs of the organization as a whole. The first action you need to take is a threat assessment before anything. The first step in a risk management program is a threat assessment. A threat assessment considers the full spectrum of threats (i.e., natural, criminal, terrorist, accidental, etc.) for a given facility/location. The ISC standard only addresses man-made threats, but individual agencies are free to expand upon the threats they consider. The assessment should examine supporting information to evaluate the relative likelihood of occurrence for each threat ("Threat/vulnerability Assessments And Risk Analysis",…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Earthquakes can damage buildings by the shaking itself or by the ground beneath them settling to a different level than it was before the earthquake. This must be the first vulnerability that we will address for this category. A serious earthquake can destroy the building, produce flooding, and cause fire, etc… This will end client services within the building until the damage has been addressed. A fire can cause severe damage to the facility and equipment halting services provided to the clients. Tornados, floods, landslides, and hurricanes have the ability to damage the facility and equipment which would cause an inability for employees to perform their jobs and cause a disruption to the services provided to the…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC363 Assignment 3

    • 586 Words
    • 2 Pages

    At its core, the purpose of a risk assessment is identifying and evaluating risks that may potentially have a negative impact on an organization. It can help management understand the impact in terms of costs to the organization or the severity of a loss depending on the methodology used to conduct the risk assessment. The goal is to provide sound recommendations based on the risk assessment to help maintain data confidentiality, integrity and vulnerability while ensuring functionality and usability. Based on the results, management can make more informed decisions about what resources to protect, how to protect them and understand the potential costs and impact. Once the purpose of the risk assessment is understood, defining the scope is next.…

    • 586 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    NT2580 Graded Assignments

    • 5288 Words
    • 22 Pages

    I have correctly matched all the risks or threats within the seven domains of a typical IT infrastructure with the solutions and preventative actions.…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Good Essays

    The following paper discusses the risk assessment process while explaining the framework, how each phase interrelates, and why the framework is so important in assisting with the risk assessment process. The paper will also discuss some of the innovations that have occurred over the last several years.…

    • 823 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

     I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    II. THEMATIC STATEMENT: Today, the state of our nation’s infrastructure is in decline. Lives are being taken and people are being injured. Our economy is suffering for it and our future is threatened. Most causes are preventable and we must become informed so we know how to respond to this serious public safety issue.…

    • 2026 Words
    • 9 Pages
    Best Essays
  • Better Essays

    This quote explores the notion of jumping into the unknown, believing in being worthy and having enough, and having the courage and bravery to step out of line and be different and unique. Jumping into the unknown and stepping out of comfort zones are one of the fears that all are afraid of. The possibility of the future and the consequences that may follow brings the imagined uneasiness, pain and suffering. The pain of loss and change, going into a place of complete darkness where no light can shine to give relief, makes all feel vulnerable, small, and fragile and the thought where everybody is better is very daunting. Being different where everyone else is the same is like being the white in the black or the black in the white. Feeling ashamed…

    • 1587 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Terrorist Funding

    • 536 Words
    • 3 Pages

    References: 1. Oliver, W M., Combs, C.C., Poland, J.M., Fagin, J.A. (2007) Homeland Security: Responding to the Threat. Pearson Education Inc.…

    • 536 Words
    • 3 Pages
    Good Essays