Consider the vulnerability gaps associated with the chosen


Use the organization you selected in Week One.

Complete the Week Two section of the Security Assessment Worksheet.

Write a 1,050- to 1,400-word paper that discusses how security officials determine vulnerabilities to natural, human-made, and technological threats. Include the following in your paper:

Vulnerabilities associated with informational, technological, natural, and human-made threats

Vulnerabilities associated with personnel and work behaviors

Transportation vulnerabilities

Socio-economic and criminal activity factors associated with the environment surrounding the area

Vulnerabilities associated with neighboring businesses

The completed Week Two section of the Security Assessment Worksheet, submitted as an appendix in the paper

Format your paper consistent with APA guidelines.

Security Assessment Worksheet

Instructions

The Security Assessment Worksheet is designed to identify individual threats specific to your organization of choice. This worksheet will be submitted as an appendix with your Individual Assignments in Weeks One, Two, and Three. See p. 2 for an example and a blank matrix to complete.

Weekly Breakdown:

One: Threat and Risk Assessment Assignment

Threats should include actions that cause immediate or impending damage. Risk is estimated by allocating a probability score on a scale from 1 to 10, where 1 represents a threat that is least likely to occur and 10 represents a threat that is most likely to occur.

Criticality is estimated on a similar scale, where a score of 1 represents a threat that causes the least damage and 10 represents a threat that causes the most damage.

Add the two scales to get the estimated risk score. Upon completion, the ranking score is listed numerically where 1 represents the threat with the highest risk, followed by 2 representing the second highest risk score, and so on until all threats are ranked in order from highest risk to lowest risk.

• Fill in the name of the organization you have chosen.

• List threats specific to the organization

• Add risk scores and rankings with scores specific to the threats.

Two: Vulnerability Assignment

• Consider the vulnerability gaps associated with the chosen organization; these include vulnerabilities associated with crime trends, terrain, geographical location, weather patterns, and so on.

• List current vulnerabilities under the Vulnerabilities column.

• Submit the Security Assessment Worksheet as an appendix to the Week Two assignment.

Three: Managing Vulnerabilities and Applying Countermeasures

• Apply countermeasures to prevent or mitigate the risk and vulnerability associated with each threat.

• List countermeasures and the estimated cost under the Countermeasures & Cost column.

• Submit the Security Assessment Worksheet as an appendix to the Week Three assignment.

Solution Preview :

Prepared by a verified Expert
Operation Management: Consider the vulnerability gaps associated with the chosen
Reference No:- TGS02890363

Now Priced at $40 (50% Discount)

Recommended (91%)

Rated (4.3/5)