Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment

Using the resource link below and others research how a risk assessment methodology process can be used to assess risk at a maximum security facility. Write a minimum of 1 page (do not count the abstract and reference page).

Add references (Citations)

OVERVIEW OF RISK ASSESSMENT METHODS

The following methods can be used to do a risk assessment:

• Use a what-if analysis to identify threats and hazards. What-if questions are asked about what could go wrong and about what would happen if things do go wrong. This type of analysis is a brainstorming activity and is carried out by people who have knowledge about the areas, operations, and processes that may be exposed to hazardous events and conditions.

• Use a checklist of known threats and hazards to identify your threats and hazards. The value of this type of analysis depends upon the quality of the checklist and the experience of the user.

• Use a combination of checklists and what-if analysis to identify your threats and hazards. Checklists are used to ensure that all relevant what-if questions are asked and discussed, and to encourage a creative approach to risk assessment.

• Use a hazard and operability study (HAZOP) to identify your threats and hazards. If you need to do a thorough analysis, this method is for you. However, it requires strong leadership and is costly and time consuming. It also assumes that you have a very knowledgeable interdisciplinary team available to you, one with detailed knowledge about the areas, operations, and processes that may be exposed to hazardous events and conditions.

• Use a failure mode and effect analysis (FMEA) to identify potential failures and to figure out what effect failures would have. This method begins by selecting a system for analysis and then looks at each element within the system. It then tries to predict what would happen to the system as a whole when each element fails. This method is often used to predict hardware failures and is best suited for this purpose.

• Use a fault tree analysis (FTA) to identify all the things that could potentially cause a hazardous event. It starts with a particular type of hazardous event and then tries to identify every possible cause.

The above is based on NFPA 1600 2007 Annex A.5.3.1.

OVERVIEW OF RISK ASSESSMENT STEPS

Comprehensive risk assessments:

• Identify the range of hazards, threats, or perils:

• Identify the hazards, threats, or perils that impact or might impact your organization.

• Identify the hazards, threats, or perils that impact or might impact your infrastructure.

• Identify the hazards, threats, or perils that impact or might impact the surrounding area.

• Determine the potential impact of each hazard, threat, or peril by:

• Estimating the relative severity of each hazard, threat, or peril.

• Estimating the relative frequency of each hazard, threat, or peril.

• Estimating the vulnerability to each hazard, threat, or peril.

• Estimate how vulnerable your people are to each hazard, threat, or peril.

• Estimate how vulnerable your operations are to each hazard, threat, or peril.

• Estimate how vulnerable your property is to each hazard, threat, or peril.

• Estimate how vulnerable your environment is to each hazard, threat, or peril.

• Categorize each hazard, threat, or peril according to how severe it is, how frequently it occurs, and how vulnerable you are.

• Develop strategies to deal with the most significant hazards, threats, or perils.

• Develop strategies to prevent hazards, threats, or perils that impact or might impact your organization and its people, operations, property, and environment.

• Develop strategies to mitigate hazards, threats, or perils that impact or might impact your organization and its people, operations, property, and environment.

• Develop strategies to prepare for hazards, threats, or perils that impact or might impact your organization and its people, operations, property, and environment.

• Develop strategies to respond to hazards, threats, or perils that impact or might impact your organization and its people, operations, property, and environment.

• Develop strategies to recover from hazards, threats, or perils that impact or might impact your organization and its people, operations, property, and environment.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92646426
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

A for which hypervisors does kali linux offer custom

a. For which hypervisors does Kali Linux offer custom images? What tools must be added to a VirtualBox Kali Linux VM to provide proper integration with the host machine? b. What hypervisor comes already installed in Kali ...

Question answer both question with minimum 150 words each

Question: Answer both question with minimum 150 words each. Provide examples and references. 1. Data Anomalies - Explain in your own words using tables from your lab project. Also describe how such anomalies could be pre ...

Suppose a program has a button with the caption quit

Suppose a program has a button with the caption "Quit" Suppose also that Name property of this button is btnQuit. Write a btnQuit_Click event precede that gives the user a second chance before ending the program. The prt ...

A video movie store owner finds that 30 of the customers

A video movie store owner finds that 30% of the customers entering the store ask an assistant for help and that 20% of the customers make a purchase before leaving. It is also found that 15% of all customers both ask for ...

Compare remote authentication dial-in user service radius

Compare Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access-Control System Plus (TACACS+).

You randomly sample 50 theaters in the united states you

You randomly sample 50 theaters in the United States. You ask those theaters how much they charge for a large popcorn, and you get a sample mean of $6. Then, you make confidence interval using this data with the lower li ...

The demand for salt is relatively price inelastic while the

The demand for salt is relatively price inelastic, while the demand for pretzels is relatively price elastic. How can you best explain why and elaborate your answer.

Determine the mass of the water by using the waters density

Determine the mass of the water by using the water's density (specific to the initial temperature) and the volume of the water. Remember,  density = mass/volume . You can look up the density of the water at your specific ...

Questionhow can you start business by mobile application

Question How can you start business by Mobile Application Development ? Discuss the testing process of Mobile Applications in detail ? List important steps for publishing an app in the Target Market ?

In c languageread a integer number which has 2 digits after

In C language: Read a integer number which has 2 digits after the decimal point. The number also has at least 6 digits the decimal point. Extract all digits at even positions from before the decimal point. Print them in ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As