![]() In addition, the type of terrorist act may vary based on the potential adversary and the method of attack most likely to be successful for a given scenario. For example, a facility that utilizes heavy industrial machinery will be at higher risk for serious or life-threatening job related accidents than a typical office building.įor terrorist threats, the attractiveness of the facility as a target is a primary consideration. The type of assets and/or activity located in the facility will also relate directly to the likelihood of various types of accidents. In addition, the type of assets and/or activity located in the facility may also increase the target attractiveness in the eyes of the aggressor. For criminal threats, the crime rates in the surrounding area provide a good indicator of the type of criminal activity that may threaten the facility. For natural threats, historical data concerning frequency of occurrence for given natural disasters such as tornadoes, hurricanes, floods, fire, or earthquakes can be used to determine the credibility of the given threat. The assessment should examine supporting information to evaluate the relative likelihood of occurrence for each threat. The ISC standard only addresses man-made threats, but individual agencies are free to expand upon the threats they consider. ![]() A threat assessment considers the full spectrum of threats (i.e., natural, criminal, terrorist, accidental, etc.) for a given facility/location. The first step in a risk management program is a threat assessment. The tornado damaged Cash America Building in Fort Worth, TX Landlords who desire to lease space to federal government agencies should implement the ISC standard in the design of new facilities and/or the renovation of existing facilities. A variety of mathematical models are available to calculate risk and to illustrate the impact of increasing protective measures on the risk equation."įacility owners, particularly owners of public facilities, should develop and implement a security risk management methodology which adheres to the Interagency Security Committee (ISC) standard while also supporting the security needs of the organization. The objective of risk management is to create a level of protection that mitigates vulnerabilities to threats and the potential consequences, thereby reducing risk to an acceptable level. "Risk is a function of the values of threat, consequence, and vulnerability. The federal government has implemented The Risk Management Process for Federal Facilities: An Interagency Security Committee Standard which states, Regardless of the nature of the threat, facility owners have a responsibility to limit or manage risks from these threats to the extent possible. ![]() These threats may be the result of natural events, accidents, or intentional acts to cause harm. All facilities face a certain level of risk associated with various threats.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |