Determine the potential impact of each hazard or threat

Assignment Help Computer Engineering
Reference no: EM131818063

Assignment

Using the resource link below and others research how a risk assessment methodology process can be used to assess risk at a maximum security facility. Write a minimum of 1 page (do not count the abstract and reference page).

Add references (Citations)

OVERVIEW OF RISK ASSESSMENT METHODS

The following methods can be used to do a risk assessment:

• Use a what-if analysis to identify threats and hazards. What-if questions are asked about what could go wrong and about what would happen if things do go wrong. This type of analysis is a brainstorming activity and is carried out by people who have knowledge about the areas, operations, and processes that may be exposed to hazardous events and conditions.

• Use a checklist of known threats and hazards to identify your threats and hazards. The value of this type of analysis depends upon the quality of the checklist and the experience of the user.

• Use a combination of checklists and what-if analysis to identify your threats and hazards. Checklists are used to ensure that all relevant what-if questions are asked and discussed, and to encourage a creative approach to risk assessment.

• Use a hazard and operability study (HAZOP) to identify your threats and hazards. If you need to do a thorough analysis, this method is for you. However, it requires strong leadership and is costly and time consuming. It also assumes that you have a very knowledgeable interdisciplinary team available to you, one with detailed knowledge about the areas, operations, and processes that may be exposed to hazardous events and conditions.

• Use a failure mode and effect analysis (FMEA) to identify potential failures and to figure out what effect failures would have. This method begins by selecting a system for analysis and then looks at each element within the system. It then tries to predict what would happen to the system as a whole when each element fails. This method is often used to predict hardware failures and is best suited for this purpose.

• Use a fault tree analysis (FTA) to identify all the things that could potentially cause a hazardous event. It starts with a particular type of hazardous event and then tries to identify every possible cause.

The above is based on NFPA 1600 2007 Annex A.5.3.1.

OVERVIEW OF RISK ASSESSMENT STEPS

Comprehensive risk assessments:

• Identify the range of hazards, threats, or perils:

• Identify the hazards, threats, or perils that impact or might impact your organization.

• Identify the hazards, threats, or perils that impact or might impact your infrastructure.

• Identify the hazards, threats, or perils that impact or might impact the surrounding area.

• Determine the potential impact of each hazard, threat, or peril by:

• Estimating the relative severity of each hazard, threat, or peril.

• Estimating the relative frequency of each hazard, threat, or peril.

• Estimating the vulnerability to each hazard, threat, or peril.

• Estimate how vulnerable your people are to each hazard, threat, or peril.

• Estimate how vulnerable your operations are to each hazard, threat, or peril.

• Estimate how vulnerable your property is to each hazard, threat, or peril.

• Estimate how vulnerable your environment is to each hazard, threat, or peril.

• Categorize each hazard, threat, or peril according to how severe it is, how frequently it occurs, and how vulnerable you are.

• Develop strategies to deal with the most significant hazards, threats, or perils.

• Develop strategies to prevent hazards, threats, or perils that impact or might impact your organization and its people, operations, property, and environment.

• Develop strategies to mitigate hazards, threats, or perils that impact or might impact your organization and its people, operations, property, and environment.

• Develop strategies to prepare for hazards, threats, or perils that impact or might impact your organization and its people, operations, property, and environment.

• Develop strategies to respond to hazards, threats, or perils that impact or might impact your organization and its people, operations, property, and environment.

• Develop strategies to recover from hazards, threats, or perils that impact or might impact your organization and its people, operations, property, and environment.

Reference no: EM131818063

Questions Cloud

Processability of a pediatric informed consent document : "Improving The Readability and Processability of a Pediatric Informed Consent Document," published in Archives of Pediatric and Adolescent Medicine
Determine the specific characteristics and success factors : Determine the specific characteristics and success factors that will make the IT department in your company more successful with its projects.
Would you tell the patient about the medication : -You are administering hydromorphone to a patient. The patient asks you what you are administering. Would you tell the patient about the medication?
Mouth piercings may cause gums to recede : "Mouth Piercings May Cause Gums to Recede" reported in 2005 that "researchers at Ohio State University looked at 58 young adults with an average
Determine the potential impact of each hazard or threat : Determine the potential impact of each hazard, threat, or peril by: Estimating the relative severity of each hazard, threat, or peril.
Explain why that view may be preferred in your practice : Identify whether your chosen theory or model falls within the totality or simultaneity paradigm and explain why that view may be preferred in your practice.
Examine critically the health of the economy : Examine critically the health of the economy as a whole through the analysis of major economic variables and advise on likely policy alternatives
Painkillers safety doubts : "Painkillers' Safety Doubts" warns that "smokers in Norway who took such drugs [as Advil, Motrin and Aleve] for at least six months
How much manufacturing overhead was allocated to the job : On January 31, job 300 was completed. It required 12 machine hours to produce. How much manufacturing overhead was allocated to the job

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd