Reference no: EM132403986
Security Risk Analysis Assignment -
AIM - To provide the security management professional with a methodology which they can use in their day-to- day security management activities in order to analyse security risk and set priorities for mitigation.
Unit Outcome 1.1 - Be able to carry out a facility characterisation.
Assessment Criteria -
1.1a. Produce a facility characterisation for a given organisation, facility or operation.
1.1b. Collect, collate and synthesise information relating to asset criticality and interdependencies.
Task 1.1 -
Developing your understanding of assets explained on Page 13-14 of the Unit Textbook, identify the core assets (tangible/intangible) in your organisation. Then analyse them in terms of:
Clusters (assets working together with critical interdependencies).
Relative criticality (i.e. putting aside the book value, are some assets more operationally critical than thers, for example at certain times of the day?)
Redundancy (is there back-up capacity or are there alternatives?)
External dependencies (are you critically dependent on external suppliers and what is their level of contingency?)
How the above points relate to the maintenance of operational continuity.
A comprehensive answer to this task will typically be in the region of 300-500 words.
Unit Outcome 1.2 - Be able to analyse security risk.
Assessment Criteria -
1.2a. Develop a methodology for a threat assessment.
1.2b. Critically evaluate methodologies to determine security risks to the candidate's organisation.
Task 1.2a -
A threat is a source of potential harm. In assessing a threat, it is useful to look at a range of factors, including the local criminal environment, potential adversaries, their motivation and determination, their actions and the targets to which they are attracted, crime facilitators etc.
Taking the examples of the intelligence-based threat assessment questions in the Unit Textbook and thinking of a threat context of your own, increase the asset analysis question set from 8 questions to 10 questions and the action analysis question set from 10 questions to 13.
Note: Be sure to also study the adversary question examples in the Unit Textbook and don't confuse these questions with those relating to asset and action.
Task 1.2b -
The Unit provides a description of a security risk analysis using two matrices to represent the point of intersection between the likelihood, impact and controllability of (or vulnerability to) risk.
First, using the ISMI methodology in the Unit, evidence your understanding of the process by filling in the gaps in the table opposite. (You will need good assimilation of the unit, including the case study beginning on Page 32).
Second, compare and contrast the ISMI methodology with the approach to risk management outlined in the API Security Vulnerability Assessment Guide (v2 2004), which can be found in the External Background Documents section of the Extranet Library.
Unit Outcome 1.3 - Be able to plan for security risk mitigation
Assessment Criteria
1.3a. Develop strategies for risk mitigation that can be adopted by the senior leadership team.
1.3b. Identify opportunities for integrated strategic risk analysis tools and templates.
1.3c. Produce tools for cross-functional involvement in the security risk analysis programme.
Task 1.3a -
Case Study - Billings Research (BR) is a laboratory complex based in the US state of Montana. The work of BR is considered by activists to be controversial and as such the facility is subject to a range of risks typically associated with activist actions.
The company uses a variety of risk mitigation techniques to manage security risk. For example, a contracted security guarding service provides round the clock security at the facility and also provides secure transportation and courier of materials between the facility and BR's various clients. For the present time, the security officers are unarmed, but there has been a discussion about arming guards in response to a small number of direct telephone threats made to senior staff at the facility. There has also been a discussion about augmenting the unarmed guarding force with an onsite quick reaction armed force, but for the time being the local sheriff's department is confident that it can provide the response necessary.
Data security is a primary concern at the site. Very sensitive personal medical information relating to hundreds of thousands of members of the public is held at the facility. Due to concerns about the security of sensitive medical data on mobile platforms, there is a blanket ban on issuing staff with laptops and company cell phones. All sensitive data is processed within the facility and is never allowed to leave in any form of the electronic storage device. Flash drives are banned, and all USB ports on desktop PCs have been removed. With the development of more reliable encryption products, this policy is under continual review.
In addition to guards, the site is extensively covered by CCTV (fixed cameras with video motion detection to detect perimeter abnormalities and assess alarms, and PTZ cameras to track and investigate suspicious activity). The site is enclosed by a 2.4m high chain-link fence, extending to 3m with the addition of coiled razor wire, bedded into V-shaped outriggers. Fibre optic cables run along the face of the fence to detect intrusion. The site is zoned and compartmentalised, and badge in/badge out access control operates across all zones.
After 9/11 there were concerns raised by some employees that the facility could be the target of terrorism. A consultant was called in to carry out a review and concluded that a terrorist attack by international terrorists was a very remote possibility. As such, anti-terrorism measures are focussed on issues such as postal devices sent by activists. There are no VBIED (car bomb) defences at the site as such a sophisticated attack is considered highly unlikely.
Analyse the above case study and using the template in the answer box, explain how BR practices each of the four elements of risk mitigation (represented by TEAR) and also explain how the concept of ALARP is put into practice at this site.
Note: A comprehensive answer to this task will typically be in the region of 300 words.
Task 1.3b -
The Unit advocates an integrated approach to security risk management. This is best achieved by senior management mandating the establishment of a cross-functional security risk management forum, under the leadership of the security management professional.
Aside from the security risk analysis methodology, the Unit presents two additional simple tools/templates that could further foster universal buy-in to the security risk analysis process. These are the Risk Management Action Plan and the Line Department Risk Register.
Familiarise yourself with these tools in the Unit Textbook and then from your experience/organisation, present another (different) tool/template of your choosing that can be used by the business in the security risk analysis/management process. If you don't have an example in your business, construct one.
Note: A good answer will explain how the tool or process is used, by whom, for what purpose, why, how successful or accurate it is etc. This is important as it constitutes the analytical element of this answer, and without this accompanying text, the assessor may not be able to make sense of the template/tool presented.
Task 1.3c -
You may have an idea of the book value of an asset, but what is the value of that asset to the business at any given time and what would be the potential cumulative consequential loss if stolen? For answers such as this, you will need to work closely with the asset custodians and users.
In the case of theft of critical copper wire delivering power to a manufacturing site where there is no alternative power supply, the direct losses associated with the replacement and reinstallation of the wire could cost tens of thousands of dollars.
But more critically, the associated operational downtime could have a crippling consequential impact in terms of lost business.
Specifically, what kinds of consequential losses would have to be taken into consideration in the analysis?
Attachment:- Security Risk Analysis Assignment File.rar