Risk Assessment - threat identification and rating; asset value assessment; vulnerability assessment
Risk assessment refers to the process of identifying the hazards that might occur, as well as, analyzing its consequences in case it happens. In as much as the five steps and their tasks are helpful in risk assessment when a terror attack on a building occurs it might not be applicable to
assessing all threats.
However, the guide provides the building officials with the appropriate methodologies and steps for carrying out a risk assessment (Wheeler, 2011). Since there are different threats, the obligation lies to the people making decisions based on the threat where each wish to safeguard against the building. More so, the decision makers should select the most cost effective and practical mitigation processes. The article discusses five steps to risk assessment: threat identification and rating; asset value assessment; vulnerability assessment; risk assessment; and considering mitigation options.
[...] The next step involves determining the core infrastructure of the building. This assists in valuing and identifying rank infrastructure such as the number of people who might get killed or injured, among others. Determining the asset value rating: it is essential to assign a value after analyzing the building infrastructure and core functions. The manager should consider the impacts of a damage or loss after an attack to identify the vulnerability rating. Vulnerability assessment This step involves conducting a vulnerability assessment relating to the assets likely to undergo damage after an attack. [...]
[...] E., Matalucci, R. V., & O'Connor, S. L. (2007). Security risk assessment and management: A professional practice guide for protecting buildings and infrastructures. Hoboken, N.J: Wiley. Ostrom, L. T., & Wilhelmsen, C. A. (2012). Risk assessment: Tools, techniques, and their applications. Hoboken, New Jersey: Wiley. [...]
[...] This involves methodologies such as Data Gap analysis, Tiered Assessment, Procedure Review, Document Review, Tours, Meetings, among others. Organizing the vulnerability portfolio: the process entails threat rating, assessing the background information, assessing agenda, a worksheet for ranking assets according to value, key documents, giving priority of the observations retrieved from the checklist, among others. Establishing a vulnerability rating: this task concentrates on identifying the weaknesses of sites, systems and functions in relation to a threat. It involves using the provided worksheet, vulnerability rating and definition and redundancy. [...]
[...] The first step under this discussion involves identifying critical assets for the first defense layer. This implies understanding the building's environment, and how the nearby activities, functions, occupancies might cause a threat or act as a shield against the threat. ID critical building assets for the second defense layer: this requires the understanding of the importance of the assets in relation to the main operations and people. The final match involves ID the critical property assets alongside the third defense layer (Ostrom & Wilhelmsen, 2012). [...]
[...] The checklist assists in preparing a sound threat assessment to provide guidance to the risk assessors. Considering mitigation options This final step involves evaluating and identifying the different mitigation options in response or associated with the risks discussed under step four. This involves covering tasks such as estimating costs, review of mitigation options, establishing opening mitigation options, and review of layers of defense, cost and mitigation options (O'Connor, Matalucci & Birirnger, 2007). This step involves identifying the right precautions for reducing the chances of assets or building destruction after an attack. [...]
using our reader.