University of Maryland Global Campus Security Risk Assessment Questions
Question Description
The ASIS “General Security Risk Assessment Guideline” is a 2003 ASIS International publication and a key resource for security operatives responsible of examining, evaluating, and managing risk to organizational assets and planning security operations.
After thoroughly reading and studying the publications contents, particularly the seven (7) Recommended Practice Advisories and the corresponding commentaries, explain why a corporate security officials must understand the various risk management principles and be able to apply those principles when assessing the vulnerability of an organizations assets. Incorporate into your response the significance of determining not just the various crime-related AND non-criminal threats to assets, but also the impact or “criticality” (losses, harm, and costs) of those threat or risk events AND the probability or likelihood of those events occurring. Use examples to demonstrate the points you make in your response.
Finally, identify the various information sources available to corporate security officials to determine the probability of the various threats that may be directed at the organization. Again use examples of sources used by a real-world company (Exxon, Walmart, Apple, Proctor and Gamble, Amazon, Kroger, etc.) to demonstrate the points you make in your response.
Exercise 1 Deconstructed:
- Explain why a corporate security officials must understand the various risk management principles, (there were 7),
- apply those principles when assessing the vulnerability of an organizations assets
- Incorporate into your response:
- the significance of determining crime-related threats
- non-criminal threats to assets
- the impact or “criticality” (losses, harm, and costs) of those threat or risk event
- the probability or likelihood of those events occurring
- Use examples to demonstrate the points you make in your response
- identify the various information sources available to corporate security officials to determine the probability of the various threats that may be directed at the organization
- use examples of sources used by a real-world company (Exxon, Walmart, Apple, Proctor and Gamble, Amazon, Kroger, etc.) to demonstrate the points you make in your response.
Reference Cited:
General Security Risk Assessment Guidelines. (2003). Retrieved August 26, 2020 from, https://fedweb-assets.s3.amazonaws.com/137/268/ASIS%2520General%2520Security%2520Risk%2520Assessment.pdf
REMEMBER: Be sure to cite your sources from both the Learning Materials and outside research. Please post your response by Sunday, and respond to the original posts of two or more of your fellow classmates, in a cogent and respectful manner.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."