Download presentation
Presentation is loading. Please wait.
Published byAbner James Modified over 6 years ago
1
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
Criminal Justice Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING Intro to Security, Instructor Name Date, Semester
2
Introduction Planning processes are used to identify sources of risk, implement countermeasures, and evaluate. Security manager: Must make recommendations Must determine the financial impact
3
The Concept of Risk Risk defined:
The possibility of suffering harm or loss, exposure to the probability of loss or damage, an element of uncertainty, or the possibility that results of an action may not be consistent with the planned or expected outcomes.
4
Types of Risk Pure Risk:
When there is a potential for injury, damage, or loss with no possible benefit. Dynamic Risk: Exists when threat conditions fluctuate.
5
Types of Risk (cont.) Speculative Risk: Static Risk: Inherent Risk:
Exists when there is a potential for benefit or loss Static Risk: Is constant and unchanging Inherent Risk: Unavoidable because of the nature of the business
6
Risk Assessment and Management Techniques
Through risk management, security professionals anticipate, recognize and analyze potential risks and loss-creating threats, and implement strategies to mitigate loss and damage.
7
Elimination, Reduction, Mitigation
Eliminate risk Reduce the probability of loss Mitigate damage if threat materializes
8
Vulnerability, Probability, Criticality
Vulnerability (exposure) Probability (likelihood) Criticality (impact) Vulnerability x Probability x Criticality = Risk Level
9
Risk Assessment Risk assessment involves a critical, objective analysis of an organization’s entire protective system. Measures: Subjective (qualitative) Objective (quantitative)
10
The Security Survey A security survey is used to evaluate an entire organization to identify risks and security deficiencies. A security instrument (checklist) is often used to conduct a security survey.
11
The Security Survey (cont.)
Nature of the organization Country Neighborhood Perimeter Building itself Restricted areas
12
The Security Survey (cont.)
Alarm and surveillance systems Fire protection Personnel security Information protection Procedures for investigations
13
The Security Survey (cont.)
Collection of business and criminal intelligence Reporting systems Operations Liaison activities Counterterrorism
14
The Security Survey (cont.)
Organizational policies Safety procedures Indoctrination and education Objective as well as subjective measures may be used
15
Planning and Budgeting
Plan Types Single-use plan Repeat-use (standing) plan Tactical plan (operational plan) Strategic plan Contingency plan
16
Plan Elements Common elements: Needs assessment/risk assessment
Development of alternative courses of action Selection of an action plan
17
Planning Tools CompStat (Computer-driven Statistics)
Geographic information system (GIS) technology
18
Budgeting Financial impact of each action plan must be determined.
Requires a budget Plan expressed in financial terms Cost-benefit analysis Return on investment (ROI) Value-added contribution (VAC)
19
Types of Budgets Traditional (simple % increase)
Line item (description/cost of each item) Performance-based (tied to performance objectives) Zero-based (justified each budget period)
20
Budget Expenditures Elements of a budget include: Personnel expenses
Operating expenses Supplies and materials Capital expenditures Miscellaneous expenses
21
Selling the Plan All stakeholders should be involved in the decision- making process Generate support for plan Convincingly describe and demonstrate security’s return on investment
22
Contingency Planning Contingency plan should address operational elements adversely affected by change and all conceivable variables and requirements. Business (operations) Continuity Plans Ensures normal operations are not disrupted by significant events.
23
Disaster and Emergency Plans
Should occur at individual, organizational, local, state and federal levels National Incident Management System (NIMS): National Plan State-level Standardized Emergency Management System (SEMS): State Plan
24
Crime Prevention Through Environmental Design
Based on the theory that the environment can be protected, and crime prevented, through the proper design of facilities and communities. Emphasis is based on effective use of architecture, building codes, and defensible space.
25
Crime Prevention Through Environmental Design (cont.)
History of CPTED: Not new Used by cave dwellers 1970s crime prevention Community policing and problem solving
26
Crime Prevention Through Environmental Design (cont.)
Assumptions: Environment can be manipulated to produce behavioral effects that prevent crime and improve the quality of life. Includes activities, structures, policies designed to positively impact human behavior
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.