Security Risk Assessments

For this task, you are to complete the following activity to demonstrate your ability to conduct security risk assessments of client operations for three (3) different clients.  The following clients are examples that you can choose from or you can select your own:

  1. Major sports venue which is due to hold a World Title boxing fight between the Australian titleholder and the challenger from China.
  2. Multi-national Petrochemical company in the CBD who are being targeted by Climate Change activists. A rally by the group is expected to attract at least 10,000 people intending to stop traffic in the CBD and conclude with a meeting in the open public area outside the company building.
  3. Chemical research laboratory engaged in Covid-19 virus vaccine development who have been accused of using live animal testing.
  4. Opening of a rail line linking an open cut coal mine and a seaport terminal designed to load supertankers for export to Asia.
  5. Redeveloped Private school in the inner suburbs being used to quarantine returned overseas travellers.

 

For this task you will require access to and the use of:

  • Legislation, regulations, policies, and procedures that apply to conducting security risk assessments in the jurisdiction of operation
  • Client specifications, information and intelligence, information technologies and resources required to achieve the performance evidence
  • ISO 31000:2018 Risk management – Guidelines
  • Australia’s Strategy for Protecting Crowded Places from Terrorism

 

The following tasks are to be demonstrated and assessed in the workplace or in a simulated workplace environment, meaning you should use your workplace or a workplace you are familiar with as the example for the documents and activities you are being asked to complete, or use an organisation that you are able to conduct research on to form the basis of your document development.

  • Acknowledge any information you have used (websites, books etc.) by referencing the original source
  • Where appropriate to demonstrate competency please include evidence and examples of what you are saying, attach additional documents and work samples.

Questions

1.Who are likely to be the relevant personnel you can consult with to clarify the client security requirements and operating environment?

2.How can you highlight and specify risks that are high priority to ensure appropriate controls are developed?

3.Explain how to evaluate existing controls so you can determine their impact on risk occurrence, and so you can implement required modifications.

4.What information will need to be documented into the action plans developed?

5.Explain the five (5) categories of risk treatment options you can select from, based on the assessed type, nature, cause and degree of the identified security risks.

6.Discuss the types of actions you might incorporate when planning risk management strategies to respond to contingencies.

7.How would you typically establish, in consultation with relevant persons, the communication and reporting arrangements that will be used to maintain currency of action plans?

8.How would you confirm the potential and real security risks in the client’s operating environment?

9.Discuss how to research selected feasible risk treatment options to confirm implications for controlling whole or part of security risks.

10.What do you need to ensure about the documentation you create when costing the recommended risk treatment options to ensure their compatibility with nature of risk and client requirements?

11.Why is it important to obtain approvals from relevant persons after verifying the suitability of recommended risk treatment options?

12.What do you need to ensure about the finalised comprehensive security risk management plan?

13.What explanation strategies might you use when presenting the risk management plan to relevant persons, within the agreed timeframes to explain the identified security risks and treatments, to enhance understanding and acceptance of recommendations?

14.What is the point of implementing procedures to monitor and review security risk management activities?

15.Discuss the requirements for securing any completed risk management plans.

 

 

 

 

 

 

Questions part 2

Your task is to write the answers to each of the following questions. Answers should exceed 50 words but no more than 100 words for each questions.

1.Outline the following legislative and regulatory requirements that apply when developing security risk management plans:

  1. Key requirements of legislation, regulations and codes of conduct for security risk management in the jurisdiction of operation
  2. Legal rights and responsibilities of employers, supervisors and employees associated with work health and safety and duty of care
  3. Licensing requirements in the security industry
  4. Trespass and removal of persons
  5. Use of force

 

  1. Briefly explain the application of integrated security measures for each of the following:
  2. Physical security
  3. Manpower
  4. Security technologies
  5. Security of personnel
  6. Security of information

 

  1. Outline the distinctions between information and intelligence.

 

4.What methods can be used for validating information sources?

 

  1. Discuss the activities which are to be included in action plans for security risk management.

 

  1. Briefly outline each of the following guidelines, and discuss their implications for security operations:
  2. National Guidelines for the Protection of Places of Mass gathering from Terrorism
  3. Active Armed Offender Guidelines for Crowded Places
  4. Improvised Explosive Device Guidelines for Crowded Places
  5. Chemical Weapon Guidelines for Crowded Places
  6. Hostile Vehicle Guidelines for Crowded Places
  7. Discuss the methods that can be used for:
  8. Determining the type, nature and causes of potential and actual security risks
  9. Distinguishing between acceptable and unacceptable security risks
  10. Prioritising security risks and treatment options based on degree of risk
  11. Testing treatment options in the field
  12. Outline the process and the application of dynamic risk assessment and risk management methods.
  13. Referencing Australia’s Strategy for Protecting Crowded Places from Terrorism, provide a brief understanding of:
  14. The definition of:
  • Crowded places
  • Hostile vehicles
  • Methods of hostile vehicle attack
  1. Key security issues for crowded places
  2. The objectives, characteristics and identification of active armed offenders
  3. Signs of chemical weapons attack, and the recommend response
  4. General features of improvised explosive devices and recommended incident response
  5. Reflect on the recognised industry practice and application of ISO 31000:2018 Risk management – Guidelines (ISO 31000) in the designing of security risk management strategies and treatment options
  6. Discuss the types of treatment options which are appropriate to the following range of security risks and threats to various client operating environments:
  7. Assets
  8. Buildings
  9. Crowded places and mass gatherings

 

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 Customer support
On-demand options
  • Tutor’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Attractive discounts
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Unique Features

As a renowned provider of the best writing services, we have selected unique features which we offer to our customers as their guarantees that will make your user experience stress-free.

Money-Back Guarantee

Unlike other companies, our money-back guarantee ensures the safety of our customers' money. For whatever reason, the customer may request a refund; our support team assesses the ground on which the refund is requested and processes it instantly. However, our customers are lucky as they have the least chances to experience this as we are always prepared to serve you with the best.

Zero-Plagiarism Guarantee

Plagiarism is the worst academic offense that is highly punishable by all educational institutions. It's for this reason that Peachy Tutors does not condone any plagiarism. We use advanced plagiarism detection software that ensures there are no chances of similarity on your papers.

Free-Revision Policy

Sometimes your professor may be a little bit stubborn and needs some changes made on your paper, or you might need some customization done. All at your service, we will work on your revision till you are satisfied with the quality of work. All for Free!

Privacy And Confidentiality

We take our client's confidentiality as our highest priority; thus, we never share our client's information with third parties. Our company uses the standard encryption technology to store data and only uses trusted payment gateways.

High Quality Papers

Anytime you order your paper with us, be assured of the paper quality. Our tutors are highly skilled in researching and writing quality content that is relevant to the paper instructions and presented professionally. This makes us the best in the industry as our tutors can handle any type of paper despite its complexity.