0% found this document useful (0 votes)
95 views18 pages

Risk Management Tables/Charts/Worksheets: Low Medium High Critical Range Mid-Point

This document provides examples of tables, charts, and worksheets to aid in the risk management process for Department of Defense security programs. It includes scales for measuring impact, risk, threats, and vulnerabilities. It also includes tables to categorize assets, adversaries, and assess adversary intent, capabilities, history and overall threat levels. The tables, charts and worksheets are intended to help systematically analyze risks by capturing important details at each step of the risk management process.

Uploaded by

khaled
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views18 pages

Risk Management Tables/Charts/Worksheets: Low Medium High Critical Range Mid-Point

This document provides examples of tables, charts, and worksheets to aid in the risk management process for Department of Defense security programs. It includes scales for measuring impact, risk, threats, and vulnerabilities. It also includes tables to categorize assets, adversaries, and assess adversary intent, capabilities, history and overall threat levels. The tables, charts and worksheets are intended to help systematically analyze risks by capturing important details at each step of the risk management process.

Uploaded by

khaled
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Risk Management for DoD Security Programs

Job Aid – Risk Management Tables/Charts/Worksheets

Risk Management Tables/Charts/Worksheets

This job aid provides examples of each of the tables, charts and worksheets that are referenced in the courseware and
are an integral part of the risk management process. This job aid can be used as quick reference material or as a starting
point in your own risk management analysis using the blank worksheets located at the end.

Impact/Risk and Threat/Vulnerability Scales


During the analysis process; values are assigned corresponding to the impact of asset loss, threats, and vulnerabilities,
and then a resulting risk value is calculated. (See tables below).

Impact and Risk Scale


Low Medium High Critical
Range 0-3 4-13 14-50 51-100
Mid-point 2 8 31 75

Threat and Vulnerability Scale


Degree of Low Medium High Critical
Threat
Range .01-.24 .25-.49 .50-.74 .75-1.00
Mid-point .12 .37 .62 .87

1 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets

Asset Category Tables


Assets can be assigned to one of five categories: people, information, equipment, facilities, and activities & operations.
These can be broken into multiple levels to assist with capturing details about each asset. Each level within the categories
is then used during the asset analysis. Asset analysis studies are done at a Level I, II, III, and IV, or deeper as necessary.
(See tables below)

People

2 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets
Information

Equipment

3 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets
Facilities

Activities & Operations

4 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets

Adversary Categories
Group the identified adversaries into categories to help in the analysis and organization of your assessment. Examples of
categories include individuals, groups & organizations and governments. (See tables below)

INDIVIDUALS
Categories Adversaries Goals Strategies
Common Criminals • Muggers • Survival • Steal money or valuables for sale
• Burglars • Excitement • Do destructive, but exciting things
• Petty thieves
• Vandals
Insiders • Spies • Live better • Sell secrets
• Saboteurs • Exact revenge • Sabotage equipment
• Problem • Excitement • Cause bad public relations
employees • Act violently
Disturbed Individuals • Assassins • Gain attention • Harm or kill very important people (VIPs)
• Stalkers • Get relief • Approach VIPs or select organizations to
• Harmless • Respond to delusions obtain help
individuals • Suicide • Express beliefs/ideas
• Commit suicide

GROUPS & ORGANIZATIONS


Categories Adversaries Goals Strategies
Terrorists • Hezbollah • Force change • Steal money or valuables for sale
• HAMAS • Gain publicity for • Do destructive but exciting things
• Nov. 17th cause
• Others
Corporate • Any foreign • Capture market share • Gather proprietary info legally
Competitors or domestic • Gain advantage • Gather proprietary info illegally
competitor • Make money • Exploit competitor info
Narco-traffickers • Cali Cartel • Continue business • Intimidate politicians and law enforcement
• Medellin • Stay out of jail • Co-opt key politicians and law enforcers
Cartel • Make money
• Others

5 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets
GOVERNMENTS
Categories Adversaries Goals Strategies
Foreign • SVRR Multiple Multiple
Intelligence • DGI
Entities
Foreign Militaries • N. Korean Army To further political, • HUMINIT
• Iraqi Rev. Guard economic, military, • SIGINT
• Cuban Brigades ethnic or religious • IMINT
• Russian GRU agendas as defined by • MASINT
State-sponsored • Hezbollah national leaders • OSINT
Entities • MITI • Other technical collection attacks
• Others • Conventional warfare
• Information Operations
• Terrorism

Intent Assessment Chart


Once you have grouped the adversaries, create an Intent Assessment Chart to summarize the data. Use “yes” or “no”
responses for knowledge of an asset, need and each adversary’s demonstrated interest level. This is generally the
weakest link in the overall risk management process because access to this type of information is often limited.

Based on the number of “yes” responses, assign a high, medium, or low intent level for each adversary. Typically, three
“yes” responses equate to a high intent level, two “yes” responses translate to a medium, and one “yes” response
indicates a low overall intent level.

Intent Assessment Chart


Adversary Intent
Insider, Terrorist, FIE, Knowledge of Need Demonstrated Overall Intent Level
Criminal Asset Interest
Adversary 1 Yes Yes Yes High
Adversary 2 Yes Yes No Medium
Adversary 3 Yes No No Low

6 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets

Collection Capability Assessment Chart


Use the Collection Capability Assessment Chart to record findings when researching an adversary’s capabilities.
Adversaries may use overt or covert methods/activities to collect information. Some of these may include: SIGINT,
HUMINT, IMINT, MASINT and OSINT.

Collection Capability Assessment Chart


Adversary Collection Capabilities
Insider, Terrorist, HUMINT SIGINT IMINT MASINT OSINT Overall Capability Level
FIE, Criminal
Adversary 1 High High Medium Medium High High
Adversary 2 High Medium Low Medium High Medium
Adversary 3 Medium Medium Low Low Medium Medium

History Assessment Chart


Use the History Assessment Chart to document an adversary’s history with regards to suspected, attempted, or
successful incidents.

History Assessment Chart


Adversary History
Insider, Terrorist, Suspected Incidents Attempted Incidents Successful Incidents
FIE, Criminal
Adversary 1 2 technical devices found 2 attempted forced entries Unknown
Adversary 2 5 alarm activations; 2 attempted forced entries Unknown
adversary sighted in area
Adversary 3 None None None

7 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets

Threat Assessment Summary Chart


Use the Threat Assessment Summary Chart to summarize intent (from Intent Assessment Chart), capability (from
Collection Capability Assessment Chart), and history (from History Assessment Chart) and assign an overall threat level
rating. The intent and capability columns are populated with high, medium, or low ratings and the history column is
populated with a “yes” or “no” response.

Threat Assessment Summary Chart


Adversary Intent Capability History Overall Threat
Insider, Terrorist, (Interest/Need) (Methods) (Incidents/Indicators) Level
FIE, Criminal
Adversary 1 High High Yes High
Adversary 2 Medium Medium Yes Medium
Adversary 3 Low Medium No Low

Threat Level Decision Matrix


Once the overall threat level is determined, create a second chart, the Threat Level Decision Matrix. Assign “yes” or “no”
ratings for each adversary’s intent, capability, and history. A threat level is assigned based on the number of “yes”
ratings. The greater number of “yes” ratings, the higher the threat level.

For example,

yes + yes + yes = critical,


no + no + no = low.

Threat Level Decision Matrix


Intent Capability History Threat Level
(Interest/Need) (Methods) (Incidents/Indicators)
Yes Yes Yes Critical
Yes Yes No High
Yes No Yes/No Medium
No Yes No Medium
No No No Low

8 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets

Countermeasure Classification Chart


Countermeasures are classified according to their implementation requirements. Countermeasures can be procedural,
involve equipment/devices, and involve personnel.

Countermeasure Classification Chart


Procedures Equipment Manpower
(Physical/Technical)
• Security Policies • Locking Mechanism • Contractor Guard Force
• Security Procedures • Window Bars • Special Police Officers
• Training • Doors • Local Guards
• Awareness Programs • Fences • Military Guards
• Legal Prosecution • Alarms/Sensors
• Security Investigations • Hardware/Software
• Polygraph • Badges
• Disclosure Statements • Lighting
• Personnel Transfer • TEMPEST Devices
• Contingency/Emergency Response • Paper Shredder
Planning • Weapons
• OPSEC Procedures • Closed-circuit TV
• Cover Procedures • Safe Haven/Vault

9 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets

Countermeasure Worksheet
Use the Countermeasure Worksheet to categorize projected vulnerability-reducing countermeasures along with estimated
costs.

Countermeasure Worksheet

Undesirable Procedures Equipment Manpower


Events
Surreptitious Entry Procedures to secure facilities Doors, locks, bars - $5000 Contractor Guards - $100K
after hours IDS - $20,000 SPOs - $250K
Cost: moderately inconvenient Military Guards - $250K

Kidnapping an Official Vary travel route Doors, locks, bars - $5000 Contractor Guards - $100K
Cost: moderately inconvenient IDS - $20,000 SPOs - $250K
Relocate official - $10000 Bullet proof car - $40K
Residential: CCTV - $170K

Compromised Security awareness briefing System audit trail - $125K N/A


Documents Cost: negligible Password/user ID software -
$50K
Strict control procedures
Costs: moderately inconvenient

10 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets

Countermeasure Effectiveness Table


This table can be used for tracking countermeasure effectiveness against potential threats of undesirable events. A ten-
point scale is used to indicate the relative level of effectiveness for each countermeasure with 1 being extremely low and
10 being highly effective.

Countermeasure Effectiveness Table


Countermeasures Surreptitious Kidnapping Documents Terrorist Attack
Entry Stolen
Doors, Locks, Bars 4
Alarms, Sensors 5
Contractor Guards 6
Special Police Officers 9
Military Guards 9
Vary Travel Routes 5
Relocate Official 8
Residence Locks, Bars 4
Residence Alarms 5
Residence Sensors 5
Bullet-proof Car 4
Residence CCTV 7
Security Awareness 7
Strict Media Controls 6
System Audit Trail 6
Passwords 6
Defensive Driving 4
Vehicle Checks 7

11 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets
Emergency Procedures 4
Metal Detectors 5
Fences, Barriers 5

Countermeasure Analysis Chart


The Countermeasure Analysis Chart is used to determine appropriate countermeasures for mitigating an asset’s
vulnerabilities. All the information acquired to this point in the risk management process will be used in conducting a
countermeasure analysis.

Countermeasure Analysis Chart


Undesirable Existing Related Countermeasure Cost (5) New New Risk
Events (1) Risk (2) Vulnerability (4) Vulnerability Level (7)
Level & Level (6)
Vulnerability (3)
Motorcade 75.27 .80 – Cars not Car inspection $5,000 .40 (Medium) 37.6 (High)
Attack – (Critical) inspected program
assassination
of VIP
Information 46.03 .65 – Ineffective Document control $8,000 .15 (Low) 10.6 (Medium)
Loss – Mission (High) document control system
Failure

Existing Risk 60.7 Total Cost = > $13,000 New Risk Level 24.1 (High)
=> =>

12 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets

Risk Formula

The three risk factors are incorporated in the formula below to determine a more precise risk rating:

Risk = Impact x (Threat x Vulnerability) or (R = I [T x V])


“Impact” represents the consequence of the asset loss to the asset owner.

The “Threat x Vulnerability” value represents the probability of the undesirable event occurring.

13 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets

Risk Assessment Worksheet


Once the impact of an undesirable event is defined, create a worksheet for organizing and later analyzing the information.
Columns are completed during each step of the risk management process. (See below for an example of a completed
worksheet).

Risk Assessment Worksheet


Asset Undesirable Ling. Num. Threat Ling. Num. Vulnerability Ling. Num. Risk
Event/Impact Value Rating Category Value Rating Category Value Rating Rating
(Impact) (Impact) (Threat) (Threat) (Vuln) (Vuln)
People Motorcade attack -> H/C 97 Terrorist H/C .97 Cars not C .80 75.27
assassination of VIP inspected
Criminal activity -> L/C 51 Terrorist L/H .50
employee kidnapping
Information Loss -> mission failure H/C 97 FIE/Insider H/H .73 Ineffective H .65 46.03
document
control
Unauthorized release-> H/M 13 Insider M/M .37
capability disclosures
Equipment Theft->loss of H/H 48 Criminal L/M .30 No IDS H .55 7.92
computers System
Implant -> compromise L/M 4 FIE H/H .70
information
Facilities Mail bomb -> M/H 25 Terrorist L/M .25 No patrols at M .35 2.19
destruction of property building
Technical attack -> loss L 3 Terrorist H/H .74
of information
Activities & Disrupt R&D -> M/M 10 FIE/Insider L .12 No backup M .40 ,48
Operations schedule attack power supply
Poor OPSEC-> L/H 15 Militant M/M .37
operational disclosure

14 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets

Sample Asset Assessment Worksheet (Step 1)

Critical Asset Potential Undesirable Impacts Impact


Event Rating
Activities/Operations

Equipment

Facilities

Information

People

15 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets

Sample Threat Assessment Worksheet (Step 2)

Critical Asset Potential Undesirable Threat/ Impact


Event Adversary Rating
Activities/Operations

Equipment

Facilities

Information

People

16 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets

Sample Risk Assessment Worksheet (Step 4)


Asset Undesirable Ling. Num. Threat Ling. Num. Vulnerability Ling. Num. Risk
Event/Impact Value Rating Category Value Rating Category Value Rating Rating
(Impact) (Impact) (Threat) (Threat) (Vuln) (Vuln)
People

Information

Equipment

Facilities

Activities &
Operations

17 of 18
Risk Management for DoD Security Programs
Job Aid – Risk Management Tables/Charts/Worksheets

Sample Cost-Benefit Analysis Worksheet (Step 5)

Undesirable Events Countermeasures Risk Level Cost Comments


Reduced
From To

18 of 18

You might also like