LESSON 4
RISK ANALYSIS, RISK MANAGEMENT ALTERNATIVES AND
STRATEGIES, SECURITY HAZARD
TOPICS
1. Risk Analysis
2. Risk management alternative and strategies
3. Security hazard
LEARNING OUTCOMES
The students must be able to:
1. to
distinguish the different types of security hazard;
2. analyze the importance of barriers;
3. assess the extent of risk to security
4. examine the level of security needed in different establishments;
TOPIC 1: RISK
ANALYSIS
What is a Risk?
It is the
potential damage or
loss of an asset. The
level of risk is a
combination of two
factors: The value
placed on that asset by its owner and the
44
consequence, impact adverse effect of the loss or damage to that asset and;
the likelihood that a specific vulnerability will be exploited by a particular
threat.
What is Risk Management?
It is a process of selecting and implementing security
countermeasures to achieve an acceptable level of risk at an acceptable
cost.
What is Risk Analysis?
It is the analysis of risk include examinations of the vulnerability,
probability and criticality of potential threats and include natural and man-
made risk
What is an Adversary?
An individual, group, organization, or government that conducts
activities or has the intention and capability to conduct activities detrimental
to the individual, private or government entity.
What is Asset?
Any information, facility, material, information, or activity which has a
positive value to its owner whether it is an individual, private or government
entity.
What are Countermeasures?
An action taken or a physical entity used to reduce or eliminate one or
more vulnerabilities. The cost of possible countermeasures may be
monetary, but may also include non-monetary cost such as reduced
operational efficiency, adverse publicity unfavorable working conditions, and
political consequences.
What is Probability?
It is the chance or likelihood that a loss will take place. Indicated by a
mathematical statement concerning the possibility of an event occurring
What is Criticality?
It is the impact of a loss as measured in financial terms. How important
it is in terms of the survival or existence of the organization.
TOPIC 2: RISK MANAGEMENT ALTERNATIVES AND STRATEGIES
1. Risk Avoidance- eliminating or removing the risk totally from the
business, government, or industrial environment for which the risk
manager has responsibility.
2. Risk Reduction- decreasing the risk by minimizing the probability of
the potential loss. The reduction of criminal opportunity is often
accomplished by situational crime [prevention strategies to
discourage, deter, or deny criminal incidents.
3. Risk Spreading- spreading the risk through compartmentation or
decentralization to limit the impact (criticality) of the potential loss.
4. Risk Transfer- moving the financial impact of the potential loss-over to
an insurance company.
5. Risk Self-assumption- planned assumption and acceptance of the
potential risk by making a deliberate managerial decision of doing
nothing about the threat, or setting aside resources for use in case of
a specific loss incident.
45
TOPIC 3: SECURITY HAZARDS
Any act or condition which may result in the compromise of
information, loss of life, loss or destruction of property or disruption of the
objective of the installation.
Types of Hazards
1. Natural Hazard- these are hazards which arise from natural
phenomena. The following are types of natural hazards or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Fire (not caused by human action)
d. Storms (typhoons, cyclones, tornado and hurricane)
e. Lighting storms
f. Extreme
temperature and
humidity
2. Human-Man made
Hazards- These are hazards
which are the result of a state of mind, attitude, weaknesses or
character traits of one or more persons. They can be acts of
commission or omission, both overt and covert, which can disrupt
operation of a plant or installation. The following are types of human or
man-made hazards:
a. Carelessness- accidents and dissatisfaction
b. Disloyalty-subversion and sabotage
c. Espionage, pilferage and theft
d. Vandalism, etc
46
SABOTAGE AS SECURITY
HAZARD
Sabotage as security hazard – As
earlier
defined, sabotage is deliberate
destruction
or deliberate
damaging or
destroying or destroying property or equipment. 1.
Description of saboteur:
a. He is the most dangerous for whom security will have to deal with while
planning and implementing security measure and techniques.
b. He is and ordinary looking as the guy next door but in his mind, he has the
training in the deception, knowledgeable in incendiaries, explosives,
chemistry, bacteriology, mechanics and psychology.
c. He can work alone, in group, or simultaneously in the
several places.
2. As initial security measure, saboteur target are any of the
following; a. Arm Forces installation
b. Natural Resources- mine, forest farm and farm product
c. Industries like the buildings, power sources, machineries,
fuel etc. d. Warehouses depots, communication, public utilities,
etc.
3. Countermeasure against Sabotage
a. Used and efficient, alert and train guard force.
b. Used of physical security aid like barriers, personnel and vehicular control,
intrusion devices. Communication systems, and electric aids.
c. Proper screening of personnel
d. Identification and movement control
e. Searches on incoming vehicle
f. Safeguarding of classified information
g. designation of restricted areas
h. Investigation of breaches of security
i. Security education and indoctrination
j. Good housekeeping method
k. Effective and compatible emergency planning
l. Regular audit
m. Continuing background check
47
ESPIONAGE AS SECURITY HAZARD
Espionage as Security Hazard- As earlier stated, espionage is a hazard
because it may cause unauthorized disclosures of company information,
processes and procedures.
1. Description of espionage agent
a. He is a very dangerous adversary and this skills in deception and his
cunning should never be under estimated.
b. He is usually person of extensive training and will be highly effective in
gaining the confidence of people and extracting information of value to be
relayed to his employer or handler.
c. Even how well trained and espionage agent he might be, he is a human
like the saboteur and he can be defeated in his own game if proper methods
and techniques, are under taken.
2. Some methods Employment by Espionage Agent
a. Stealing or information from employees
b. Stealing information from records or other sources.
c. Using various methods of reproducing documents products, equipment or
working
models.
d. Using “ front’ as commercial concern, travel agencies association,
business groups and
other organization to obtain confidential information or
data. e. Using various form of treats to obtain information.
f. Using blackmail technique using intimate and details concerning and
individual or
organization.
g. Picking or securing information in social and other
gatherings. h. Penetration and operational tactics.
3. Countermeasure against industrial Espionage
a. Careful and pre-employment measures designed to control threats of
industrial espionage.
b. Continuing personnel check on employees and particularly personnel on
sensitive positions even already employed.
c. Prevention of unauthorized entry to the plant or industrial
installation.
d. Restricting of movement of personnel in the premises of the
plant. e. Controlled disposal of waste papers including carbon
in classified work. f. Only properly cleared personnel should
handle classified document. SUBVERSIVE HAZARD
ACTIVITY AS A SECURITY HAZARD
48
Subversive Hazard Activity as a Security Hazard- This is clearly a security
hazard because it disrupt s normal operation within a certain organization or
institution.
1. Threats of subversive Activity
a. It can be local or national in nature in their mission I to undermine the
authority weaken the organization, and eventually take over. This can be
business or any activity.
b. This can be the form of rumor mongering propaganda,, undermining
morale, and injecting defeatist attitudes and other emotion approaches.
b. It is an activity not easy to detect.
2. Counter measures to subversive activity
a. The spreading of rumors, written materials, slogans, or any other devices
to confuse the network population and discredit the government should be
immediately reported.
b. Labor and other company unions can be infiltrated so that strikes and
‘slowdowns” can be called disrupt the normal operation of a plant or
installation.
c. Security force should be alerted for person trying to recruit others
organizing movement for peace anti- colonials, anti- trade imperialism.
d. Employees or outside personnel seeking memberships in’ paper
organization’ should report this activity to security.
e. Other methods of subversion like united fronts, mob action, terrorism, and
sabotage well be done to gain subversive end.
ASSESSMENT
A. Analysis:
Conduct an interview to your nearest neighbor (at least 2 head of
the family) and ask the following questions, in wit:
Name:
Age:
Address:
Natural Hazard that had experienced for the past ten (10) years:
___________________________________
How did you overcome the outcome?
Are you well-prepared before the hazard?
49
After doing so, write your output in one (1) whole sheet of paper
including your analysis based from their answers and
recommendation. Date of Retrieval is on or before April 30, 2021.
RUBRICS:
SCORE 25-20 points 19-15 points 14-10 points 10-0 points
Summary Demonstrates an Good Summary Summary
excellent understanding shows some does not
understanding of of the topics, misunderstandi comprehens
the topics, well but the n g of the major i ble.
expounded concept points.
concepts with an borrows too
appropriate heavily or is not
amount of quoting. articulated in a
clear manner.
Argument Argument is well Argument is Argument lacks Argument is
articulated and reasonable but the support implausible,
addresses the is not necessary to unsupported
issues raised in convincingly prove some , or
the topics. articulate. . points. otherwise
not
completely
understand
ab le.
Examples Demonstrate Examples are Limited Inappropriat
clear example given but lack engagement e research
that fortifies of connection and evidences or no
deep to the lesson to prove examples
understanding of points. were given.
the lesson.
B. TERM PAPER: Movie Assessment
Watch the movie San Andreas 2015 with this link
https://youtu.be/SGzih34I3iA, hereafter, write a term paper based on
your observation about the movie and to our previous lessons.
After doing so, write your output in one (1) whole sheet of paper
including your analysis based from the interviewee’s feedback. Cite
your recommendation. The date of retrieval is on or before April 30,
2021.
Make sure to observe security protocol while doing the interview
(wear mask and observe proper distancing)