My experience with the critical skill of evaluation is most apparent in my ability to accurately review and critique facility security assessments (FSA). These assessments are prepared and completed by the Federal Protective Service (FPS) Inspectors as a part of their performance plan and core document. Facility security assessments are comprised of a Vulnerability Survey Report (VSR) that FPS provides as a unique yet comprehensive evaluation report that was developed under the Modified Infrastructure Survey Tool (MIST). As the Area Commander, it is my responsibility for overseeing all stages of the assessment process. The FSA includes the VSR. The VSR evaluates the weakness in the overall facility design noting areas of concern …show more content…
As a part of overseeing the assessment process, I assign a start and completion date for all FSA’s. The Inspector begins the assessment by downloading the builder, which is a data entry component of the MIST program that is used to formulate a VSR in the assessment process. All government owned or leased facilities are assigned a specific building number by the General Services Administration (GSA). These assigned building numbers are then entered into the Gateway program. The Gateway is a computer based website that is used to track activity and completion of the assessment process. The Inspector will log into the Gateway to enter their start date and initiate the builder downloading process to their desktop. The assessment data is then entered into the builder by addressing each security element noted on the dashboard. The concept of the VSR is to evaluate all areas of the facility to include significant area assets that are defined as areas of attractiveness based on location and occupancy. The VSR addresses areas of preexisting countermeasures buy using a Protective Measure Index (PMI). The PMI addresses the preexisting operational and physical security elements of a facility. The baseline of a facility is established by the ISC …show more content…
The TAR is comprised of several elements of security data that are also used to generate the FSL. The Special Agents work with the Inspectors to acquire crime statistics, population, square footage and the identification of the agencies’ mission. The Special Agents conduct interviews with state and local criminal intelligence units and also access the Enterprise Information System (EIS) to review past and present police activity within the vicinity of the facility. The Special Agents also conduct research with several fusion centers referencing the specific building address to identify credible threats aimed at that particular facility. The TAR is added to the VSR to complete the FSA package for that facility. I subsequently complete a review of all components that make up the FSA to insure the accuracy of the data entered using the ISC standards to ascertain compliance with established guidelines. This can be a very time consuming process evaluating each security related component of a completed FSA. After the complete and thorough review of the VSR, FSL, and TAR, I begin the final evaluation of the countermeasure recommendations. The recommendations are compared to the requirements established by the bi-annually produced ICS Design Basis Threat Report
2.7 Evaluate the features of own setting against current regulatory requirements and guidance for a safe, secure and inclusive environment. (Minimum Standards etc)
Intelligence analysts in the IC, DHS, and FBI are tasked with the primary responsibility of developing threat assessments against the United States and national critical infrastructure. The
The Federal Protective Service (FPS) created RAMP in response to terrorist events. The goal of RAMP was to provide FPS with the capability to assess risks at federal facilities based on threat, vulnerability, and consequence, and track countermeasures to mitigate those risks; and improve the agency’s ability to monitor and verify that its contract security guards are trained and certified to be deployed to federal facilities (Goldstein, 2011). RAMP’s current status is chaotic. It is behind schedule and over budget. RAMP is over budget because the original system requirements changed and additional resources had to be added to accommodate the new requirements. RAMP is behind schedule due to development and implementation
3. Which application is used for Step #2 in the hacking process to perform a vulnerability assessment scan?
6. The risk assessment team will conduct an inspection of the department/area being assessed for risk or observe the process being assessed for risk in action. The members of the risk assessment team will individually document their findings on the “ABC Proactive Risk Assessment Worksheet” (Attachment A). To determine the appropriate score for each identified risk, the reviewer will consider information obtained through a physical tour of the facility, review of annual incident
The U.S. economic downturn also played a major role in our security selections. Due to these recent attacks and the impact they have had upon our system, we will analyze our disaster readiness level, national security index, and budget. A detailed review of our security policies, procedures, rationale, and changes that were in place prior to the attack will be performed. This evaluation of our security decisions will be then be adjusted and reapplied to the control set in order to improve our security and national security index. After reviewing current security procedures, recommendations will be given to maximize the security posture and performance during round three.
conducting a monthly, quarterly, and yearly risk assessment to determine opportunities for training and further security protocols, and
When looking for the three figurative language examples within the short stories, I chose to use the short story, “A Good Man is Hard to Find” by author Mary O’Conner. The first example of figurative language was a simile, “raised her head like a parched old turkey hen crying for water” (O’Conner 1955). This is being used to describe the women’s face and the expression on it making this a good example of a simile. This description works well because it takes two things that are similar in look but are not the same.
Fisher (2004) divides the Homeland Security Assessment into eight easy to follow steps that must be followed in order to ensure an easy understanding and flow. These eight steps include complete the organizational overview, read Baldrige criteria, review questions, zero-based and world class, make interview notes, list comments for strengths and improvement, list homeland security strategic planning issues, and score assessment items (Fisher, 2004).
The focus of this assessment is to identify safety concerns about the physical structures of the University of Texas at San Antonio Downtown campus. Throughout the assessment there were several safety issues that were noted those which include but are not limited to lack of ramps, proximity of buildings, placement of cameras, parking lot safety, place of emergency evacuation chairs, placements of fire extinguishers and AED’s. It is very important to be aware of safety concerns students, faculty, and staff may encounter to keep the university not only safe but also secure.
Corder and Scarborough write about the lack of security clearances granted to state and local authorities. Due to the long wait times and in depth vetting it is suggested that this has hindered state and local authorities with regard to being utilized better on the front line. An additional issue related to security clearances is the concept of the “need to know basis.” It is understood that to combat this there have been fusion centers created to disseminate this information. While fusion centers are functional it could be contended that they tend to have a shelf life and a sense of complacency might set in. A 2008 CRS/ John Rollins report for congress touches upon the aforementioned issues. The shelf life concept of the
Greek mythology and Roman mythology are almost identical. This is an accepted fact, as it is widely known that the Romans stole the Greek myths. However, it is very interesting to note that the mythology of the Vikings (Norse) has many similarities with the Greek myths. These myths are, by no means, identical to the Greek ones (like the Roman ones are), but there are very distinct commonalities between the two. I see two possible reasons for this besides pure coincidence.
The Risk assessment will be a vital part of the whole security plan which is a document which basically covers the whole
Many years ago airport security was not even an issue. People felt secure and safe and rarely worried about being searched. As time went on, the prevealance of terrorism became an increasing issue. There began more acts of terrorism by threatening and holding hostages on board commercial planes. As these acts continued, the government as well as citizens became vulnerable and an airport safety procedure was implemented as a way to ensure the safety of the United States. The implemented procedures over the years included a check and scan of all carry on and checked baggage, body scans, hire government airport employees, and a strict list of carry-on items. This made travelers feel safer as it decreased the ability of terrorist to commit
Nearly every community has some sort of community risk, threat, and assessment plan that takes into account one of the six potential risks that are of concern to homeland security. Though each of these plans will likely differ from one another, many communities will have the same types of information in their plans. This essay will look at the Threat and Hazard Identification and Risk Assessment Guide (THIRA), the Community Risk Reduction Planning Guide, as well as FEMA’s National Preparedness plan. Any combination of these guides are a good starting point for every community in America. At top of every communities list as well as the nation is the protection of the critical infrastructure. Loss of infrastructure regardless of how big or small the community is could have very crippling effects on that community.