Threat Evaluation Risk Assessment | Instant Homework Solutions
Using the FEMA/DHS instruction on threat evaluation and risk assessment, you will write a threat evaluation and risk assessment for a target of your choice. You must also fill in the risk assessment table. Your threat evaluation/risk assessment should include the following: Part 1: 1) Sketch of location with all access points and cameras 2) Distance from security 3) Use of space 4) Occupancy fire vs average 5) Blind spots 6) Fire alarms and emergency exits 7) Shooter scenario or an Explosive scenario 9) Prevention strategy 10) Response strategy Part 2: Responding to potential threats. This feeds into your prevention and response strategy. Use the Mosaic program website to help you 1 Develop threat model: Develop a threat model that represents a given scenario or location that can be perceived as vulnerable. Your threat model should include all the variables that you can later identify and produce a threat classification based on the relevant output. 2 Measure vulnerability: Carefully identify and measure the vulnerability of the particular location or scenario that you are conducting your threat assessment for. Be sure to carefully analyze all the levels of vulnerabilities that can be observed. 3 Measure operator: Next you should measure or identify the operator. The operator is the perceived individual that the threat can come from. Remember there can be multiple operators involved as very few acts of violence happen from just a single individual. Usually operators are various groups that are known to be involved in various terrorist activities. 4 Measure capabilities: Identify the capabilities of your perceived operator in the threat assessment. Capabilities can be measured by past behavior or previous violent crime statistics. Check Start at the University of Maryland for current stats on a wide range of terrorist groups. Try to put a numerical value on the potential capabilities of your operator in the threat assessment. 5 Measure intent: Once you have measured or identified vulnerability, operators and capabilities then now you should understand the intent. You have to measure the level of intent that you feel your potential operator has and whether or he or she can act on this very same level of intent. Measuring intent is rather difficult as it is hard to understand what is going on inside someones head. These variables can also be given numerical values to give you a threat level. Links: https://buffalostate.open.suny.edu/bbcswebdav/pid-1787126-dt-content-rid-16801526_1/courses/202030-CRJ450-MRG-18672210/201830-CRJ450-2127_ImportedContent_20180828120723/C-TPAT%27s%20Five%20Step%20Risk%20Assessment%20Process.pdf https://buffalostate.open.suny.edu/bbcswebdav/pid-1787126-dt-content-rid-16801528_1/courses/202030-CRJ450-MRG-18672210/201830-CRJ450-2127_ImportedContent_20180828120723/CPG201_htirag_2nd_edition.pdf https://buffalostate.open.suny.edu/bbcswebdav/pid-1787126-dt-content-rid-16801536_1/courses/202030-CRJ450-MRG-18672210/201830-CRJ450-2127_ImportedContent_20180828120723/DHS-Threats2008-2013.pdf https://buffalostate.open.suny.edu/bbcswebdav/pid-1787126-dt-content-rid-16801542_1/courses/202030-CRJ450-MRG-18672210/201830-CRJ450-2127_ImportedContent_20180828120723/fema452_step1.pdf https://buffalostate.open.suny.edu/bbcswebdav/pid-1787126-dt-content-rid-16801543_1/courses/202030-CRJ450-MRG-18672210/201830-CRJ450-2127_ImportedContent_20180828120723/fema452_step2.pdf https://buffalostate.open.suny.edu/bbcswebdav/pid-1787126-dt-content-rid-16801544_1/courses/202030-CRJ450-MRG-18672210/201830-CRJ450-2127_ImportedContent_20180828120723/fema452_step3.pdf https://buffalostate.open.suny.edu/bbcswebdav/pid-1787126-dt-content-rid-16801545_1/courses/202030-CRJ450-MRG-18672210/201830-CRJ450-2127_ImportedContent_20180828120723/fema452_step4.pdf https://buffalostate.open.suny.edu/bbcswebdav/pid-1787126-dt-content-rid-16801546_1/courses/202030-CRJ450-MRG-18672210/201830-CRJ450-2127_ImportedContent_20180828120723/fema452_step5.pdf https://buffalostate.open.suny.edu/bbcswebdav/pid-1787126-dt-content-rid-16801586_1/courses/202030-CRJ450-MRG-18672210/201830-CRJ450-2127_ImportedContent_20180828120723/RiskAssessment_Table_0.pdf https://buffalostate.open.suny.edu/bbcswebdav/pid-1787126-dt-content-rid-16801652_1/courses/202030-CRJ450-MRG-18672210/202010-CRJ450-2360_ImportedContent_20200127082123/179981-1.pdf