TBG 

 

 
Risk-Vulnerability
Home Contact us
Risk-Vulnerability
Compliance
Engineering
Evaluation
Awareness
Management
Hot Topic
 

News
 

Risk and Vulnerability Assessment 

A Risk Assessment identifies the potential threat events and linked risks an organization may be facing.  The process requires an analysis of historical data of security or criminal incidents which may have taken place on or near the facility or location under consideration.  Available intelligence and probability of crime assessments may also be used to define the threat and risk environment.  Added to this is the assessor’s industry knowledge and experience over a range of environments which may have similarities with respect to threats, risks and impacts. 

A threat and risk assessment normally precedes a security vulnerability assessment which identifies security vulnerabilities or weaknesses existing at the facility or location(s) where business is conducted.  A criticality and prioritization analysis for mission crucial assets forms part of the vulnerability assessment and facilitates definition of where security remedies are most needed. Processes such as Pair-Wise Assessment and Pareto Analysis are often used for this purpose.  The figure below details some common steps for both the risk and vulnerability assessment processes.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Our reporting addresses the vulnerabilities and how best they might be addressed in a practical manner.   We provide prioritized recommendations and an implementation plan focused on strategically improving the security of the site and the safety of the individuals who work or visit there. 

To provide clients with a structured process for tracking and completion of security recommendations TBG often uses the SecureAssess data collection and analysis tool which automates the collection, collation, reporting and follow-up information in a consistent manner for each site or facility.   

This process also facilitates the selection of security compliance levels, which may be stipulated by regulation or corporate polity and automatically reports when specific areas of security fall below the target levels.  

   
Copyright ⓒ [2005] [RW Networks Inc.]. All rights reserved