Week 1: Data Driven Security, Asset Identification, and Security Inventory

After completing the required readings including the lecture content, please respond to this week’s discussion question.

Basic Learning Exercise: How Safe Is Your Castle? A good place to start thinking about security and risk is to begin with a familiar facility. For example, how safe is your castle – – your home?

To begin to apply the principles of physical security, conduct a physical security risk assessment by considering some basic factors. We will do more in-depth security assessments later in our course, but for now, let us simply start here at your residence.

For this exercise, please make sure not to give out any personal information that you are uncomfortable sharing, for instance, do not share your actual address. This is merely a first step learning exercise to begin raising our awareness about risk and security.

Please thoughtfully address each the following elements in a concise manner (at least one or two sentences for each one):

FACILITY CHARACTERIZATION: Describe your residence and neighborhood. Ease of access. Identify the critical assets in your home; or in other terms, what are the most important things/people worth protecting? After you identify your assets, try prioritizing them. How might you state these using security metrics?
THREAT ANALYSIS: Discuss potential threats (sources of harm, such as car thieves, electrical fires and flooding) and the likelihood of harm. Do you know the kind and frequency of crime in your neighborhood? Frequency is a form of a security metric. Have you ever asked the local police about crime in your neighborhood? Have you ever checked your State´s data base for the proximity of sex offenders near your address? If so, what did you find?
CONSEQUENCE ANALYSIS: Discuss the financial and non-financial impact result if there was harm/loss to your critical assets. In this regard, try to state consequences in qualitatively and quantitatively.
SYSTEM EFFECTIVENESS ASSESSMENT: Identify the layers of defense that you currently have around or in your residence. Also, address vulnerabilities (weaknesses) in your home security such as garage doors left open, time(s) of no occupancy, the lack of smoke alarms, etc. (Warning: Students often confuse threats and vulnerabilities. Please pay close attention to this week’s readings that threats are not the same as vulnerabilities.)
RISK ESTIMATION: Considering the factors in earlier steps, rank the potential threats in terms of risk (you might want to consider the security risk factors – probability and impact).
RISK REDUCTION STRATEGIES: If you think your current layers of defense are inadequate, identify the security countermeasures that you need to take. Which do you think are the easiest to implement, which are the most difficult? (You can consider security factors like technology and cost, although there are others). From a cost-benefit analysis viewpoint, do you think it is smarter to just buy more insurance coverage, or improve security measures (there is a cost), or finding a balance?
This home security risk assessment should be at least 100 words and present meaningful and substantial analysis.

Create a NEW TOPIC for your posting. Give it a descriptive title and then address the above requirements in a clear, organized and coherent manner.

In a second posting, respond and comment critically on the findings of another student.

Did they overlook anything?
Did they provide an interesting insight that is of learning value to you, or raise a particular interest?
Provide a detailed explanation for your remarks. Make sure to include the name of the student you are responding to.

Your feedback should be evaluative and promote critical thinking. This second posting should be at least 100 words in length.

You may provide additional postings beyond the first two (such as responding to a student who commented on your assessment) but please avoid posting “one-liners” and superficial comments.

We can handle this paper for you

We Guarantee ZERO Plagiarism ZERO AI

Done by Professional writers from scratch


Leave a Reply

Your email address will not be published. Required fields are marked *