My experience with the critical skill of evaluation is most apparent in my ability to accurately review and analyze facility security assessments (FSA). These assessments are prepared and completed by the Federal Protective Service (FPS) Inspectors, and are a vital part of their performance plan and core document. Facility security assessments are comprised of a Vulnerability Survey Reports (VSR) that FPS provides as a unique, yet comprehensive evaluation report that is developed under the Modified Infrastructure Survey Tool (MIST). As the Area Commander, it is my responsibility for overseeing all stages of the assessment process. The FSA includes the VSR in the vulnerability survey report. The VSR evaluates the weakness in the overall …show more content…
Security assessments are assigned and completed on a schedule that is established by ISC standards and Facility Security Level (FSL) ratings. I currently oversee 116 government owned and leased facilities within my area of command. Each of the 116 facilities requires a completion of an FSL, which is a vital part of the assessment process. The FSL is determined based on several factors to include building population, crime statistics and facility occupancy. The FSL calculates specific data entered into the program to produce an accurate security level rating. Each Inspector is assigned the task of completing an FSL on their assigned facility. Once the FSL has been completed, I reevaluate the data based on content and accuracy. The final acceptance of the completed FSL is determined based on the Facility Security Committee (FSC) member’s agreement. The Designated Official (DO) can acknowledge the preexisting rating or disagree with the determination, which is noted as an intangible factor and placed in the comments section of the FSL memo. If the DO decides that the security level should be increased, this can …show more content…
Prior to the introduction of RAMP, FPS utilized the Facility Survey Risk Management (FSRM) program. The FSRM had been a very successful threat based assessment tool. It was easy for the inspector to enter data and allowed for additional information regarding the specifics of the facility to include square footage, population and detail regarding each agency. The FSRM was simplistic in nature, yet detailed enough to explain areas that were deficient regarding facility security levels and the countermeasure implementation to mitigate potential threats. As FPS evolved so did the need for a better assessment program. FPS decided that the FSRM did not meet the criteria of today’s security challenges, leading to the development of RAMP. RAMP mirrored the FSRM in relation to being a threat-based assessment, but was too complicated regarding data entry. There were many setbacks due to programing issues, which created a time compliance conflict affecting its reliability and practical application. The program itself was difficult to implement effectively and required extensive training not only in application but also in presentation. RAMP is not considered a user-friendly program, therefore difficult in application requiring a substantial amount of computer memory just to operate. RAMP was also very difficult to present to
6. The risk assessment team will conduct an inspection of the department/area being assessed for risk or observe the process being assessed for risk in action. The members of the risk assessment team will individually document their findings on the “ABC Proactive Risk Assessment Worksheet” (Attachment A). To determine the appropriate score for each identified risk, the reviewer will consider information obtained through a physical tour of the facility, review of annual incident
U.S. Citizenship and Immigration Services (USCIS) lockbox facilities allow the USCIS to receive forms quickly and process payments efficiently and securely.
The Federal Protective Service (FPS) created RAMP in response to terrorist events. The goal of RAMP was to provide FPS with the capability to assess risks at federal facilities based on threat, vulnerability, and consequence, and track countermeasures to mitigate those risks; and improve the agency’s ability to monitor and verify that its contract security guards are trained and certified to be deployed to federal facilities (Goldstein, 2011). RAMP’s current status is chaotic. It is behind schedule and over budget. RAMP is over budget because the original system requirements changed and additional resources had to be added to accommodate the new requirements. RAMP is behind schedule due to development and implementation
conducting a monthly, quarterly, and yearly risk assessment to determine opportunities for training and further security protocols, and
1. Why is risk mitigation and filling in critical security gaps an important next step after the security assessment is performed?
The Senior Management of the Defense Logistics Information Services (DLIS) has decided to update the previous risk management plan with a developing, new risk management plan. This new risk management plan will not only minimize the amount of risk for future endeavors, but will also be in compliance with regulations such as the Federal Information Security Management Act (FISMA), Department of Defense (DOD), Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Control Objects for Information and Technology (COBIT), and Information Assurance Certification and Accreditation Process
Homeland Security was created by President George W. Bush as a counter defense to the tragic September 11 attacks. It is the third largest cabinet department after the Department of Veteran Affairs and Defense. The department was official formed on November 25, 2002 around almost a year after the actual attacks. Its primary function was to protect the United States and its territories from natural disasters, man-made accidents, and most importantly terrorist’s attacks. The Homeland Security Act of 2002 created the Department of Homeland Security after the mailing of the anthrax spores. By establishing the Homeland Security Act of 2002, it consolidated U.S. executive branch organizations related to “homeland security” into a single cabinet agency. In March 2002, the department created the Homeland Security Advisory System. This system was a color coded
I enjoyed reading your discussion question this week as you evaluated different elements of a Homeland Security Assessment plan that could be utilized to assess threats to a local, state, or federal government related to Infrastructure. We have seen over the past few weeks that there is a vital requirement to ensure that our governmental body in the United States provides that all public areas are not only safe and secure but also in a time of emergency they can easily be converted to a secondary purpose. This reserve of interstruchers will ensure that the needs of the Homeland Security Plan have the buildings, highways, and supplies readily available to put all aspects of the risk management plan into place (Fisher, 2004).
To begin, I choose to do my discussion board on the Office of Intergovernmental Affairs. According to the Introduction to Homeland Security, "this office is the primary point of contact with other government agencies at all government levels including federal, state, local, and tribal governments, integrating the work of the department with that of each of these other entities in their national security efforts.
that all protect our country on multiple fronts.. This program was founded by George W. Bush,
The U.S. economic downturn also played a major role in our security selections. Due to these recent attacks and the impact they have had upon our system, we will analyze our disaster readiness level, national security index, and budget. A detailed review of our security policies, procedures, rationale, and changes that were in place prior to the attack will be performed. This evaluation of our security decisions will be then be adjusted and reapplied to the control set in order to improve our security and national security index. After reviewing current security procedures, recommendations will be given to maximize the security posture and performance during round three.
-Effective, regular risk assessments to check that the safeguard policy and plans are effective and working
For us as security managers to begin to dissect the threat we must go back to the Risk and threat assessment as stated in (Risk and Security management 2008) the threat assessment specifically defines the scope, nature and impacts of risk the company may face during the life span of the operation. It should be written in the context of both the risk environment and the company’s risk tolerences, as these will define what risks are considered noteworthy and which fall within acceptable ranges for a project or organization. The Security Director should not assume that the initial threat assessment will be read in conjunction with the intelligence review. Therefore the key elements from the intelligence review should be included (if) to clarify the environment in which the organization will operate. The threat assessment can be conducted in isolation of a site visit, although specific risks associated with the project will be difficult to ascertain without firsthand knowledge through an actual visit. Secondary threat assessment may be done concurrently with, or as part of the security survey to provide the final specifics for the organization itself, as opposed to the more overarching initial assessment.
Many years ago airport security was not even an issue. People felt secure and safe and rarely worried about being searched. As time went on, the prevealance of terrorism became an increasing issue. There began more acts of terrorism by threatening and holding hostages on board commercial planes. As these acts continued, the government as well as citizens became vulnerable and an airport safety procedure was implemented as a way to ensure the safety of the United States. The implemented procedures over the years included a check and scan of all carry on and checked baggage, body scans, hire government airport employees, and a strict list of carry-on items. This made travelers feel safer as it decreased the ability of terrorist to commit
First, we need to understand the difference between logical and physical topographical layouts. Logical layouts are how the data move across the network and physical layouts are how the network relates to its wires and hardware (Kevin Wallace, 2012). Note that how the data moves through the network is not going to be the same as how the data is physically structured (Michael Harris, 2008). The most coming physical topologies are Bus, Star, and Star-Wire Ring (Kevin Wallace, 2012). The most coming logical topologies are Bus, Ring, and Star (Kevin Wallace, 2012).