Carver Plus Shock Method Research Paper

Improved Essays
The CARVER plus Shock method is an offensive targeting prioritization tool that can assess the vulnerabilities within a system to an attack (www.fda.gov). By using this method, the most vulnerable points of a system can be determined through a vulnerability assessment and in turn resources deployed to cover and shield the organizations at the identified vulnerability points. Used by the FDA, the CARVER plus Shock method breaks the food system into its most basic parts, identifying those that are at high risk for an attack and thereby establishing countermeasures to protect these parts from an attack.
There are seven factors that the FDA used in conducting the vulnerability assessment and appropriate scale for scoring. These factors include:
…show more content…
Discuss the ASIS seven step approach to risk assessment.
ASIS International is the leading organization for security professionals worldwide and is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests (www.asisonline.org). They have developed policies and guidelines that help in security management and one of these guidelines is the general security risk assessment guidelines that detail a seven step approach to risk assessment.
The first step is understanding the organization and identifying the people and assets at risk. The entails knowing the core business of the organization while keeping in mind all the endeavors that enable it to operate successfully. This leads to the need to know all the assets and property that might be at risk. Important assets include people i.e. employees, vendors, customers, etc. and property including tangible assets like building and money and intangible assets like intellectual property (www.asisonline.org). The second step is to specify loss risk events and vulnerabilities. This is done by looking at historical events, events at similar sites, occurrences at similar facilities etc. Vulnerability analysis can be done to determine the risk factor of an event and important sources of information include crime related events, non-criminal events and consequential events (Vellani,
…show more content…
The frequency of events refers to how often a loss occurs at an event and the probability of loss risk refers to other factors that affect the risk involved e.g. prior incidences, trends, threats etc. This will determine the appropriate solution to the potential risk when management looks to make decisions (Vellani, 2007). The determination of the impact of an event is the forth step and it looks at the impact an event will have to the business in terms of financial, psychological and other costs that might occur with loss of business. These costs can be direct (financial losses) or indirect (bad publicity).
The fifth step in developing options to mitigate risks. Whilst there will be a variety of options available to address the risk faced, they all must be evaluated to see how practical, how affordable and how relevant they are to meet the needs of the organization. This is because the process to be developed should be the best suited to afford maximum benefit to the

Related Documents

  • Improved Essays

    The terrorist attacks of September 11th reshaped the governments focus on the domestic security of the United States and its citizens. Established after the terror attacks of September 11th the DHS combined multiple agencies into one agency which reports directly to the President of the United States. The Department of Homeland Security (DHS) faces the daunting task of protecting the continental United States from terrorism threats. After the attacks the government set out to ensure the US would never face another situation or attack like the one that had occurred. In order to do so the government had to transform the way it handled one major component, Intelligence.…

    • 784 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Risk management is an iterative process consisting of well-defined steps which, taken in sequence, support better decision-making by contributing a greater insight into risks and their impacts. The risk management process can be applied to any situation where an undesired or unexpected outcome could be significant or where opportunities are identified. It is a process that enables Council to know about possible outcomes and take steps to control their impact. At King Island Council, risk management is recognised as an integral part of good asset management practice. Risk management has become part of Council’s culture and is integrated into the Council plan and through individual business plans.…

    • 263 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    As part of the Homeland Security Assessment process, organizations strive to align their business plan with a Homeland Security Assessment by using the Baldridge Criteria model to “ensure that their performance excellence and security is competitive in the global marketplace which is one way that the Homeland Security Assessment process follows the Council on Competitiveness Business Model” (Fisher, 2004). “The Council on Competitiveness is a nonpartisan, non-profit organization whose members consist of corporate chief executives, university presidents, and labor leaders that are dedicated to setting an action agenda to drive the United States economic competitiveness by concentrating on a few critical issues, including national and regional…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The documents that have the most application in technical aspects are The National Incident Management System (NIMS) and National Response Framework (NRF). The documents posses a magnitude of information in regards to incidents and incident management(U.S. Department of Homeland Security And National Institute of Standards and Technology,2011). The NIMS provides a systematic approach to guide all involved organizations through the entire life cycle of preventing, protecting against, responding to, recovering from, and mitigating the effects of incidents U.S. Department of Homeland Security And National Institute of Standards and Technology,2011). The five components and their execution is what creates relativity to technology. A major component…

    • 585 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Homeland Security and Our Critical Infrastructure As with most things involved with Homeland Security, the events of September 11, 2001, changed the way America deals with its National Security. After all, our way of life was changed forever, and not for the best. Following the events of September 11, 2001, President Bush created the Department of Homeland Security. The purpose of the Department of Homeland Security is to protect and defend the citizens and the national critical infrastructure of the United States of America, against both enemies foreign and domestic.…

    • 1238 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    The ability of the homeland security system to assess and respond to future threats can at times be uncertain. This is due to the ever evolving nature of the threats posed to the country. As new threats are addressed more is learned about resources are needed for each type of manmade or natural event. Since, September 11, 2001 many steps have been taken to address this country’s vulnerability to terrorist attacks and Hurricane Katrina demonstrated the need for improvements in the country’s ability to respond to natural or mass casualty disasters. The Department of Homeland Security was created to assess these threats and establish procedures to improve the resiliency of the country.…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Risk Assessment Definition

    • 1802 Words
    • 8 Pages

    There are many forms of risk assessment being used by different agencies everywhere. There are multiple ways these are done also. A couple examples…

    • 1802 Words
    • 8 Pages
    Improved Essays
  • Superior Essays

    Kroger's Risk Analysis

    • 1142 Words
    • 5 Pages

    The first task in the Risk Management Process is risk identification, which must be accomplished to determine what if any risk levels exist and the controls needed to mitigate potential damages (Fraser & Simkins, 2010). Risk Identification can be achieved using several tools or application checklists to identify and describe exposures, which are: Risk Analysis Questionnaire, Financial Statement Method, Flowchart Method, On-site Inspections, and Environmental Scanning (Bethel, 2016). Additionally, there are measurement tools, such as Key Risk Indicators, which indicates whether the risk exists or is emerging (Fraser & Simkins, 2010). So, why is risk analysis important?…

    • 1142 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Goals Of Homeland Security

    • 1071 Words
    • 5 Pages

    The United States of America's Homeland Security ensures that all the citizens in the nation and abroad are safe and protected from terrorism attacks. The mission and vision of Homeland Security and Defense are aimed at initiating efforts that would ensure safe, secure and easy management of borders of the nation. To realize such a mission, the Homeland Security and Defense are striving to put into practice and administer laws and policies of immigration. They have also come up with cyber-crime policies that are destined to realize effective protection of cyber networks and infrastructure and at the same time making people immune and resilient from disasters of any nature (Jones & Givens, 2010). To achieve total security, Homeland Security and Defense of US have put mechanisms in place to provide crucial support both infrastructurally and economically to the common people.…

    • 1071 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Homeland Security Efforts

    • 963 Words
    • 4 Pages

    Topic 1: What are the capabilities and limitations of intelligence in supporting homeland security efforts? This paper will examine the capabilities and limitations of homeland securities intelligence community. The intelligence community (IC) consist of local law enforcement, federal organizations, and other organizations that strive to investigate and monitor activities that pose a threat towards the United States and their own communities.…

    • 963 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Critical Infrastructure

    • 648 Words
    • 3 Pages

    There are sixteen segments that make up the critical infrastructure of United States. Physical infrastructure has always been vulnerable to attacks, but within the last ten years our cyber-physical infrastructure has become increasingly more and more at risk with the rise in terrorism and increased integration of technology in all areas of our infrastructure. It is important for our government to implement risk based analysis, management and policies to protect our infrastructure from vulnerabilities. In order to protect the nations critical infrastructure, the critical protection plan is a nations call to action that focuses on the achievement of security and the resilience of critical infrastructure.…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Identifying and managing risks is a critical responsibility of project managers. Risk is defined as the probability of a specified threat and the subsequent impact that the event produces (Vaidyanathan, 2013). Risks can also bring about either positive or negative outcomes for a project or organization. A project manager must identify potential risks and evaluate each one to determine the severity and likelihood of each event. Only by completing the risk management process, a project manager can determine what approach would work best to avoid, mitigate, and/or transfer the risk.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    General Liability Policy

    • 846 Words
    • 4 Pages

    The team needs to have a realistic risk analysis that weighs the probability the event will occur against the potential severity the risk could have. Risk Categories: Time, Value, Event, Threshold Respond to Risks - A) mitigate the risk by lowering the impact or probability B) transfer the risk to another party C) avoid the risk entirely and do not take on the project Monitor Risks - a continuous activity necessary to track the state of identified risks and making sure appropriate risk response plans are being…

    • 846 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Furthermore, risk management is the act of forecasting and evaluating a certain situation and finding different ways to avoid and minimize the risks involved in getting the particular tasks done (Ryan, 2013). Leaders take risks, but they must first consider associated costs in order to determine if they can assume risks in a certain area and if taking those risks is advantageous. Risk management often requires careful consideration for personnel, equipment, and other resources because the goal is for individuals to achieve the most positive outcomes possible for the organization (Ryan,…

    • 970 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, program and data from attack, damage or unauthorized access. Current threats of the US that are at risk include banking and financial institutions, telecommunications networks, and energy facilities. Although most of these are owned by the private sector, they are extremely crucial to the welfare of the US and are also heavily dependent on computer networks. These networks and information systems are what need protection from potential attackers and intruders. The federal government has taken various steps to protect our country such as: implementing a strategy to address cyber risks to federal building and access to control systems, improving federal efforts to implement cybersecurity in the maritime port environment and enhancing cybersecurity for air traffic control systems.…

    • 551 Words
    • 3 Pages
    Improved Essays