Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
The role of risk management in homeland security
Examine the role of risk management within the homeland security enterprise
Examine the role of risk management within the homeland security enterprise
Don’t take our word for it - see why 10 million students trust us with their essay needs.
There is a lot of complexity in understanding risk management and its correlation to homeland security. Risk management is a way to approach the fact that securing the homeland is not certain and there are unknown variables in every aspect of life; risk management is a way to narrow down the focus based on quantifiable information determining probability against capability. Risk management plays and integral role in homeland security. Risk management is employed using a formula described in the NIPP for establishing a narrow scope to make the best decision about protecting infrastructure. The risk management formula lays down the foundation to make the most reasonable determination based on the potential consequences, vulnerability, and …show more content…
Real-world events is probably the more significant of the group; using a risk management program allows decision makers access to critical information related to potential outcomes of an event/incident. The decision makers use the information to exam the most appropriate and lower risk approach to an event/incident. The NIPP risk management program used the risk management for three specific threats, physical, cyber, and human to protect CIKRs (U.S. DHS 2009, p.33). When risk management is implemented correctly and all areas assessed thoroughly, it can produce the best course of action to protect homeland security infrastructure over a larger area through the cooperation of and between the different NIPP established sectors. Exercise planning and risk management work well together exercises also provide feedback for risk management for real-word events. Exercising the possibilities of an incident/event provide a realistic basis for establishing certain understanding of an incident without the high risk associated with a real-world
The risk management program provides for collaboration among all departments and services within HNI, and provides policies, procedures and protocols to address events which may create various business-related liabilities to HNI. This plan will influence the leaders of the following departments to achieve quality and protect HNI’s resources: 1. Senior Management 2. Administration. 3.
Homeland Security Presidential Directive 5 directly relates to the National Incident Management System and the National Response Framework. In fact, it directly correlates with their missions. HSPD-5 was the directive that needed to start things in motion; NIMS and the NRF are the aftermath of the directive. With the formation of NIMS and soon after the NRF, America can operate successfully under one national manage...
Chapter 1-3 showed the beginnings of homeland security and the expansion and growth of Homeland Security. Chapter 4 shows the actions of homeland security, and the steps they take toward a problem to access it. The DHS above all needs to realized and understand how to address an attack quickly and efficiently, and have counter measure put into place beforehand. The DHS must be able to access the risks of any situation, and must decipher the potential hazard the situation could cause. When looking at the many functions of the DHS, nothing could be more important than the ability to understand or hinder or stop an attack man made or not. First Homeland Security studies the nature of the risk; this means that they study what is likely to happen in a certain situation. The texted explains risk as what can go wrong. A cigarette smoker takes a risk every time he lights up, and everyone take a risk when getting into a car. The DHS takes what they know from prior circumstances to determine the reality of the risk; the department must also anticipate any attack even without prior knowledge to the circumstance. The main questions of risk assessment are easy to understand, questions like will people be injured or harmed. But when looking at chapter 1 which asks the reader to look further into why terrorist commit terrorism, that’s when its easier to see the DHS skill at risk assessment. For example if you understand that a terrorist attack could be coming from radical Islamist terrorist; then you would understand a risk by understanding their motive behind the attack like their religious holidays. The DHS uses a three-fold method for risk assessment and they are threat, vulnerability and consequence. The Rand organization uses th...
How does the creation of the Department of Homeland Security affect resources traditionally designated for local criminal justice organizations?
Homeland security is an American measure to ensure the security of the country. It is the national effort to ensure safety, security, and strength against terrorism and other issues, The goals of homeland security is to which will minimise the vulnerability of the U.S. to terrorism, and reduce the number of damages to the country.
Provides a review of homeland security in 2008 from the members of the Naval postgraduate schools homeland security network. A survey was administered among the network in regards to what they considered the most important homeland security issue of the year and what issues they believe will be of most importance in the near future.
...certain risks and use that knowledge to make solid comprehensive management decisions. These decisions are designed to create a long-term plan that provides solid strategies for preventing and mitigating risk. The risk management also provides Department of homeland security and its partner’s resources and training to educate and prepare members on federal, state, local, tribal and territorial levels to prepare for disaster. Unfortunately, it impossible for our government to completely eliminate risk, whether it is terrorism or man-made or natural disasters, however, with effective risk management, we can rest assure that the risk can be brought down acceptable level where the department of homeland security and their partners are adequately prepared and have the capabilities to handle that risk and lower the potential harm that it could cause the nation long term.
The concept of homeland security has developed over the last decade. Homeland security as a concept was precipitated by the terrorist attacks of 9/11. However, prior to 9/11 such entities as the Gilmore Commission and the United States Commission on National Security discussed the need to evolve the way national security policy was conceptualized due to the end of the Cold War and the rise of radicalized terrorism. After 9/11, policymakers concluded that a new approach was needed to address the large-scale terrorist attacks. A presidential council and department were established, and a series of presidential directives were issued in the name of “homeland security.” These developments established that homeland security was a distinct, but undefined
I will conduct a Homeland Security Assessment for my organization because the need for homeland security is tied to the underlying vulnerability of my company’s infrastructure in general, but I would conduct one for any threats against the infrastructure of my company. In our company we would need to establish a planning team to conduct Homeland Security Assessment for my organization by developing a plan Also, Analyzing capabilities and hazards in company to minimizing the threat.The next step is to Implementing the plan. Another, step in conducting Homeland Security Assessment is getting prepared.The company game plan for homeland security set homeland security task into six critical mission areas: (1) comprehension and caution(2) boundary and transport security, (3) Military personal design to prevent any kind of terrorism, (4) protecting the company critical organizational structure (5) guarding against disastrous terrorism in the company like people getting shot up, and (6) the company's organizational structure crisis preparedness and response. The first three critical mission areas focus on stopping a terrorist attack. The next two on reducing protectiveness, and the final one is reduced to a small amount of damage and recovery from
This framework help archive the National Preparedness Goal of a secure and resilient nation that is prepared to protect against the greatest of disasters and risk in a manner that allows American interests. This framework provides guidance to leaders and practitioners at all level of government, the private and nonprofit sectors and individuals. The National Protection Framework includes those capabilities necessary to secure the homeland against terrorism and manmade or natural
National security in the United States is extremely important and requires extensive risk management measures including strategic, exercise, operational and capability-based planning, research, development, and making resource decisions in order to address real-world events, maintain safety, security and resilience (Department of Homeland Security [DHS], 2011). The national security and threat assessment process consists of identifying the risk and establishing an objective, analyzing the relative risks and environment, exploring alternatives and devising a plan of action for risk management, decision making and continued monitoring and surveillance (DHS, 2011). Identifying risks entails establishing a context to define the risk, considering related risks and varying scenarios, including the unlikely ones, which then leads to the analysis phase; gathering data and utilizing various methodologies and analysis data software systems to survey incidence rates, relative risks, prevalence rates, likelihood and probable outcomes (DHS, 2011). These two key phases lay the foundation to explore alternatives and devise action plans. Threats, vulnerabilities and consequences (TCV) are also a key component of many national security risk management assessments because it directly relates to safety and operation capabilities, but the text stress that it should not be included in the framework of every assessment because it is not always applicable (DHS, 2011).
Ever since September 11th, 2001, our nation has been completely obsessed with our own security and prevention of another tragic incident. Through this experience leaders of our country have developed a system that would allow civilians of the status of our nation?s safety. It is called Homeland Security. Homeland Security was developed with several purposes. These include: increase overall preparedness, particularly for catastrophic events, Create better transportation security systems to move people and cargo more securely and efficiently, Strengthen border security and interior enforcement and reform immigration processes, Enhance information sharing with our partners, Improve DHS financial management, human resource development, procurement and information technology, Realign the DHS organization to maximize mission performance (Home Land Security Agenda). President Bush even came up with a color code that warns the nation of the terror threat. Red means severe. Orange is High. Yellow is elevated. Blue is guarded. Green is low. However, it is made up of some of the most advanced technology in the world. These computers allow the leaders to use their color coded system to send out warnings which allow us to prevent being vulnerable. Computers are the technology and they are what the government relies on to ensure that we are all safe.
Risk management is a process used in all industries to reduce the risk. The Risk management tool usage changes from sector to sector and hence each sector has developed their own risk management tools and methodologies to mitigate the risk. But the concept remains the same behind all the tools (Ropel, 2011). The main steps for risk management irrespective of the sector are:
"Risk management is the part of analysis phase that identifies vulnerabilities in an organization's information system and take carefully reasoned steps to assure the confidentiality, integrity, and availability of all components in the organization's information system" (Management of Information Security - second Ed, Michael E. Whitman and Herbert J. Mattord)
... should be designed to reflect current hazards and unexpected future uncertainties. Moreover, the process of risk framework should be able to reflect costs and benefits before making a decision to remove threats.