280 likes | 399 Views
Risk Analysis and the Security Survey 3rd edition. Chapter 12 Mitigation and Preparedness. Comprehensive Emergency Management. Originated in public sector planning Integrated approach Addresses the treatment of risk Consists of four components
E N D
Risk Analysis and the Security Survey 3rd edition Chapter 12 Mitigation and Preparedness
Comprehensive Emergency Management • Originated in public sector planning • Integrated approach • Addresses the treatment of risk • Consists of four components • Mitigation, preparedness, response and recovery
Mitigation • Sustained action that reduces or eliminates risk • Can reduce occurrence of a hazard • Cost-effective • Cost of Mitigation – Benefit avoids losses • (Federal Emergency Management Agency) FEMA methodology • Geared toward regional planning not for individual businesses
Mitigation • Four major steps in FEMA’s Risk Mitigation Methodology: • Organize resources • Assess Risks • Develop mitigation plan • Implement plan and monitor progress
Mitigation • Corporate Model Similar to FEMA • Identify hazards • Devise strategies • Select cost-effective solutions • Implement solutions
Mitigation- Hazard Identification • Historical events and conditions • Predict impact of past events • Recurrence rates • Libraries • HistoriansNewspapers • Declared disasters • Land use permits and geological reports • Internet • Insurance companies • Community experts
Mitigation – Hazard Identification • Inspections • Use macro and micro view • Community hazards • Cause and effect • Collateral or synergistic damage • Experienced Inspector
Mitigation – Hazard Identification • Checklists • Used to check completeness • Should not be the only tool used • Should answer: • How can employees be injured? • How can critical systems and assets be damaged or attacked? • What single points of failure exist? • What hazards can disrupt operations? • How will hazards affect the environment?
Mitigation –Hazard Identification • Process Analysis • Used for complex operations • Hazard and Operability (HAZOP) • Failure Mode and Effects Analysis (FMEA) • Preliminary Hazard Analysis (PrHA)
Mitigation - Hazard Identification • Hazard and Operability (HAZOP) • Deviation of a process from its designed intent • Guide words • Qualify or quantify the design criteria to identify deviations • “no,” “more,” “as well as,” and “other than,” • Consequences mapped
Mitigation – Hazard Identification • FMEA • Identifies relative risk of process design • Risks are rated related to each other using RPN • Assigns Risk Priority Number for each failure mode and its resulting effects • PrHA • Inventory system of hazards and risks • Develops expected loss rate
Mitigation – Hazard identification • Take the data from previous steps • Cause and Effect • Anticipate the unexpected • Scenario planning • Devise strategies based on future variables • Use mindset of the ‘enemy • Technical weakness that can be exploited
Mitigation – Hazard Identification • Methodology - Department of Homeland Security • Four modes to hazard identification • Application mode – the hazard • Duration • The length of time the target is affected by the hazard • Dynamic and static characteristics • Tendency of the hazard to change in relation to time, magnitude or area at risk • Mitigating and exacerbating conditions • Conditions that reduce or increase the hazard
Mitigation – Hazard identification • When identifying vulnerabilities and threats address the following • Inherent vulnerability • Threats due to nature of the target • Tactical vulnerability • Threats due to the presence or absence of protective measures
Mitigation – Hazard identification • Identify inherent and tactical vulnerabilities through: • Visibility • To the public and attackers • Utility • Accessibility • Asset mobility • Hazardous materials • Collateral damage • Occupancy • Threats are ranked to determine criticality
Mitigation Strategies • Mitigation strategies • General and specific • General strategies classified as: • Risk Management • Mitigating a risk is the most effective control • Engineering controls • Eg. CPED
Mitigation Strategies • Regulatory controls • Fire Safety codes • Often revised after a disaster • Administrative controls • Policies and agreements • Service agreements • Contractual agreements with 3rd party providers • Redundancies and divergence • Separation of process or hazards • Keep critical data, personnel, equipment and process away from hazards
Mitigation Stratergies • Specific mitigation can include: • Alternate power sources • Most common ‘disaster’ • Surges, spikes drops in power • Uninterruptible Power Supply • Multiple grids • Redundant power lines • Backup generators
Mitigation Stratergies • Alternate communications • Service and replacement agreements • Some vendors offer 24-hour replacement agreements • Bypass circuits and fax lines • Bypass main lines to backup facility • Divergent routing • Many modes for data transmission – wired wireless, fiber, cable, microwave, satellite • Cellular backup • Satellite systems • Hot / cold sites • Third party call centers
Mitigation Stratergies • Policies and procedures • Data back-up policies • Data backup strategies • Daily incremental • Full backup • Archiving • Data taken off site • Offsite facility must be monitored and audited
Mitigation Stratergies • Records Management • Loss of records major risk • Businesses fail to recover after a disaster if they loose records • Loss could bring criminal sanctions • Vital records important to continued operations
Mitigation Stratergies • Facilities salvage and restoration • Consequences of a fire or flood • Services available • Restoration can save up to 75% over replacement costs • Time to replace is also greater than restoration • Pre-registration • Restoration company performs inventory of assets
Mitigation Stratergies • Cost-effectiveness of mitigation • Solutions must be: • Cost-effective • Technically feasible • Not create additional hazards
Mitigation and Preparedness Preparedness • Steps taken to enable response • Important component of CEM • Have plans and resources in place, keep them updated and test • Capability to manage and respond to an incident
Mitigation and Preparedness Preparedness • Emergency Supplies for employees • stranded at work • Involved in recovery operations • Minimum 72 hour supply • Contents of cache • Spare parts • Service level agreements • Mutual agreements with competetiors • Justification