12.07.2015 Views

Security Risk Assessment for Transport Operators - Department of ...

Security Risk Assessment for Transport Operators - Department of ...

Security Risk Assessment for Transport Operators - Department of ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sources <strong>of</strong> security risk can be looked at both in terms <strong>of</strong> the potential perpetrator and method(such as the threat from an arson attack [method] by animal rights activists [perpetrator]). To avoidover complicating the assessment and to incorporate the threat from a range <strong>of</strong> groups, the methodis <strong>of</strong>ten however referred to on its own (i.e. the threat from an arson attack).Table 2: Example sources <strong>of</strong> riskPotential sources <strong>of</strong> riskarson cyber attack armed assaulthijacking sabotage rioting and civil unrestsurveillance suicide bomber car bombchemical attack biological attack radiological attackpiracy package bomb hostage taking1.3.2 MethodologyWhen identifying sources <strong>of</strong> risk, it is useful to think both strategically and operationally to ensurethat all potential sources are considered. You may want to refer to the list <strong>of</strong> critical assets identifiedin Section 1.2 to assist the process.Table 3: Suggested methods <strong>for</strong> identifying sources <strong>of</strong> riskMethod Detail ExamplePools <strong>of</strong>expertsPastknowledgeStaffHorizonscanningThreatexpertsA collection <strong>of</strong> expertsfrom different fieldsA review <strong>of</strong> past incidentsto identify previouslyrealised threatsReviewing staff reports<strong>of</strong> suspicious activityAnticipating future threatsHarnessing theknowledge <strong>of</strong> subjectmatter expertsFor a rail company, a representative groupmay consist <strong>of</strong> a driver, manager and engineerReviewing historical attacks against other vesselsglobally, may assist a ferry operator identify potentialthreats that may be enacted domesticallyEncouraging depot managers to report anythreats they encounter, will assist in identifyingpotential trendsA major international event such as a G20 Summit,may bring additional threats not previously presentCyber attack may be identified as a threat, butexperts will be able to drill down to establish furtherdetailed elements such as malware or virusesWorkshop Group discussion At a business unit level, participants may wish toconsider which threats may affect their ability todeliver on the unit’s key objectivesOptional advanced technique:For companies looking to gaina better understanding <strong>of</strong> theirsources <strong>of</strong> risk, a more thoroughthreat assessment may be needed.Further detail on conducting athreat assessment can be foundin Appendix A.2 on page 33.Example 1: Identifying sources <strong>of</strong> riskWhilst undertaking a horizon scan <strong>for</strong> upcoming events, a bus company notes that asoccer match between teams from countries with historical political tensions is due to takeplace at a location serviced by the operator.As relations between the two countries have recently deteriorated, an extremist group inAustralia associated with one team has threatened violence against fans from the other.The company will be transporting the threatened team’s supporters. As a result, ‘politicalviolence’ is identified as a source <strong>of</strong> risk which has the potential to affect the bus company’scritical assets.<strong>Security</strong> <strong>Risk</strong> <strong>Assessment</strong> Guide 11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!