12.07.2015 Views

Security Risk Assessment for Transport Operators - Department of ...

Security Risk Assessment for Transport Operators - Department of ...

Security Risk Assessment for Transport Operators - Department of ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.5 Identifying the riskOnce you have established the three principal elements <strong>of</strong> the risk, you now combine them toidentify the final risk statement. The following flow diagram shows this process at work:Figure 2: <strong>Risk</strong> identificationExample 3Critical assetFerrySource <strong>of</strong> riskArmed assaultPotential areas<strong>of</strong> impactFatalities orserious injuriesIdentified riskFerry experiences an armed assaultresulting in fatalities or serious injuriesIn the above example the operator’s identified risk is: ‘Ferry experiences an armed assault resultingin fatalities or serious injuries.’As discussed in Example 2 (Identifying potential areas <strong>of</strong> impact), the source <strong>of</strong> risk associated with acritical asset may have multiple potential areas <strong>of</strong> impact. These can be combined as a single risk butit may be more beneficial to break them down into separate statements to allow each risk to be treatedin its own right. The example risk register on page Example 28 gives a 3practical demonstration <strong>of</strong> how this mightbe achieved to deliver two risks:‘Depot suffers an arson attack resulting Ferry in damage to rolling stock’, andCritical Asset‘Depot suffers an arson attack resulting in fatalities or serious injuries’1.6 Part Source 1 checklist <strong>of</strong> riskArmed assaultWhen you have completed Part 1, you should have:• Identified critical assetsPotential areasFatalities or• Identified sources <strong>of</strong> risk<strong>of</strong> impactserious injuries• Identified potential areas <strong>of</strong> impact• Finalised a list <strong>of</strong> identified risksOnce you have completed these steps, you Ferry should experiences move on to the an armed risk analysisprocess Identified outlined in Part risk 2.assault resulting in fatalitiesor serious injuries<strong>Security</strong> <strong>Risk</strong> <strong>Assessment</strong> Guide 13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!