12.07.2015 Views

Security Risk Assessment for Transport Operators - Department of ...

Security Risk Assessment for Transport Operators - Department of ...

Security Risk Assessment for Transport Operators - Department of ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Example 10: Conducting a criticality assessmentAssetA local ferry company has one pier at each end <strong>of</strong> its only route, with noalternatives identified.Impact from worst case scenarioThe most plausible worst case scenario is complete physical loss <strong>of</strong> the pier, whichwould lead to services being terminated <strong>for</strong> at least two months.MethodologyThe company uses Table 9 to assess criticality and rates as ‘extreme’, the loss <strong>of</strong> anyasset or dependency which leads to a complete cessation <strong>of</strong> services <strong>for</strong> at least onemonth (operational).The criticality <strong>of</strong> each pier is there<strong>for</strong>e rated as ‘extreme’.As the company treats anything rated as ‘high’ or ‘extreme’ as a critical asset,each pier is added to the list <strong>of</strong> critical assets.The company’s criticality assessment now states:AssetImpact from worstcase scenarioCriticalityratingCriticalasset?PierTermination <strong>of</strong> services <strong>for</strong> aperiod <strong>of</strong> at least two monthsExtremeYesA.2 Conducting a threat assessmentUnderstanding the composition <strong>of</strong> threats and allocating them a rating, can be <strong>of</strong> substantial usein gaining a deeper understanding <strong>of</strong> the overall threat environment in which you operate. A morein-depth knowledge can be <strong>of</strong> benefit in the later stages <strong>of</strong> the risk assessment process, particularlyin establishing the likelihood <strong>of</strong> risks and prioritising.For the purposes <strong>of</strong> this document:Threat is determined by assessing intent and capability.Table 10: Intent and capability descriptorsOptional advanced technique:For smaller operators, identifyingindividual sources <strong>of</strong> risk may beall that is required. For others,gaining a greater understandingand rating factors that drive thethreat may be desirable.IntentCapabilityDetailFocuses on an individual or group’smotivation and objectives.Considers an individual or group’sknowledge, skills andaccess to resources.ExampleTo take vengeance on an organisation<strong>for</strong> previous actions (such assupporting a particular cause).An insider’s knowledge <strong>of</strong> securityprocedures, access and ability to usea range <strong>of</strong> firearms.In order to rate the threat, the intent and capability <strong>of</strong> the attacker should be assessed thencross-referenced to determine a threat rating.<strong>Security</strong> <strong>Risk</strong> <strong>Assessment</strong> Guide 33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!