StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Response Strategies - Assignment Example

Cite this document
Summary
APS 210 – Risk and Vulnerability Assessment Writing Assignment #3 16th June 2011 Response Strategies Response Strategies are the various strategies that are used by security guards and personnel to combat the possible risk of security attacks. Various strategies have been devised and applied at certain places according to the potential of a security threat…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Response Strategies
Read Text Preview

Extract of sample "Response Strategies"

APS 210 – Risk and Vulnerability Assessment Writing Assignment #3 16th June Response Strategies Response Strategies are the various strategies that are used by security guards and personnel to combat the possible risk of security attacks. Various strategies have been devised and applied at certain places according to the potential of a security threat. These strategies include deterrence, denial, containment and finally recovery; all of which are aimed at maintaining proper security in low to high security risk areas.

Deterrence is a common type of response strategy used to combat security threats. It aims at deterring or dissuading a possible attack by portraying a high-level of security. This is done so as to encourage the idea that a security breech would be difficult to bring about. Deterrence is usually practiced in all private and government agencies where security personnel are required to be on their feet at all times, to conduct random patrols and to react effectively to any possible intrusions. In this way an impression of high security is created in order to deter a possible attack.

However, this method is only affective for low-level threats that are less motivated from the start, and may not be as effective against high-risk threats that are carefully maneuvered by the criminals. Denial Strategies are often used for the security of certain materials and equipments, for example, hazardous chemicals, nuclear weapons, explosives etc. Since use or release of these materials can put the common public at risk, a denial strategy is applied by which access to such material is prohibited.

In order to prevent any sort of breech, highly trained and armed security personnel are positioned so as to ensure timely reaction against any attack. Containment strategy is applied against theft of an asset. This strategy is usually practiced in places like banks and museums where valuable assets are in danger of being stolen. The practice of the containment strategy aims at confining and containing the criminal within the area before he is given a chance to escape with the stolen asset. In the possibility of a failure of this strategy, the Recovery Strategy is brought into use.

If the criminal has not been successfully detained or stopped in good time from stealing an asset and has escaped with it, attempt must then be made towards recovering the stolen asset. The security personnel must now direct its energy towards conducting investigations and tracking the stolen asset as well as keeping a close check on the movement and the possibilities of where the criminal may be found with the stolen asset. The most effective recovery response is where a back-up source has been kept, so that a temporary or probable permanent loss may not affect a business goal.

Also, some high value assets are protected by back-up plans in case of an unlikely or unfortunate event that they are stolen. These plans are devised in order to enter into precautionary agreements with the law enforcement agencies for the necessary actions that will be required to carry out in the case of a security breech. These response strategies also give rise to various response methods which include a delayed or immediate response according to the requirements of various situations and security threats.

According to the level of the threat, the required response is made to combat the threat most effectively. In certain situations it becomes necessary to dispatch unarmed security personnel for the purpose of hindering and or ending the security attack in a timely manner. However, dispatching unarmed personnel can only be effective provided that the security guards are in a large number and/or that they are equipped with certain equipments. In addition to this, their arrival at the scene of action also depends on how quickly the attack is detected, and the distance between their current position and their desired position.

Moreover, the unarmed guards must be properly trained to be able to efficiently react to the situation and to conduct the operation successfully. Training regarding the use of equipment such as handcuffs, pepper spray, batons etc. and approaching the adversaries, plus submitting proper reports and abiding by certain procedures is vital for the success of counteracting possible security attacks. Armed security guards are on the other hand trained to use deadly force if needed. They are placed at high-security sites and are trained to take the necessary action that the situation may require them to take.

Unarmed security personnel as opposed to armed security personnel would usually be dispatched either for low-risk threats like shop-lifting or where immediate action is required and there is risk of the adversaries escaping before the arrival of armed guards for example in the case of a burglary or robbery. Thus, the above explained response strategies, provided that they are properly carried out, ensure efficient maintenance of security. Guards and security personnel are trained to react in a timely manner to any security breech or threat so as to succeed in curbing any possible attacks and to maintain a secure environment in the best way possible for the well-being of the nation and its citizens.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Response Strategies Assignment Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Retrieved from https://studentshare.org/other/1425338-response-strategies
(Response Strategies Assignment Example | Topics and Well Written Essays - 500 Words - 1)
https://studentshare.org/other/1425338-response-strategies.
“Response Strategies Assignment Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/other/1425338-response-strategies.
  • Cited: 0 times

CHECK THESE SAMPLES OF Response Strategies

Project Risk Management

In addition, risk management plans will not be more effective and complete if risk Response Strategies are not suitable for developing mitigating risks (Ahmed, Azhar & Panthi, 2007, n.... The author of the assignment under the title "Project Risk Management" aims to address a two-fold objective to wit: (1) to discuss the importance of Monte Carlo techniques and (2) to explain the Risk response Matrix using information from outside sources.... Please briefly define the "Risk response Matrix"....
1 Pages (250 words) Assignment

647 W2A Project Selection Risk

As indicated, the details present the activities that need to be undertaken in various phases and within the indicated time frames.... The details of the project planning… The NLMS would be advantageous to various stakeholders of Great University (GU) through enabling the expansion of academic information through an improved database system....
4 Pages (1000 words) Essay

W5 D647 Risk Assessment Matrix

The development of a risk assessment matrix also assists the project team to prioritize the need to address risk Response Strategies depending on the risk indicators.... From the matrix, it could be deduced that the potential risks that were identified included the system failure, the corrections and revisions needed, the negative image that the failure has impacted on the organization's network, and the need for more resources for training… The seriousness, likelihood of occurrence, probability, and impact have been accurately identified (Chittoor, 2013). them to focus on high risk areas and to prepare strategies to address these risks Risk Assessment Matrix For the Briargrove Project al Affiliation Risk Assessment Matrix for the Briargrove Project The RiskAssessment MatrixPotential RisksSeriousnessLikelihoodProbabilityImpactSystem FailureMediumHigh 61-80%SignificantCorrections and revisions needed MediumLow41-60%NegligibleNegative Image on Organization's NetworkMediumHigh61-80%SignificantMore resources needed for training and orientation for comprehensive rolloutMediumMedium41-60%Moderate From the matrix, it could be deduced that the potential risks that were identified included the system failure, the corrections and revisions needed, the negative image that the failure has impacted on the organization's network, and the need for more resources for training and orientation for comprehensive rollout of the project on the learning library....
1 Pages (250 words) Essay

Correct Survey Organization within Research

Third, exploring alternatives to Response Strategies such as use of polite language may help in sustaining the interaction of the researcher and the respondent (Cooper & Schindler 2014).... However, alternative Response Strategies may be limited to the researcher....
2 Pages (500 words) Essay

Combining risk assessment and value engineering (this is project risk management class)

The combination of risk assessment and value engineering is of particular importance in ensuring that the benefits of value and risk management are both best delivered in the management of projects.... For value engineering to improve the overall value of the project, risk… An explicit reference to risk assessment at the early stages of a project ensures that the potential risks are understood, and targets identified through enhanced brainstorming....
5 Pages (1250 words) Essay

The Human Responses to Climatic Change

The adaptation strategies for Angostura were micro-surface modification of the landscape and technological improvement to better the living conditions while Maruca and PDI resort to relocation and then reoccupation after the precipitation period (Rivera-Collazo 637).... The article identifies the major rainwater harvesting strategies besides migration of the populations and distortion of their cultures as human coping mechanisms adopted in prehistoric times (Pandey, Gupta and Anderson 46)....
3 Pages (750 words) Essay

Hurricane Katrina and Louisiana State University

itroff (2005) argues that there are 7 types of crises, which he named as economic, informational, physical, human resources, reputational, psychopathic, and natural disasters, and according to Cooley and Cooley (2011), properly categorizing a crisis into definable and exclusive terms was critical in determining the Response Strategies necessary for reputation management.... ection BOrganizations' actions and Response Strategies, according to Coombs (2006, 1999), have a significant impact on their reputations, because they can be used to effect repairs, diminish adverse effects, and prevent negative behavioral intentions....
6 Pages (1500 words) Case Study

Various Rapid Emergency Response Strategies in Fire Incidences

… The paper "Various Rapid Emergency Response Strategies in Fire Incidences " is a good example of a literature review on education.... The paper "Various Rapid Emergency Response Strategies in Fire Incidences " is a good example of a literature review on education.... The task also involves various rapid emergency Response Strategies put in place in ensuring there are reduced fire incidences.... Europe is carrying out various strategies and practices to ensure that fire incidences do not occur or take place....
10 Pages (2500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us