SlideShare a Scribd company logo
1 of 6
1
2
Threat and Vulnerability Assessment
(Transportation Security Administration)
Jovan Padia
Introduction
All organizations are susceptible to certain risks linked to
threats. These threats may come from various factors such as
accidents, natural events, technological failure or human
intentions to cause harm. Regardless of the extent of the risk,
the organization should develop ways of mitigating or reducing
these risks. Transportation and Security Administration (TSA)
is no exception. The security officials as TSA should, therefore,
develop a risk management method that includes identifying the
risks, the assets and the internal and external threats to the
assets of the organization.
How the Security Officials Can Determine the Possible Risks at
TSA
A survey can be useful in the determination of the various
categories of risks. Organizations use the security officials to
conduct these studies. An excellent review outlines the
weaknesses in the external perimeters of the property, for
instance, the parking lot and gives strategies of reinforcing
these perimeters. The boundaries of a building are critical in
maintaining the assets of the business and protecting them from
the external threats. However, some risks still exist within the
company (Stewart, 2013).
Personnel and their behaviors of work can expose the
organization to the human made, natural and technological
threat. The natural hazards include adverse weather conditions
such as droughts, earthquakes, heat waves or blizzards. They
are very hard to avoid as they occur naturally. They, therefore,
need more attention and safer security measures in place.
Negative working performance can cause more damage in case
of these natural calamities. However, if the employees
collaborate with their employers, they can together help in
mitigating the threats that come with a result of the natural
disasters.
Technological and human-made risks include damages that can
be prevented if the employees follow the proper rules in each
case. There are standards and regulations in TSA that personnel
is expected to follow (Stewart, 2013). However, some people
may choose to break these rules and mishandle the assets of the
company such as computers and electrical appliances. Other
technological and human-made risks include dam failure, civil
disturbance, terrorism, fire, hazardous materials and security
breach. These risks can be mitigated by the change in workforce
behavior. Furthermore, every person in the organization has
defined roles that can lead to risks if not performed correctly.
Hazardous equipment within the structure can also be a source
of risks. These materials require certain guidelines in the
transportation industry to safeguard the individuals including
passengers from potential damages or accidents. Similarly, the
location of the premise can also expose the organization to the
possible threats. For instance, if the company is located in a
region that is prone of terrorists, there will be high chances of
terrorist attacks on the organization. Terrorism includes release
of toxic materials, bombing, fire, and information security
breach. Regardless of the type of risk, the behavior of the
employees can minimize the threats.
Types of Assets and Their Characterizations
The property in TSA is anything that is valuable to the
organization. The three primary assets in TSA are the human
resources, infrastructure, and data. The system was containing
the data and the infrastructure that links these systems are
critical assets to the organization. The support includes the AIT
machines that detect the objects with high density such as gels,
liquids, and powders that may pose a significant threat to the
organization's assets. The costs accompanying the
infrastructure, human resource and the company's data are also
a total asset to the team. All the assets mentioned above are
susceptible to the threats and should, therefore, be protected. In
the production environments of enterprises today, it is very
crucial to protect these assets.
Types of Interior and Exterior Threats
Internal Threats:
These are the risks that come within the system of the
organization (Lehtiranta, 2014). They may include malicious
employees and the non-malicious employees who make
mistakes. A malicious employee can log into the system through
his/ her personal server then share the information that is not
backed up then deletes all the information that is crucial to the
organization. Another internal threat can result from social
engineering whereby attackers get access to the organization's
network by exploiting information from the employees. Other
ways are through downloading malicious content from the
Internet. Similarly, information leakage can pose great threats
to the organization. Finally, internal threats can come from
mishandling of hazardous equipment such as electrical
appliances.
External Threats:
These are threats that originate from the outside network. They
can be from internet hackers, business competitors who would
want to sabotage the company and natural occurrences
(Lehtiranta, 2014). An unknown person or terrorist can
maliciously scan through the rooter of the organization's servers
and connect it to his/ her system then try out the password or
crack them to get access to the relevant information. The natural
external threats include computer database failure, airplane
crash, and release of hazardous materials, dam failure, power
outage, train derailment and urban fire.
Conclusion
With the emerging technology, the most susceptible asset to
threat is information due to technological failure. Data assets at
TSA should, therefore, be protected with an active security
management system. The company should also have the robust
risk management plan to mitigate other possible risks that may
occur as a result of natural occurrence or human-made prompts.
Organization Name and Address
TRANSPORTATION AND SECURITY ADMINISTRATION
(TSA)
Week 1: Threat and Risk Assessment Paper
Week 2: Vulnerability Paper
Week 3: Managing Vulnerabilities and Applying
Countermeasures Paper
Threat
Risk
PriorityRank
Vulnerabilities
Countermeasures & Cost
Probability
Criticality
Total
Cyber Attack
6/10
7/10
13/20
1
Robbery
3/10
2/10
5/20
3
Fire
3/10
3/10
6/20
2
References
Leese, M. (2016). Governing airport security between the
market and the public good. Criminology & Criminal Justice.
Lehtiranta, L. (2014). Risk perceptions and approaches in multi-
organizations: A research review 2000–2012. International
Journal of Project Management.
Stewart, M. G., & Mueller, J. (2013). Terrorism risks and
cost‐benefit analysis of aviation security. Risk Analysis, 893-
908.
12Threat and Vulnerability Assessment(Transportation Sec.docx

More Related Content

Similar to 12Threat and Vulnerability Assessment(Transportation Sec.docx

Journal+Feature-InsiderThreat
Journal+Feature-InsiderThreatJournal+Feature-InsiderThreat
Journal+Feature-InsiderThreatAnthony Buenger
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioSusanaFurman449
 
Cyber Intrusion Detection, Prevention, and Future IT Strategy
Cyber Intrusion Detection, Prevention, and Future IT StrategyCyber Intrusion Detection, Prevention, and Future IT Strategy
Cyber Intrusion Detection, Prevention, and Future IT StrategyIRJET Journal
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationIJERA Editor
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...MajedahAlkharji
 
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNERRunning Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNERMalikPinckney86
 
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threatsDean Evans
 
Report on Human factor in the financial industry
Report on Human factor in the financial industryReport on Human factor in the financial industry
Report on Human factor in the financial industryChandrak Trivedi
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisIJERD Editor
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfEnterprise Insider
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewdr_edw777
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRBill Besse
 
Introductory Physics Electrostatics Practice Problems Spring S.docx
Introductory Physics Electrostatics Practice Problems Spring S.docxIntroductory Physics Electrostatics Practice Problems Spring S.docx
Introductory Physics Electrostatics Practice Problems Spring S.docxbagotjesusa
 
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Inno Eroraha [NetSecurity]
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
FINAL PAPER1FINAL PAPER1
FINAL PAPER1FINAL PAPER1FINAL PAPER1FINAL PAPER1
FINAL PAPER1FINAL PAPER1ChereCheek752
 

Similar to 12Threat and Vulnerability Assessment(Transportation Sec.docx (20)

Outsourcing
OutsourcingOutsourcing
Outsourcing
 
Journal+Feature-InsiderThreat
Journal+Feature-InsiderThreatJournal+Feature-InsiderThreat
Journal+Feature-InsiderThreat
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questio
 
Cyber Intrusion Detection, Prevention, and Future IT Strategy
Cyber Intrusion Detection, Prevention, and Future IT StrategyCyber Intrusion Detection, Prevention, and Future IT Strategy
Cyber Intrusion Detection, Prevention, and Future IT Strategy
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...
 
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNERRunning Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
 
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
 
Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
 
Report on Human factor in the financial industry
Report on Human factor in the financial industryReport on Human factor in the financial industry
Report on Human factor in the financial industry
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LR
 
Introductory Physics Electrostatics Practice Problems Spring S.docx
Introductory Physics Electrostatics Practice Problems Spring S.docxIntroductory Physics Electrostatics Practice Problems Spring S.docx
Introductory Physics Electrostatics Practice Problems Spring S.docx
 
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
FINAL PAPER1FINAL PAPER1
FINAL PAPER1FINAL PAPER1FINAL PAPER1FINAL PAPER1
FINAL PAPER1FINAL PAPER1
 

More from moggdede

CASE STUDY COMMENTARY•  Individual written task in Harvard sty.docx
CASE STUDY COMMENTARY•  Individual written task in Harvard sty.docxCASE STUDY COMMENTARY•  Individual written task in Harvard sty.docx
CASE STUDY COMMENTARY•  Individual written task in Harvard sty.docxmoggdede
 
Case Study Chapter 5 100 wordsTranscultural Nursing in the.docx
Case Study Chapter 5 100 wordsTranscultural Nursing in the.docxCase Study Chapter 5 100 wordsTranscultural Nursing in the.docx
Case Study Chapter 5 100 wordsTranscultural Nursing in the.docxmoggdede
 
Case Study Chapter 10 Boss, We’ve got a problemBy Kayla Cur.docx
Case Study Chapter 10 Boss, We’ve got a problemBy Kayla Cur.docxCase Study Chapter 10 Boss, We’ve got a problemBy Kayla Cur.docx
Case Study Chapter 10 Boss, We’ve got a problemBy Kayla Cur.docxmoggdede
 
CASE STUDY Caregiver Role Strain Ms. Sandra A. Sandra, a 47-year-o.docx
CASE STUDY Caregiver Role Strain Ms. Sandra A. Sandra, a 47-year-o.docxCASE STUDY Caregiver Role Strain Ms. Sandra A. Sandra, a 47-year-o.docx
CASE STUDY Caregiver Role Strain Ms. Sandra A. Sandra, a 47-year-o.docxmoggdede
 
Case Study Answers Week 7 and 8Group OneIn your grou.docx
Case Study Answers Week 7 and 8Group OneIn your grou.docxCase Study Answers Week 7 and 8Group OneIn your grou.docx
Case Study Answers Week 7 and 8Group OneIn your grou.docxmoggdede
 
Case Study and Transition Plan TemplateCase StudyD.docx
Case Study and Transition Plan TemplateCase StudyD.docxCase Study and Transition Plan TemplateCase StudyD.docx
Case Study and Transition Plan TemplateCase StudyD.docxmoggdede
 
Case Study AnalysisRead Compassion for Samantha Case Study.docx
Case Study AnalysisRead Compassion for Samantha Case Study.docxCase Study AnalysisRead Compassion for Samantha Case Study.docx
Case Study AnalysisRead Compassion for Samantha Case Study.docxmoggdede
 
Case Study AnalysisAn understanding of cells and cell behavi.docx
Case Study AnalysisAn understanding of cells and cell behavi.docxCase Study AnalysisAn understanding of cells and cell behavi.docx
Case Study AnalysisAn understanding of cells and cell behavi.docxmoggdede
 
Case Study Analysis and FindingsThe final assignment for this co.docx
Case Study Analysis and FindingsThe final assignment for this co.docxCase Study Analysis and FindingsThe final assignment for this co.docx
Case Study Analysis and FindingsThe final assignment for this co.docxmoggdede
 
Case Study Analysis A TutorialWhat is it Case studies are a .docx
Case Study Analysis  A TutorialWhat is it  Case studies are a .docxCase Study Analysis  A TutorialWhat is it  Case studies are a .docx
Case Study Analysis A TutorialWhat is it Case studies are a .docxmoggdede
 
Case Study AlcoholCertain occasional behaviors can cause more tro.docx
Case Study AlcoholCertain occasional behaviors can cause more tro.docxCase Study AlcoholCertain occasional behaviors can cause more tro.docx
Case Study AlcoholCertain occasional behaviors can cause more tro.docxmoggdede
 
Case study A group of nurse educators are having a discussion about.docx
Case study A group of nurse educators are having a discussion about.docxCase study A group of nurse educators are having a discussion about.docx
Case study A group of nurse educators are having a discussion about.docxmoggdede
 
Case study ;1Callista Roy and Betty Neumans theories view the.docx
Case study ;1Callista Roy and Betty Neumans theories view the.docxCase study ;1Callista Roy and Betty Neumans theories view the.docx
Case study ;1Callista Roy and Betty Neumans theories view the.docxmoggdede
 
Case Study 9Running head BP & THE GULF OF MEXICO OIL SPILLC.docx
Case Study 9Running head BP & THE GULF OF MEXICO OIL SPILLC.docxCase Study 9Running head BP & THE GULF OF MEXICO OIL SPILLC.docx
Case Study 9Running head BP & THE GULF OF MEXICO OIL SPILLC.docxmoggdede
 
Case Study 9-1 IT Governance at University of the Southeast. Answer .docx
Case Study 9-1 IT Governance at University of the Southeast. Answer .docxCase Study 9-1 IT Governance at University of the Southeast. Answer .docx
Case Study 9-1 IT Governance at University of the Southeast. Answer .docxmoggdede
 
Case Study 7-2 Sony Pictures The Criminals Won. Answer question 2 W.docx
Case Study 7-2 Sony Pictures The Criminals Won. Answer question 2 W.docxCase Study 7-2 Sony Pictures The Criminals Won. Answer question 2 W.docx
Case Study 7-2 Sony Pictures The Criminals Won. Answer question 2 W.docxmoggdede
 
Case Study 8.1 Team DenialEmory University Holocaust studies pr.docx
Case Study 8.1 Team DenialEmory University Holocaust studies pr.docxCase Study 8.1 Team DenialEmory University Holocaust studies pr.docx
Case Study 8.1 Team DenialEmory University Holocaust studies pr.docxmoggdede
 
Case Study 7 Solving Team Challenges at DocSystems Billing, Inc.docx
Case Study 7 Solving Team Challenges at DocSystems Billing, Inc.docxCase Study 7 Solving Team Challenges at DocSystems Billing, Inc.docx
Case Study 7 Solving Team Challenges at DocSystems Billing, Inc.docxmoggdede
 
Case Study 5.2 Hiding the Real Story at Midwestern Community Acti.docx
Case Study 5.2 Hiding the Real Story at Midwestern Community Acti.docxCase Study 5.2 Hiding the Real Story at Midwestern Community Acti.docx
Case Study 5.2 Hiding the Real Story at Midwestern Community Acti.docxmoggdede
 
Case Study 5.1Write a 3 to 4 (not including title or reference.docx
Case Study 5.1Write a 3 to 4 (not including title or reference.docxCase Study 5.1Write a 3 to 4 (not including title or reference.docx
Case Study 5.1Write a 3 to 4 (not including title or reference.docxmoggdede
 

More from moggdede (20)

CASE STUDY COMMENTARY•  Individual written task in Harvard sty.docx
CASE STUDY COMMENTARY•  Individual written task in Harvard sty.docxCASE STUDY COMMENTARY•  Individual written task in Harvard sty.docx
CASE STUDY COMMENTARY•  Individual written task in Harvard sty.docx
 
Case Study Chapter 5 100 wordsTranscultural Nursing in the.docx
Case Study Chapter 5 100 wordsTranscultural Nursing in the.docxCase Study Chapter 5 100 wordsTranscultural Nursing in the.docx
Case Study Chapter 5 100 wordsTranscultural Nursing in the.docx
 
Case Study Chapter 10 Boss, We’ve got a problemBy Kayla Cur.docx
Case Study Chapter 10 Boss, We’ve got a problemBy Kayla Cur.docxCase Study Chapter 10 Boss, We’ve got a problemBy Kayla Cur.docx
Case Study Chapter 10 Boss, We’ve got a problemBy Kayla Cur.docx
 
CASE STUDY Caregiver Role Strain Ms. Sandra A. Sandra, a 47-year-o.docx
CASE STUDY Caregiver Role Strain Ms. Sandra A. Sandra, a 47-year-o.docxCASE STUDY Caregiver Role Strain Ms. Sandra A. Sandra, a 47-year-o.docx
CASE STUDY Caregiver Role Strain Ms. Sandra A. Sandra, a 47-year-o.docx
 
Case Study Answers Week 7 and 8Group OneIn your grou.docx
Case Study Answers Week 7 and 8Group OneIn your grou.docxCase Study Answers Week 7 and 8Group OneIn your grou.docx
Case Study Answers Week 7 and 8Group OneIn your grou.docx
 
Case Study and Transition Plan TemplateCase StudyD.docx
Case Study and Transition Plan TemplateCase StudyD.docxCase Study and Transition Plan TemplateCase StudyD.docx
Case Study and Transition Plan TemplateCase StudyD.docx
 
Case Study AnalysisRead Compassion for Samantha Case Study.docx
Case Study AnalysisRead Compassion for Samantha Case Study.docxCase Study AnalysisRead Compassion for Samantha Case Study.docx
Case Study AnalysisRead Compassion for Samantha Case Study.docx
 
Case Study AnalysisAn understanding of cells and cell behavi.docx
Case Study AnalysisAn understanding of cells and cell behavi.docxCase Study AnalysisAn understanding of cells and cell behavi.docx
Case Study AnalysisAn understanding of cells and cell behavi.docx
 
Case Study Analysis and FindingsThe final assignment for this co.docx
Case Study Analysis and FindingsThe final assignment for this co.docxCase Study Analysis and FindingsThe final assignment for this co.docx
Case Study Analysis and FindingsThe final assignment for this co.docx
 
Case Study Analysis A TutorialWhat is it Case studies are a .docx
Case Study Analysis  A TutorialWhat is it  Case studies are a .docxCase Study Analysis  A TutorialWhat is it  Case studies are a .docx
Case Study Analysis A TutorialWhat is it Case studies are a .docx
 
Case Study AlcoholCertain occasional behaviors can cause more tro.docx
Case Study AlcoholCertain occasional behaviors can cause more tro.docxCase Study AlcoholCertain occasional behaviors can cause more tro.docx
Case Study AlcoholCertain occasional behaviors can cause more tro.docx
 
Case study A group of nurse educators are having a discussion about.docx
Case study A group of nurse educators are having a discussion about.docxCase study A group of nurse educators are having a discussion about.docx
Case study A group of nurse educators are having a discussion about.docx
 
Case study ;1Callista Roy and Betty Neumans theories view the.docx
Case study ;1Callista Roy and Betty Neumans theories view the.docxCase study ;1Callista Roy and Betty Neumans theories view the.docx
Case study ;1Callista Roy and Betty Neumans theories view the.docx
 
Case Study 9Running head BP & THE GULF OF MEXICO OIL SPILLC.docx
Case Study 9Running head BP & THE GULF OF MEXICO OIL SPILLC.docxCase Study 9Running head BP & THE GULF OF MEXICO OIL SPILLC.docx
Case Study 9Running head BP & THE GULF OF MEXICO OIL SPILLC.docx
 
Case Study 9-1 IT Governance at University of the Southeast. Answer .docx
Case Study 9-1 IT Governance at University of the Southeast. Answer .docxCase Study 9-1 IT Governance at University of the Southeast. Answer .docx
Case Study 9-1 IT Governance at University of the Southeast. Answer .docx
 
Case Study 7-2 Sony Pictures The Criminals Won. Answer question 2 W.docx
Case Study 7-2 Sony Pictures The Criminals Won. Answer question 2 W.docxCase Study 7-2 Sony Pictures The Criminals Won. Answer question 2 W.docx
Case Study 7-2 Sony Pictures The Criminals Won. Answer question 2 W.docx
 
Case Study 8.1 Team DenialEmory University Holocaust studies pr.docx
Case Study 8.1 Team DenialEmory University Holocaust studies pr.docxCase Study 8.1 Team DenialEmory University Holocaust studies pr.docx
Case Study 8.1 Team DenialEmory University Holocaust studies pr.docx
 
Case Study 7 Solving Team Challenges at DocSystems Billing, Inc.docx
Case Study 7 Solving Team Challenges at DocSystems Billing, Inc.docxCase Study 7 Solving Team Challenges at DocSystems Billing, Inc.docx
Case Study 7 Solving Team Challenges at DocSystems Billing, Inc.docx
 
Case Study 5.2 Hiding the Real Story at Midwestern Community Acti.docx
Case Study 5.2 Hiding the Real Story at Midwestern Community Acti.docxCase Study 5.2 Hiding the Real Story at Midwestern Community Acti.docx
Case Study 5.2 Hiding the Real Story at Midwestern Community Acti.docx
 
Case Study 5.1Write a 3 to 4 (not including title or reference.docx
Case Study 5.1Write a 3 to 4 (not including title or reference.docxCase Study 5.1Write a 3 to 4 (not including title or reference.docx
Case Study 5.1Write a 3 to 4 (not including title or reference.docx
 

Recently uploaded

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

12Threat and Vulnerability Assessment(Transportation Sec.docx

  • 1. 1 2 Threat and Vulnerability Assessment (Transportation Security Administration) Jovan Padia Introduction All organizations are susceptible to certain risks linked to threats. These threats may come from various factors such as accidents, natural events, technological failure or human intentions to cause harm. Regardless of the extent of the risk, the organization should develop ways of mitigating or reducing these risks. Transportation and Security Administration (TSA) is no exception. The security officials as TSA should, therefore, develop a risk management method that includes identifying the risks, the assets and the internal and external threats to the assets of the organization. How the Security Officials Can Determine the Possible Risks at TSA A survey can be useful in the determination of the various categories of risks. Organizations use the security officials to conduct these studies. An excellent review outlines the weaknesses in the external perimeters of the property, for instance, the parking lot and gives strategies of reinforcing these perimeters. The boundaries of a building are critical in maintaining the assets of the business and protecting them from the external threats. However, some risks still exist within the company (Stewart, 2013). Personnel and their behaviors of work can expose the organization to the human made, natural and technological
  • 2. threat. The natural hazards include adverse weather conditions such as droughts, earthquakes, heat waves or blizzards. They are very hard to avoid as they occur naturally. They, therefore, need more attention and safer security measures in place. Negative working performance can cause more damage in case of these natural calamities. However, if the employees collaborate with their employers, they can together help in mitigating the threats that come with a result of the natural disasters. Technological and human-made risks include damages that can be prevented if the employees follow the proper rules in each case. There are standards and regulations in TSA that personnel is expected to follow (Stewart, 2013). However, some people may choose to break these rules and mishandle the assets of the company such as computers and electrical appliances. Other technological and human-made risks include dam failure, civil disturbance, terrorism, fire, hazardous materials and security breach. These risks can be mitigated by the change in workforce behavior. Furthermore, every person in the organization has defined roles that can lead to risks if not performed correctly. Hazardous equipment within the structure can also be a source of risks. These materials require certain guidelines in the transportation industry to safeguard the individuals including passengers from potential damages or accidents. Similarly, the location of the premise can also expose the organization to the possible threats. For instance, if the company is located in a region that is prone of terrorists, there will be high chances of terrorist attacks on the organization. Terrorism includes release of toxic materials, bombing, fire, and information security breach. Regardless of the type of risk, the behavior of the employees can minimize the threats. Types of Assets and Their Characterizations The property in TSA is anything that is valuable to the
  • 3. organization. The three primary assets in TSA are the human resources, infrastructure, and data. The system was containing the data and the infrastructure that links these systems are critical assets to the organization. The support includes the AIT machines that detect the objects with high density such as gels, liquids, and powders that may pose a significant threat to the organization's assets. The costs accompanying the infrastructure, human resource and the company's data are also a total asset to the team. All the assets mentioned above are susceptible to the threats and should, therefore, be protected. In the production environments of enterprises today, it is very crucial to protect these assets. Types of Interior and Exterior Threats Internal Threats: These are the risks that come within the system of the organization (Lehtiranta, 2014). They may include malicious employees and the non-malicious employees who make mistakes. A malicious employee can log into the system through his/ her personal server then share the information that is not backed up then deletes all the information that is crucial to the organization. Another internal threat can result from social engineering whereby attackers get access to the organization's network by exploiting information from the employees. Other ways are through downloading malicious content from the Internet. Similarly, information leakage can pose great threats to the organization. Finally, internal threats can come from mishandling of hazardous equipment such as electrical appliances. External Threats: These are threats that originate from the outside network. They can be from internet hackers, business competitors who would want to sabotage the company and natural occurrences (Lehtiranta, 2014). An unknown person or terrorist can maliciously scan through the rooter of the organization's servers
  • 4. and connect it to his/ her system then try out the password or crack them to get access to the relevant information. The natural external threats include computer database failure, airplane crash, and release of hazardous materials, dam failure, power outage, train derailment and urban fire. Conclusion With the emerging technology, the most susceptible asset to threat is information due to technological failure. Data assets at TSA should, therefore, be protected with an active security management system. The company should also have the robust risk management plan to mitigate other possible risks that may occur as a result of natural occurrence or human-made prompts. Organization Name and Address TRANSPORTATION AND SECURITY ADMINISTRATION (TSA) Week 1: Threat and Risk Assessment Paper Week 2: Vulnerability Paper Week 3: Managing Vulnerabilities and Applying Countermeasures Paper Threat Risk PriorityRank Vulnerabilities Countermeasures & Cost Probability Criticality Total Cyber Attack
  • 5. 6/10 7/10 13/20 1 Robbery 3/10 2/10 5/20 3 Fire 3/10 3/10 6/20 2 References Leese, M. (2016). Governing airport security between the market and the public good. Criminology & Criminal Justice. Lehtiranta, L. (2014). Risk perceptions and approaches in multi- organizations: A research review 2000–2012. International Journal of Project Management. Stewart, M. G., & Mueller, J. (2013). Terrorism risks and cost‐benefit analysis of aviation security. Risk Analysis, 893- 908.