SlideShare a Scribd company logo
1 of 8
RUNNING HEADER: AIRPORT PART 1
1
3
The Potential Threats and Vulnerabilities at the Richmond
International Airport
Part 1
CJUC 382
Kenton Shatzer
Liberty University
Introduction
This research paper is geared towards finding out the potential
threats and vulnerabilities at the Richmond International Airport
which is located in Virginia. The report will also enable us to
find out the state of security in the airport and whether its
customers, employees and their luggage and cargo are safe.
Security Stakeholders.
The security stakeholders at Richmond International Airport
include the security officers at the airport, passengers and all
the employees. Everyone has an obligation to take in ensuring
that airport is safe for all to travel. The security stakeholder
consists of: Security Committee (SC) and Security Working
Groups (SWG). They include even the top management of the
airlines and they are all involved in the formulation of
strategies, actions and major decision making with regards to
Richmond International Airport’s security (Cox & Clother,
2004).
Description of Assessment.
Threat Assessment
A threat refers to a plan to impose pain, wound and harm on
someone or something. Insecurity at Richmond International
Airport could pose a threat to the safety of passengers,
employees and that of the surrounding environment. As a result,
lives could be lost, people would lose out on jobs and the
airport could be no more leading to damages on the economy
(Haerens & Zott, 2013). The attacks could be well organized by
groups of terrorists and they could range hijacking of the
planes, plane suicide bombers, taking passengers hostage and
even kidnapping. Some of the possible the threats at the airport
would include;
1. Bombs and nuclear materials hidden in the freight cargo. If
the bomb could go off then the whole plan and the passengers in
it could be in real danger.
2. Stealing from passengers. The passengers would be
angered by the theft thus losing faith in Richmond International
Airport and consequently reducing the number of customers.
The company’s name would be tarnished (Cox & Clother, 2004).
3. Explosive devices hidden in the aircrafts and sometimes in
the passenger terminal. If the devices would explode they would
lead to massive loss of lives.
4. Hijacking aircrafts. When aircrafts are hijacked, the
amount of tension in the environment increases causing fear and
panic among passengers. In some cases it leads to killing of
passengers by the hijackers if they do not comply with their
wishes.
5. Illegal immigrations whereby people who are not cleared
by the immigrations office could make travel arrangements and
eventually leave the state thus increasing the number of
individuals who are in the country illegally.
6. Cyber-attacks carried out by malicious people corrupt the
organization’s computer and information system. The whole
airport would eventually be at a standstill since they cannot
access any information from their computers.
7. Sabotage of equipment used to maintain the aircrafts; this
would be disastrous as it would cause damage to the plane and
in some cases delay departure time.
8. Poisonous chemicals released in the passenger terminal
would lead to poisoning of innocent passengers and some would
lose their lives.
9. Attacks on aircrafts while landing or taking off. The attack
would cause panic and tension among passengers and also
delays in departure and arrivals time (Corporation, 2002).
These threats are classified as follows:
Natural; these are caused by uncontrollable circumstances. None
of the threats listed is caused by a natural occurrence.
Accident; these are calamities or misfortunes and they are not
intentional. They include:
• Illegal immigrations.
Malicious; these threats are caused intentionally with the aim of
causing harm to the person involved. They consist of:
• Bombs and nuclear materials hidden in the freight cargo.
• Stealing from passengers.
• Explosive devices hidden in the aircrafts and sometimes in
the passenger terminal.
• Hijacking aircrafts.
• Cyber-attacks.
• Sabotage of equipment used to maintain the aircrafts.
• Poisonous chemicals released in the passenger terminal.
• Attacks on aircrafts while landing or taking off.
Vulnerabilities Assessment.
Vulnerability refers to a person’s failure to endure a hostile
environment. Richmond International Airport has many assets.
These assets are the most vulnerable. The assets comprise:
aircrafts, airline buildings, fuel facilities, passengers, cargo and
mail terminals and power facilities. Some of the vulnerabilities
identified comprise:
1. Smuggling of weapons in airports. This aids weapon
smugglers and encourages existence of illegal weapons into the
state. It is dangerous as there would be a gun fight at the airport
in the consequently leading to deaths (Cox & Clother, 2004).
2. Smuggling of drugs via airports into the country. Drug
traffickers use airports to traffic drugs and bring them into the
country. Drugs are risky when they are exposed to people in the
country as they would cause addictions especially among young
people who the future generation.
3. Exposure of explosives and other explosive devices in the
airports. These would cause mass destruction to the airline
buildings and eventually damage to the economy since people
would be out of jobs if the airline buildings would be destroyed.
These vulnerabilities have major impacts. The impacts can be
categorized as:
• Catastrophic. This refers to very destructive situation that
is disastrous. The situation is remote or rare.
• Critical. The situation referred to is serious and is likely to
be disastrous. The situation is highly likely to occur (Haerens
& Zott, 2013).
• Limited. The extent of the situation is at restricted. The
situation is possible.
• Minor. The damage is little and cannot harm. The situation
is likely to occur.
• Negligible. The extent of damage is manageable for this
kind of vulnerability. The situation is unlikely to occur.
References
Corporation, N. L. (2002). Airport Security DGuard. Syosset,
N.Y. : National Learning Corp.
Cox, M., & Clother, P. (2004). Whistleblower: Airport Security.
London: British Broadcasting Corporation.
Haerens, M., & Zott, L. M. (2013). US airport security. Detroit:
Greenhaven Press.
J, P. J. (2013). Practical Aviation Security, Second Edition:
Predicting and Preventing Future Threats (Butterworth-
Heinemann Homeland Security) . Chicago: Chicago press.
CJUS 382
Airport Assessment Part 2 Instructions
You have now been tasked with developing a report for airport
administrators. This report must include a risk analysis and
recommendations for minimizing threats and vulnerabilities. As
with Part 1, this assessment is based on your knowledge gained
from the information in this course and any outside sources you
locate (scholarly, governmental, or academic). You will need to
conduct research outside the text. For instance, using a risk
assessment tool from a credible source (with proper citations)
may be useful.
Prepare a formal report on your findings and recommendations.
The report must follow strict APA guidelines and at least 4
sources must be properly cited. This report will include a
qualitative analysis. As such, spreadsheets must be developed to
clarify your findings and position. The report must consist of
900–1,400 words. This assignment is due by 11:59 p.m. (ET) on
Friday of Module/Week 8.
The outline of the report must include at a minimum:
· Introduction
[Provide a brief introduction outlining the purpose and scope of
this report.]
· Overview and Impact
[Discuss the potential critical infrastructure(s) impacted. What
are the consequences? Include the level of impact (e.g., local,
state, national, and/or global). Provide considerations for threat
sources and motivations. Address any legal requirements and
responsibilities.]
· Risk Assessment
[Develop a qualitative risk analysis method (see the risk matrix
below) with a risk rating system. For instance, low, medium,
and high with assigned numerical values for each (e.g., 1 to 5
equals low and so on). You may modify or use this matrix as
you own without citations. However, you may also develop your
own or use a different model]
Risk Matrix
Negligible
(1)
Minor
(2)
Limited
(3)
Critical
(4)
Catastrophic
(5)
Highly Likely (5)
5
10
15
20
25
Likely (4)
4
8
12
16
20
Possible (3)
3
6
9
12
15
Unlikely (2)
2
4
6
7
10
Remote/Rare (1)
1
2
3
4
5
[Using the information in Part 1 of your report, develop and
present a risk assessment. Based on the previous instructions,
each risk should be rated with a specific risk level. This section
should include a presentation of all risks in a clear and concise
format.]
· Recommendations
[Develop logical recommendations for minimizing risks.
Consideration should be given to cost effectiveness. For
instance, one security measure such as a perimeter fence can
eliminate multiple risks. Present recommendations in a simple
and logical format.]
· Summary and Conclusion
[Summarize your findings. Further support your position.]
Page 1 of 2

More Related Content

Similar to RUNNING HEADER AIRPORT PART 1 .docx

UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019ChadCogan
 
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdfGramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdfGramax Cybersec
 
Blending risk analysis with executive protection
Blending risk analysis with executive protectionBlending risk analysis with executive protection
Blending risk analysis with executive protectionDavid Sweigert
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilRussell Publishing
 
The Unmanned Aerial System Can Also Loiter At A Different...
The Unmanned Aerial System Can Also Loiter At A Different...The Unmanned Aerial System Can Also Loiter At A Different...
The Unmanned Aerial System Can Also Loiter At A Different...Tara Hardin
 
Criticality analysis of Critical Infrastructures (CI) – parameters and criter...
Criticality analysis of Critical Infrastructures (CI) – parameters and criter...Criticality analysis of Critical Infrastructures (CI) – parameters and criter...
Criticality analysis of Critical Infrastructures (CI) – parameters and criter...Global Risk Forum GRFDavos
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Establishments that Need Drone Safety More than Ever
Establishments that Need Drone Safety More than EverEstablishments that Need Drone Safety More than Ever
Establishments that Need Drone Safety More than EverNovoQuad
 
Running Head SAFETY IN AVIATION .docx
Running Head SAFETY IN AVIATION                                  .docxRunning Head SAFETY IN AVIATION                                  .docx
Running Head SAFETY IN AVIATION .docxcharisellington63520
 
Running Head SAFETY IN AVIATION .docx
Running Head SAFETY IN AVIATION                                  .docxRunning Head SAFETY IN AVIATION                                  .docx
Running Head SAFETY IN AVIATION .docxtodd521
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYAndrew Bichlmeier
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxstilliegeorgiana
 
Hse, Risk Assessment
Hse, Risk AssessmentHse, Risk Assessment
Hse, Risk AssessmentTara Smith
 

Similar to RUNNING HEADER AIRPORT PART 1 .docx (17)

UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019
 
FMASP_ShowAudio_short
FMASP_ShowAudio_shortFMASP_ShowAudio_short
FMASP_ShowAudio_short
 
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdfGramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
 
Blending risk analysis with executive protection
Blending risk analysis with executive protectionBlending risk analysis with executive protection
Blending risk analysis with executive protection
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
 
The Unmanned Aerial System Can Also Loiter At A Different...
The Unmanned Aerial System Can Also Loiter At A Different...The Unmanned Aerial System Can Also Loiter At A Different...
The Unmanned Aerial System Can Also Loiter At A Different...
 
Criticality analysis of Critical Infrastructures (CI) – parameters and criter...
Criticality analysis of Critical Infrastructures (CI) – parameters and criter...Criticality analysis of Critical Infrastructures (CI) – parameters and criter...
Criticality analysis of Critical Infrastructures (CI) – parameters and criter...
 
Security Aspects in Aviation Sector
Security Aspects in Aviation SectorSecurity Aspects in Aviation Sector
Security Aspects in Aviation Sector
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Establishments that Need Drone Safety More than Ever
Establishments that Need Drone Safety More than EverEstablishments that Need Drone Safety More than Ever
Establishments that Need Drone Safety More than Ever
 
Running Head SAFETY IN AVIATION .docx
Running Head SAFETY IN AVIATION                                  .docxRunning Head SAFETY IN AVIATION                                  .docx
Running Head SAFETY IN AVIATION .docx
 
Running Head SAFETY IN AVIATION .docx
Running Head SAFETY IN AVIATION                                  .docxRunning Head SAFETY IN AVIATION                                  .docx
Running Head SAFETY IN AVIATION .docx
 
403 3
403 3403 3
403 3
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITY
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
 
Hse, Risk Assessment
Hse, Risk AssessmentHse, Risk Assessment
Hse, Risk Assessment
 

More from agnesdcarey33086

Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docx
Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docxSample Summaries of Emily Raine’s Why Should I Be Nice to You.docx
Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docxagnesdcarey33086
 
SAMPLEExecutive Summary The following report is an evalua.docx
SAMPLEExecutive Summary The following report is an evalua.docxSAMPLEExecutive Summary The following report is an evalua.docx
SAMPLEExecutive Summary The following report is an evalua.docxagnesdcarey33086
 
Sample Student Industry AnalysisExecutive SummaryCom.docx
Sample Student Industry AnalysisExecutive SummaryCom.docxSample Student Industry AnalysisExecutive SummaryCom.docx
Sample Student Industry AnalysisExecutive SummaryCom.docxagnesdcarey33086
 
sample.sql-- START-- SETUP Create userCREATE USER .docx
sample.sql-- START-- SETUP Create userCREATE USER .docxsample.sql-- START-- SETUP Create userCREATE USER .docx
sample.sql-- START-- SETUP Create userCREATE USER .docxagnesdcarey33086
 
SAMPLING MEAN DEFINITION The term sampling mean is.docx
SAMPLING MEAN  DEFINITION  The term sampling mean is.docxSAMPLING MEAN  DEFINITION  The term sampling mean is.docx
SAMPLING MEAN DEFINITION The term sampling mean is.docxagnesdcarey33086
 
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docx
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docxSAMPLING MEANDEFINITIONThe term sampling mean is a stati.docx
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docxagnesdcarey33086
 
sampleReportt.docxPower Electronics Contents.docx
sampleReportt.docxPower Electronics            Contents.docxsampleReportt.docxPower Electronics            Contents.docx
sampleReportt.docxPower Electronics Contents.docxagnesdcarey33086
 
Sample Workflow of Answering a Telephone in an OfficeInform .docx
Sample Workflow of Answering a Telephone in an OfficeInform .docxSample Workflow of Answering a Telephone in an OfficeInform .docx
Sample Workflow of Answering a Telephone in an OfficeInform .docxagnesdcarey33086
 
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docx
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docxSample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docx
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docxagnesdcarey33086
 
SAMPLE Project (Answers and explanations are in red)I opened t.docx
SAMPLE Project (Answers and explanations are in red)I opened t.docxSAMPLE Project (Answers and explanations are in red)I opened t.docx
SAMPLE Project (Answers and explanations are in red)I opened t.docxagnesdcarey33086
 
Sample Questions to Ask During an Informational Interview .docx
Sample Questions to Ask During an Informational Interview  .docxSample Questions to Ask During an Informational Interview  .docx
Sample Questions to Ask During an Informational Interview .docxagnesdcarey33086
 
Sample Table.pdfTopic RatingPatients Goal Able to walk .docx
Sample Table.pdfTopic RatingPatients Goal Able to walk .docxSample Table.pdfTopic RatingPatients Goal Able to walk .docx
Sample Table.pdfTopic RatingPatients Goal Able to walk .docxagnesdcarey33086
 
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docx
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docxSAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docx
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docxagnesdcarey33086
 
Sample PowerPoint Flow Week 5Select a current product with which.docx
Sample PowerPoint Flow Week 5Select a current product with which.docxSample PowerPoint Flow Week 5Select a current product with which.docx
Sample PowerPoint Flow Week 5Select a current product with which.docxagnesdcarey33086
 
Sample Of assignmentIntroductionComment by Jane Summers Introd.docx
Sample Of assignmentIntroductionComment by Jane Summers Introd.docxSample Of assignmentIntroductionComment by Jane Summers Introd.docx
Sample Of assignmentIntroductionComment by Jane Summers Introd.docxagnesdcarey33086
 
Sample Access Control Policy1.Purpose2.Scope3.Pol.docx
Sample Access Control Policy1.Purpose2.Scope3.Pol.docxSample Access Control Policy1.Purpose2.Scope3.Pol.docx
Sample Access Control Policy1.Purpose2.Scope3.Pol.docxagnesdcarey33086
 
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docx
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docxSAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docx
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docxagnesdcarey33086
 
Sample Action Research Report 1 Effect of Technol.docx
Sample Action Research Report 1    Effect of Technol.docxSample Action Research Report 1    Effect of Technol.docx
Sample Action Research Report 1 Effect of Technol.docxagnesdcarey33086
 
Sample Case with a report Dawit Zerom, Instructor Cas.docx
Sample Case with a report Dawit Zerom, Instructor  Cas.docxSample Case with a report Dawit Zerom, Instructor  Cas.docx
Sample Case with a report Dawit Zerom, Instructor Cas.docxagnesdcarey33086
 
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docx
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docxSalkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docx
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docxagnesdcarey33086
 

More from agnesdcarey33086 (20)

Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docx
Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docxSample Summaries of Emily Raine’s Why Should I Be Nice to You.docx
Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docx
 
SAMPLEExecutive Summary The following report is an evalua.docx
SAMPLEExecutive Summary The following report is an evalua.docxSAMPLEExecutive Summary The following report is an evalua.docx
SAMPLEExecutive Summary The following report is an evalua.docx
 
Sample Student Industry AnalysisExecutive SummaryCom.docx
Sample Student Industry AnalysisExecutive SummaryCom.docxSample Student Industry AnalysisExecutive SummaryCom.docx
Sample Student Industry AnalysisExecutive SummaryCom.docx
 
sample.sql-- START-- SETUP Create userCREATE USER .docx
sample.sql-- START-- SETUP Create userCREATE USER .docxsample.sql-- START-- SETUP Create userCREATE USER .docx
sample.sql-- START-- SETUP Create userCREATE USER .docx
 
SAMPLING MEAN DEFINITION The term sampling mean is.docx
SAMPLING MEAN  DEFINITION  The term sampling mean is.docxSAMPLING MEAN  DEFINITION  The term sampling mean is.docx
SAMPLING MEAN DEFINITION The term sampling mean is.docx
 
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docx
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docxSAMPLING MEANDEFINITIONThe term sampling mean is a stati.docx
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docx
 
sampleReportt.docxPower Electronics Contents.docx
sampleReportt.docxPower Electronics            Contents.docxsampleReportt.docxPower Electronics            Contents.docx
sampleReportt.docxPower Electronics Contents.docx
 
Sample Workflow of Answering a Telephone in an OfficeInform .docx
Sample Workflow of Answering a Telephone in an OfficeInform .docxSample Workflow of Answering a Telephone in an OfficeInform .docx
Sample Workflow of Answering a Telephone in an OfficeInform .docx
 
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docx
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docxSample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docx
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docx
 
SAMPLE Project (Answers and explanations are in red)I opened t.docx
SAMPLE Project (Answers and explanations are in red)I opened t.docxSAMPLE Project (Answers and explanations are in red)I opened t.docx
SAMPLE Project (Answers and explanations are in red)I opened t.docx
 
Sample Questions to Ask During an Informational Interview .docx
Sample Questions to Ask During an Informational Interview  .docxSample Questions to Ask During an Informational Interview  .docx
Sample Questions to Ask During an Informational Interview .docx
 
Sample Table.pdfTopic RatingPatients Goal Able to walk .docx
Sample Table.pdfTopic RatingPatients Goal Able to walk .docxSample Table.pdfTopic RatingPatients Goal Able to walk .docx
Sample Table.pdfTopic RatingPatients Goal Able to walk .docx
 
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docx
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docxSAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docx
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docx
 
Sample PowerPoint Flow Week 5Select a current product with which.docx
Sample PowerPoint Flow Week 5Select a current product with which.docxSample PowerPoint Flow Week 5Select a current product with which.docx
Sample PowerPoint Flow Week 5Select a current product with which.docx
 
Sample Of assignmentIntroductionComment by Jane Summers Introd.docx
Sample Of assignmentIntroductionComment by Jane Summers Introd.docxSample Of assignmentIntroductionComment by Jane Summers Introd.docx
Sample Of assignmentIntroductionComment by Jane Summers Introd.docx
 
Sample Access Control Policy1.Purpose2.Scope3.Pol.docx
Sample Access Control Policy1.Purpose2.Scope3.Pol.docxSample Access Control Policy1.Purpose2.Scope3.Pol.docx
Sample Access Control Policy1.Purpose2.Scope3.Pol.docx
 
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docx
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docxSAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docx
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docx
 
Sample Action Research Report 1 Effect of Technol.docx
Sample Action Research Report 1    Effect of Technol.docxSample Action Research Report 1    Effect of Technol.docx
Sample Action Research Report 1 Effect of Technol.docx
 
Sample Case with a report Dawit Zerom, Instructor Cas.docx
Sample Case with a report Dawit Zerom, Instructor  Cas.docxSample Case with a report Dawit Zerom, Instructor  Cas.docx
Sample Case with a report Dawit Zerom, Instructor Cas.docx
 
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docx
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docxSalkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docx
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docx
 

Recently uploaded

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

RUNNING HEADER AIRPORT PART 1 .docx

  • 1. RUNNING HEADER: AIRPORT PART 1 1 3 The Potential Threats and Vulnerabilities at the Richmond International Airport Part 1 CJUC 382 Kenton Shatzer Liberty University Introduction This research paper is geared towards finding out the potential threats and vulnerabilities at the Richmond International Airport which is located in Virginia. The report will also enable us to find out the state of security in the airport and whether its customers, employees and their luggage and cargo are safe. Security Stakeholders. The security stakeholders at Richmond International Airport include the security officers at the airport, passengers and all the employees. Everyone has an obligation to take in ensuring that airport is safe for all to travel. The security stakeholder consists of: Security Committee (SC) and Security Working
  • 2. Groups (SWG). They include even the top management of the airlines and they are all involved in the formulation of strategies, actions and major decision making with regards to Richmond International Airport’s security (Cox & Clother, 2004). Description of Assessment. Threat Assessment A threat refers to a plan to impose pain, wound and harm on someone or something. Insecurity at Richmond International Airport could pose a threat to the safety of passengers, employees and that of the surrounding environment. As a result, lives could be lost, people would lose out on jobs and the airport could be no more leading to damages on the economy (Haerens & Zott, 2013). The attacks could be well organized by groups of terrorists and they could range hijacking of the planes, plane suicide bombers, taking passengers hostage and even kidnapping. Some of the possible the threats at the airport would include; 1. Bombs and nuclear materials hidden in the freight cargo. If the bomb could go off then the whole plan and the passengers in it could be in real danger. 2. Stealing from passengers. The passengers would be angered by the theft thus losing faith in Richmond International Airport and consequently reducing the number of customers. The company’s name would be tarnished (Cox & Clother, 2004). 3. Explosive devices hidden in the aircrafts and sometimes in the passenger terminal. If the devices would explode they would lead to massive loss of lives. 4. Hijacking aircrafts. When aircrafts are hijacked, the amount of tension in the environment increases causing fear and panic among passengers. In some cases it leads to killing of passengers by the hijackers if they do not comply with their wishes. 5. Illegal immigrations whereby people who are not cleared by the immigrations office could make travel arrangements and eventually leave the state thus increasing the number of
  • 3. individuals who are in the country illegally. 6. Cyber-attacks carried out by malicious people corrupt the organization’s computer and information system. The whole airport would eventually be at a standstill since they cannot access any information from their computers. 7. Sabotage of equipment used to maintain the aircrafts; this would be disastrous as it would cause damage to the plane and in some cases delay departure time. 8. Poisonous chemicals released in the passenger terminal would lead to poisoning of innocent passengers and some would lose their lives. 9. Attacks on aircrafts while landing or taking off. The attack would cause panic and tension among passengers and also delays in departure and arrivals time (Corporation, 2002). These threats are classified as follows: Natural; these are caused by uncontrollable circumstances. None of the threats listed is caused by a natural occurrence. Accident; these are calamities or misfortunes and they are not intentional. They include: • Illegal immigrations. Malicious; these threats are caused intentionally with the aim of causing harm to the person involved. They consist of: • Bombs and nuclear materials hidden in the freight cargo. • Stealing from passengers. • Explosive devices hidden in the aircrafts and sometimes in the passenger terminal. • Hijacking aircrafts. • Cyber-attacks. • Sabotage of equipment used to maintain the aircrafts. • Poisonous chemicals released in the passenger terminal. • Attacks on aircrafts while landing or taking off. Vulnerabilities Assessment. Vulnerability refers to a person’s failure to endure a hostile environment. Richmond International Airport has many assets. These assets are the most vulnerable. The assets comprise: aircrafts, airline buildings, fuel facilities, passengers, cargo and
  • 4. mail terminals and power facilities. Some of the vulnerabilities identified comprise: 1. Smuggling of weapons in airports. This aids weapon smugglers and encourages existence of illegal weapons into the state. It is dangerous as there would be a gun fight at the airport in the consequently leading to deaths (Cox & Clother, 2004). 2. Smuggling of drugs via airports into the country. Drug traffickers use airports to traffic drugs and bring them into the country. Drugs are risky when they are exposed to people in the country as they would cause addictions especially among young people who the future generation. 3. Exposure of explosives and other explosive devices in the airports. These would cause mass destruction to the airline buildings and eventually damage to the economy since people would be out of jobs if the airline buildings would be destroyed. These vulnerabilities have major impacts. The impacts can be categorized as: • Catastrophic. This refers to very destructive situation that is disastrous. The situation is remote or rare. • Critical. The situation referred to is serious and is likely to be disastrous. The situation is highly likely to occur (Haerens & Zott, 2013). • Limited. The extent of the situation is at restricted. The situation is possible. • Minor. The damage is little and cannot harm. The situation is likely to occur. • Negligible. The extent of damage is manageable for this kind of vulnerability. The situation is unlikely to occur.
  • 5. References Corporation, N. L. (2002). Airport Security DGuard. Syosset, N.Y. : National Learning Corp. Cox, M., & Clother, P. (2004). Whistleblower: Airport Security. London: British Broadcasting Corporation. Haerens, M., & Zott, L. M. (2013). US airport security. Detroit: Greenhaven Press. J, P. J. (2013). Practical Aviation Security, Second Edition: Predicting and Preventing Future Threats (Butterworth- Heinemann Homeland Security) . Chicago: Chicago press. CJUS 382 Airport Assessment Part 2 Instructions You have now been tasked with developing a report for airport administrators. This report must include a risk analysis and recommendations for minimizing threats and vulnerabilities. As with Part 1, this assessment is based on your knowledge gained from the information in this course and any outside sources you locate (scholarly, governmental, or academic). You will need to conduct research outside the text. For instance, using a risk assessment tool from a credible source (with proper citations) may be useful. Prepare a formal report on your findings and recommendations. The report must follow strict APA guidelines and at least 4 sources must be properly cited. This report will include a qualitative analysis. As such, spreadsheets must be developed to
  • 6. clarify your findings and position. The report must consist of 900–1,400 words. This assignment is due by 11:59 p.m. (ET) on Friday of Module/Week 8. The outline of the report must include at a minimum: · Introduction [Provide a brief introduction outlining the purpose and scope of this report.] · Overview and Impact [Discuss the potential critical infrastructure(s) impacted. What are the consequences? Include the level of impact (e.g., local, state, national, and/or global). Provide considerations for threat sources and motivations. Address any legal requirements and responsibilities.] · Risk Assessment [Develop a qualitative risk analysis method (see the risk matrix below) with a risk rating system. For instance, low, medium, and high with assigned numerical values for each (e.g., 1 to 5 equals low and so on). You may modify or use this matrix as you own without citations. However, you may also develop your own or use a different model] Risk Matrix Negligible (1) Minor (2) Limited (3) Critical (4) Catastrophic (5) Highly Likely (5) 5 10 15
  • 7. 20 25 Likely (4) 4 8 12 16 20 Possible (3) 3 6 9 12 15 Unlikely (2) 2 4 6 7 10 Remote/Rare (1) 1 2 3 4 5 [Using the information in Part 1 of your report, develop and present a risk assessment. Based on the previous instructions, each risk should be rated with a specific risk level. This section should include a presentation of all risks in a clear and concise format.] · Recommendations [Develop logical recommendations for minimizing risks. Consideration should be given to cost effectiveness. For instance, one security measure such as a perimeter fence can
  • 8. eliminate multiple risks. Present recommendations in a simple and logical format.] · Summary and Conclusion [Summarize your findings. Further support your position.] Page 1 of 2