HLSS505 AMU Risk Analysis And Critical Infrastructure Using the provided documents and URLs and in a minimum of 550 words, analyze some of the possible add | Homework Answers

HLSS505 AMU Risk Analysis And Critical Infrastructure Using the provided documents and URLs and in a minimum of 550 words, analyze some of the possible additional considerations that may be necessary for performing risk analysis on critical infrastructure that handle hazardous materials, toxic chemicals, etc. How do infrastructure dependencies affect response and recovery?

References:

Don't use plagiarized sources. Get Your Custom Essay on
HLSS505 AMU Risk Analysis And Critical Infrastructure Using the provided documents and URLs and in a minimum of 550 words, analyze some of the possible add | Homework Answers
Get an essay WRITTEN FOR YOU, Plagiarism free, and by an EXPERT! To Get a 10% Discount Use Coupon Code FIRST39420
Order Essay

Introduction to Emergency Management: pages 59-62

Appendix 3A of NIPP

CFATS

Videos: https://www.chds.us/ed/items/317

https://www.chds.us/coursefiles/cip/lectures/riska… Risk-Based Performance
Standards Guidance
Chemical Facility Anti-Terrorism Standards
May 2009
Department of Homeland Security
Office of Infrastructure Protection
Infrastructure Security Compliance Division
Mail Stop 8100
Washington, DC 20528
Website: www.dhs.gov/chemicalsecurity
2
Note: This document is a “guidance document” and does not establish any legally enforceable requirements. All security measures, practices, and metrics contained
herein simply are possible, nonexclusive examples for facilities to consider as part of their overall strategy to address the risk-based performance standards under the
Chemical Facility Anti Terrorism Standards and are not prerequisites to regulatory compliance.
Table of Contents
Disclaimer Notice …………………………………………………………………………………………………………….. 7
Overview………………………………………………………………………………………………………………………… 8
Inquiries on RBPS Guidance or Other CFATS Issues…………………………………………………………… 9
CFATS Risk-Based Performance Standards ………………………………………………………………………….. 10
How to Use this Guidance Document ……………………………………………………………………………….. 13
General Considerations for Selecting Security Measures to Comply
with CFATS……………………………………………………………………………………………………………….. 17
RBPS 1 – Restrict Area Perimeter ………………………………………………………………………………………. 22
Security Measures and Considerations for Restricting Area Perimeter …………………………………. 24
Security Measures …………………………………………………………………………………………………… 24
Security Considerations……………………………………………………………………………………………. 26
RBPS Metrics ……………………………………………………………………………………………………………… 28
RBPS 2 – Secure Site Assets ………………………………………………………………………………………………. 32
Security Measures and Considerations for Securing Site Assets…………………………………………… 34
Security Measures …………………………………………………………………………………………………… 34
Security Considerations……………………………………………………………………………………………. 36
RBPS Metrics ……………………………………………………………………………………………………………… 38
RBPS 3 – Screen and Control Access ………………………………………………………………………………….. 41
Security Measures and Considerations for Screening and Controlling Assets………………………… 41
Security Measures …………………………………………………………………………………………………… 41
Security Considerations……………………………………………………………………………………………. 44
RBPS Metrics ……………………………………………………………………………………………………………… 46
RBPS 4 – Deter, Detect, and Delay …………………………………………………………………………………….. 50
Security Measures and Considerations to Deter, Detect, and Delay …………………………………….. 51
Security Measures …………………………………………………………………………………………………… 51
Security Considerations……………………………………………………………………………………………. 53
RBPS Metrics ……………………………………………………………………………………………………………… 55
RBPS 5 – Shipping, Receipt, and Storage ……………………………………………………………………………. 59
Security Measures and Considerations for Shipping, Receipt, and Storage …………………………… 59
Security Measures …………………………………………………………………………………………………… 59
Security Considerations……………………………………………………………………………………………. 61
RBPS Metrics ……………………………………………………………………………………………………………… 62
RBPS 6 – Theft or Diversion …………………………………………………………………………………………….. 64
Security Measures and Considerations for Theft or Diversion ……………………………………………. 64
Security Measures …………………………………………………………………………………………………… 64
Security Considerations……………………………………………………………………………………………. 65
RBPS Metrics ……………………………………………………………………………………………………………… 66
RBPS 7 – Sabotage ………………………………………………………………………………………………………….. 68
Security Measures and Considerations for Sabotage …………………………………………………………. 68
Security Measures …………………………………………………………………………………………………… 68
Security Considerations……………………………………………………………………………………………. 70
RBPS Metrics ……………………………………………………………………………………………………………… 70
RBPS 8 – Cyber………………………………………………………………………………………………………………. 71
Security Measures and Considerations for Cyber……………………………………………………………… 72
Security Measures …………………………………………………………………………………………………… 72
Security Considerations……………………………………………………………………………………………. 77
3
Note: This document is a “guidance document” and does not establish any legally enforceable requirements. All security measures,
practices, and metrics contained herein simply are possible, nonexclusive examples for facilities to consider as part of their overall
strategy to address the risk-based performance standards under the Chemical Facility Anti Terrorism Standards and are not
prerequisites to regulatory compliance.
RBPS Metrics ……………………………………………………………………………………………………………… 78
RBPS 9 – Response …………………………………………………………………………………………………………. 82
Security Measures and Considerations for Response ………………………………………………………… 82
Security Measures …………………………………………………………………………………………………… 82
Security Considerations……………………………………………………………………………………………. 84
RBPS Metrics ……………………………………………………………………………………………………………… 85
RBPS 10 – Monitoring…………………………………………………………………………………………………….. 87
Security Measures and Considerations for Monitoring ……………………………………………………… 87
Security Measures …………………………………………………………………………………………………… 87
Security Considerations……………………………………………………………………………………………. 88
RBPS Metrics ……………………………………………………………………………………………………………… 88
RBPS 11 – Training ………………………………………………………………………………………………………… 90
Security Measures and Considerations for Training………………………………………………………….. 90
Security Measures …………………………………………………………………………………………………… 91
Security Considerations……………………………………………………………………………………………. 93
RBPS Metrics ……………………………………………………………………………………………………………… 95
RBPS 12 – Personnel Surety……………………………………………………………………………………………… 96
Security Measures and Considerations for Personnel Surety ………………………………………………. 96
Security Measures …………………………………………………………………………………………………… 96
RBPS Metrics ……………………………………………………………………………………………………………… 99
RBPS 13 – Elevated Threats…………………………………………………………………………………………….. 101
Security Measures and Considerations for Elevated Threats……………………………………………… 101
Security Measures …………………………………………………………………………………………………. 101
Security Considerations………………………………………………………………………………………….. 104
RBPS Metrics ……………………………………………………………………………………………………………. 105
RBPS 14 – Specific Threats, Vulnerabilities, or Risks ………………………………………………………….. 106
Security Measures and Considerations for Specific Threats,
Vulnerabilities, or Risks …………………………………………………………………………………………. 106
RBPS Metrics ……………………………………………………………………………………………………………. 107
RBPS 15 – Reporting of Significant Security Incidents………………………………………………………… 108
Security Measures and Considerations for Reporting of Significant
Security Incidents………………………………………………………………………………………………….. 108
Security Measures …………………………………………………………………………………………………. 108
RBPS Metrics ……………………………………………………………………………………………………………. 110
RBPS 16 – Significant Security Incidents and Suspicious Activities ……………………………………….. 111
Security Measures and Considerations for Significant Security Incidents
and Suspicious Activities ………………………………………………………………………………………… 111
Security Measures …………………………………………………………………………………………………. 111
Security Considerations………………………………………………………………………………………….. 112
RBPS Metrics ……………………………………………………………………………………………………………. 112
RBPS 17 – Officials and Organization………………………………………………………………………………. 113
Security Measures and Considerations for Officials and Organization……………………………….. 113
Security Measures …………………………………………………………………………………………………. 113
Security Considerations………………………………………………………………………………………….. 115
RBPS Metrics ……………………………………………………………………………………………………………. 116
RBPS 18 – Records ……………………………………………………………………………………………………….. 117
Security Measures and Considerations for Records…………………………………………………………. 117
Security Measures …………………………………………………………………………………………………. 117
4
Note: This document is a “guidance document” and does not establish any legally enforceable requirements. All security measures,
practices, and metrics contained herein simply are possible, nonexclusive examples for facilities to consider as part of their overall
strategy to address the risk-based performance standards under the Chemical Facility Anti Terrorism Standards and are not
prerequisites to regulatory compliance.
Security Considerations………………………………………………………………………………………….. 118
RBPS Metrics ……………………………………………………………………………………………………………. 119
Appendix A – Acronyms ……………………………………………………………………………………………….. 120
Appendix B – RBPS Metrics by Tier …………………………………………………………………………………. 122
Appendix C – Security Measures and Security Considerations ……………………………………………… 148
Physical Security Measures …………………………………………………………………………………………. 148
Perimeter Barriers …………………………………………………………………………………………………. 148
Monitoring ………………………………………………………………………………………………………….. 155
Security Lighting…………………………………………………………………………………………………… 160
Security Forces……………………………………………………………………………………………………… 161
Cyber Security Measures ……………………………………………………………………………………………. 162
Types of Cyber Security Measures……………………………………………………………………………. 162
Security Considerations for Cyber Security Measures………………………………………………….. 170
Performance Standards Affected by Cyber Security Measures……………………………………….. 172
Additional Resources on Cyber Security Measures ……………………………………………………… 173
Security Procedures, Policies, and Plans ……………………………………………………………………….. 173
Inventory Controls/Product Stewardship………………………………………………………………….. 173
Managing Control Points ……………………………………………………………………………………….. 174
Screening …………………………………………………………………………………………………………….. 176
Personnel Surety/Background Checks………………………………………………………………………. 180
Exercises and Drills ……………………………………………………………………………………………….. 186
Training………………………………………………………………………………………………………………. 188
Additional Resources…………………………………………………………………………………………………. 191
5
Note: This document is a “guidance document” and does not establish any legally enforceable requirements. All security measures,
practices, and metrics contained herein simply are possible, nonexclusive examples for facilities to consider as part of their overall
strategy to address the risk-based performance standards under the Chemical Facility Anti Terrorism Standards and are not
prerequisites to regulatory compliance.
Tables
Table 1: Section 27.230 Risk-Based Performance Standards ………………………………………………….. 11
Table 2: Applicable Attack Scenarios and RBPS ……………………………………………………………………. 15
Table 3: RBPS Metrics – RBPS 1 – Restrict Area Perimeter …………………………………………………….. 28
Table 4: RBPS Metrics – RBPS 2 – Secure Site Assets…………………………………………………………….. 38
Table 5: RBPS Metrics – RBPS 3 – Screen and Control Access ………………………………………………… 46
Table 6: RBPS Metrics – RBPS 4 – Deter, Detect, and Delay…………………………………………………… 55
Table 7: RBPS Metrics – RBPS 5 – Shipping, Receipt, and Storage………………………………………….. 62
Table 8: RBPS Metrics – RBPS 6 – Theft and Diversion…………………………………………………………. 66
Table 9: RBPS Metrics – RBPS 7 – Sabotage ………………………………………………………………………… 70
Table 10: RBPS Metrics – RBPS 8 – Cyber ………………………………………………………………………….. 78
Table 11: RBPS Metrics – RBPS 9 – Response ……………………………………………………………………… 85
Table 12: RBPS Metrics – RBPS 10 – Monitoring…………………………………………………………………. 88
Table 13: Suggested Training Topics…………………………………………………………………………………. 93
Table 14: Recommended Frequency (by Tier) of Sample Activities
Under RBPS 11…………………………………………………………………………………………………………… 94
Table 15: RBPS Metrics – RBPS 11 – Training …………………………………………………………………….. 95
Table 16: Examples of Background Check Options ……………………………………………………………… 98
Table 17: RBPS Metrics – RBPS 12 – Personnel Surety………………………………………………………….. 99
Table 18: RBPS Metrics – RBPS 13 – Elevated Threats ………………………………………………………… 105
Table 19: RBPS Metrics – RBPS 14 – Specific Threats, Vulnerabilities
or Risks …………………………………………………………………………………………………………………… 107
Table 20: RBPS Metrics – RBPS 15 – Reporting of Si…
Purchase answer to see full
attachment

Calculator

Calculate the price of your paper

Total price:$26
Our features

We've got everything to become your favourite writing service

Need a better grade?
We've got you covered.

Order your paper