This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Responses to Risk Assessment

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Responses to Risk Assessment

 

Discussion 1

Hi,

I enjoyed reading your post. I concur with you that conducting a risk assessment is vital as it helps to identify potential hazards, analyze the possible outcomes, and examine the mitigation measures to stop the risk from occurring or reducing its impacts. I like your risk assessment analysis on the machines that you use at work. The worst thing about working using machines is that you are likely to attain injuries, both minor and fatal. Therefore, it does not cost one much to conduct an analysis before you start a machine. You have also mentioned that you hold briefings to remind people of the safety measures. I think this is a good idea because it helps people to become more attentive and reduces the risks of accidents. I also believe that training is a good method of avoiding risks. I believe it’s a personal responsibility to acknowledge when you have no clue about sing machines and ask for training just to be safe.

Discussion 2

I agree with you on the differences between the defensible space and defense in depth. The defensible space is a concept introduced by Oscar Newman, which is a residential environment that allows residents to maintain the security of the area. The space has physical characteristics such as the building layout and a site plan. Newman stated that if an environment has a good environment, even the residents will gain a sense of responsibility to defend and control criminal operations. The factors influencing a defensible space include territoriality, natural surveillance, image, and milieu. On the other hand, the defense in depth is an approach used in the military to reduce the chances of an intruder. Multiple layers are used to make it hard for the attacker to access resources or data. Some of these protective layers include biometrics and CCTV. O add to your findings, I found that the overlapping layers also contain three elements, which are prevention, detection, and response, which help secure assets.

References

Smith, C. F., Schmalleger, F., & Siegel, L. J. (2017). Private security today. Boston: Pearson.

Cyber Edu. (n.d). What is defense in depth? Retrieved from https://www.forcepoint.com/cyber-edu/defense-depth

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask