Conduct a probability of occurrence assessment through indicators such as:
(1) Documented records.
c. Establish a range of losses based on experience involving specific items
(minimum to maximum in terms of dollar value), assessing the losses over a 3 to 5 year
period. Correlate the degree of loss experienced with the range or loss of functions.
Compare the low against high elements of ranges for all items and functions; then
average weight against value in terms of criticality.
Evaluation of Risk.
The actual degree of risk involved depends on two factors:
Probability of adverse effects occurring as a direct result of the threat(s).
b. Extent to which the installation or activity will be affected by the threat(s).
Security threats significantly impact on a physical security program by requiring the
incorporation of the following considerations:
(1) All determinable threats.
(2) Continuing activity beginning in peacetime and expanding to meet the
particularities of formal hostilities.
(3) Coordination and integration with other protective programs, such as crime
prevention and safety.
6. Planning. To be effective, planning must involve a phased approached, be flexible in
incorporating changes, and have clearly defined courses of action. Only through adequate
planning can you provide an effective counter response to security threats. It must be
concerned with realistic protection in depth and be based on:
Personnel, material, and equipment.
Probability of the most serious incident.
Implementation in the interest of continuity of all security operations.
7. Operational Phase. Planning for the operational phase must be all-inclusive. It
involves training programs concerning duties and responsibilities prior to, during, and
after the operational phase. As a minimum, this phase should cover: