AJS/515: Criminological Theory And Risk Mitigation Wk 5 – Security Program Diagram

Assignment Content

Imagine you are the director of security for an enclosed municipal arena that seats 1,500, and you have been asked to:
Create a security program diagram for a rock concert. Use Unit I, Unit II, Unit III, Unit IV, and Unit V in the FEMA vulnerability assessment studies—or those located in the Risk Assessment on Ready.gov—to identify the vulnerabilities present to assist in identifying potential issues.
Identify 5 key security/safety issues.
Design a mitigation plan that identifies 5 hazards, 5 assets at risk, and 5 potential impacts.
Cite at least 2 outside references to support your assignment.
Format your assignment according to APA guidelines.
**Present the information in a flow diagram like the example below. Use any computer program to create a similar diagram you are comfortable using. Additional information can be found at FEMA.gov or Ready.gov.Present the information in a flow diagram like the example below. Use any computer program to create a similar diagram you are comfortable using. Additional information can be found at FEMA.gov or Ready.gov.
Risk Assessment Chart: 
Hazard Identification: Hazards – Fire, Explosion, Natural Hazards, Hazardous Materials spill or release, Terrorism, Workplace violence, Pandemic disease, Utility outage, Mechanical breakdown, Supplier failure, Cyber attack – Probability & Magnitude Flows into: Vulnerability Assessment: 
Assets at Risk – People, Property including buildings, critical infrastructure, Supply chain, Systems/equipment, Information Technology, Business operations, Reputation of or confidence in entity, Regulatory and contractual obligations, Environment – Vulnerability Flows Into: Impact Analysis: 
Impacts – Casualties, Property damage, Business interruption, Loss of customers, Financial loss, Environmental contamination, Loss of confidence in the organization, Fines and penalties, lawsuits.
Risk Assessment Chart: Hazard Identification: Hazards – Fire, Explosion, Natural Hazards, Hazardous Materials spill or release, Terrorism, Workplace violence, Pandemic disease, Utility outage, Mechanical breakdown, Supplier failure, Cyber attack – Probability & Magnitude Flows into: Vulnerability Assessment: Assets at Risk – People, Property including buildings, critical infrastructure, Supply chain, Systems/equipment, Information Technology, Business operations, Reputation of or confidence in entity, Regulatory and contractual obligations, Environment – Vulnerability Flows Into: Impact Analysis: Impacts – Casualties, Property damage, Business interruption, Loss of customers, Financial loss, Environmental contamination, Loss of confidence in the organization, Fines and penalties, lawsuits.

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.