You must have Credits on your Balance to download this sample
CJ 452 Security Planning and Assessment
Pages 8 (2008 words)
Risky materials in transportation are vulnerable to sabotage or misuse and in the wrong hands pose a significant security threat. The security of risky materials in transportation poses unique challenges as compared to security at fixed facilities because of the changing environment surrounding a moving vehicle.
One of the most critical components of rulemaking for the department of transportation1 is the assessment of possible transportation security risks for covered shipments of risky materials. Many companies have implemented numerous security measures without examining the threats against their operations and their vulnerabilities to those threats. Threats are sources of danger and can include both criminals and terrorists and the attacks that they might initiate to achieve their objectives. Vulnerabilities are weaknesses that make us more susceptible to attack or injury.
When conducting a proper assessment of the threats to and vulnerabilities of the operation to a terrorist attack or terrorist activity, the types of information to consider include: (a) the type of risky material to transport, (b) the frequency and quantity of shipments, (c) the packaging type, and (d) the amount stored on-site. It is needed to identify and address the business practices (including relationships with external partners), such as the emergency response information that is available on site, and physical assets that are a part of the hazmat transportation activities.
It is needed to analyze the company's business practices that affect the transportation of the risky materials included in HM-232 to identify potential security vulnerabilities. Such business practices may include:
'Taking and proce ...
Not exactly what you need?