Question
Student leaders from the SUSS Outdoor Adventure (ODA) are planning a scuba diving trip in the region. At the same time, they would like to
Student leaders from the SUSS Outdoor Adventure (ODA) are planning a scuba diving trip in the region. At the same time, they would like to do some volunteer work by helping at a project that would improve the lives of the local inhabitants. After some research and reaching out to various Volunteer Welfare Organisations (VWOs) with links in the region, they thought that Rizal Palawan Philippines would be a good place to go. The town is next to the sea, which has clear blue waters with plenty of coral reefs. The student leaders are planning to go in June, shortly after the examinations, and stay there for two weeks. They will be staying at a hostel of the Canyogan Lodge, which is 500 meters from the Sicud Black Sand Beach. While the student leaders are enthusiastic about the trip, they are also aware that some of the lecturers have security and safety concerns about the proposed trip. In order to secure funding from SUSS, a proper risk assessment was also needed before they will approve the trip.
1. Examine the security background of the region of Palawan in the Philippines. Research on the climate of the Philippines in general and the region in particular. Discuss them briefly and explain how they might lead to potential threats that the students may face by looking at its recent history and the current situation there.
2. Based on the threats identified in Question 1, evaluate the different overall risk levels, by making use of security risk statements to explain the different vulnerabilities faced by the students and possible results of the different threats.
The second approach (as reflected in Table 10.3) not only presents the information in terms of security risk statements but also contains the scale of the impact, likelihood, and frequency of the event. Table 10.3 Sample Security Risk Statement Which Illustrates Scale, Likelihood and Frequency of the Event Area Threat agent Vulnerability Impact (1-4) Existing Security Likelihood Frequency Controls (1-4) (1-4) Physical An intruder tailgate to access to 3: High impact. Badge-access entrance | 3: Very likely 2: Moderate Security restricted area Exposure of confidential information Technical A group of infect workstations 4: Verv high impact: Cybersecurity training | 4: Highly likely | 3: Occasional Security cybercriminals | through password Critical operations are | for emplovees guessing disruptedStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started