cleardiddion
Member
So, I just finished my semester today and one of my projects was to create a vulnerability assessment for my university in the case of an active shooter.
I thought I'd share it with THR since the subject of school shootings/protection at school/so on and so forth come up every so often. It's slightly gun related but mostly overall it lets you look at what sort of things you should be aware of concerning how threats affect various sort of settings and whatnot.
To give a little preview:
http://rapidshare.com/files/3159005...ol_Shooter_Vulnerability_Assessment.docx.html
I thought I'd share it with THR since the subject of school shootings/protection at school/so on and so forth come up every so often. It's slightly gun related but mostly overall it lets you look at what sort of things you should be aware of concerning how threats affect various sort of settings and whatnot.
To give a little preview:
Executive Summary
This vulnerability assessment has been prepared under the direction of Embry-Riddle Aeronautical University in order to assess the organization’s vulnerability to a school shooter. It is important to assess the school’s vulnerability to a school shooter given the events that transpired at Virginia Tech on April 16, 2007.
This vulnerability assessment was developed as a tool for Embry-Riddle Aeronautical University to:
• Assess the vulnerabilities of the school’s assets such as the Lehman Building, student dorms, Alphabet Soup classrooms, and multiple other assets
• Develop possible countermeasures that would detect, deter, and delay the consequences of a school shooter to the identified assets
• Estimate the costs of implementing such countermeasures
• Improve overall security operational planning in order for the school to better protect itself from a possible school shooter
This assessment will be very useful for a broad audience within the university’s population. The assessment will benefit the university’s president along with other senior officials whose job it is to develop the assessment plans and procedures. This assessment will also benefit other officials whose job it is to conduct assessments on critical assets. Students who attend the university would also benefit from this assessment by learning how to react to such a situation. This assessment also identifies the types of information and resources that are required by a team to conduct a vulnerability assessment. There are three phases within the process of a vulnerability assessment. These three phases are pre-assessment, assessment, and post-assessment.
This assessment consists of six steps which are used in order to conduct a vulnerability assessment. These six steps are very straightforward and aid in the examination of critical assets. The six steps also aid in the identification of cost-effective countermeasures in order to guard against a school shooter. For each identified step, the objective is stated clearly, a detailed approach is explained, and examples are provided to aid in the understanding of the step.
This assessment will identify the university’s critical assets and provide recommendations on how to safeguard these assets. Any proposed countermeasures will be identified only after a cost-benefit analysis has been completed by the assessment team.
http://rapidshare.com/files/3159005...ol_Shooter_Vulnerability_Assessment.docx.html