In order to do that they need a risk management program that will defend against threats against national interests (Department of Homeland Security, 2011). These risks against the homeland are external and internal; institutional; operational; and strategic and need to be managed by the Nation’s leadership to “build security, safety, and resilience across domains by connecting efforts to prevent terrorism and enhance security, secure and manage our borders, enforce and administer our immigration laws, safeguard and secure cyber space, ensure resilience to disasters, and provide essential support in assuring national and economic security” (U.S. DHS, 2011, p9). The DHS utilizes risk management programs and processes as well as a risk management formula to control risk and improve the decision making when it comes to reaching security goals (U.S. DHS,
3. Conclusion In order for Homeland Security to promote and enhance security, risk management need to be applied in all its security based initiatives. Risk management strategies are crucial in identifying, preventing, mitigating and controlling risks. The success of a risk management system will depend on the commitment of the whole team: from top management to junior employees. In addition, the partners and the public need to be involved.
Real-world events is probably the more significant of the group; using a risk management program allows decision makers access to critical information related to potential outcomes of an event/incident. The decision makers use the information to exam the most appropriate and lower risk approach to an event/incident. The NIPP risk management program used the risk management for three specific threats, physical, cyber, and human to protect CIKRs (U.S. DHS 2009, p.33). When risk management is implemented correctly and all areas assessed thoroughly, it can produce the best course of action to protect homeland security infrastructure over a larger area through the cooperation of and between the different NIPP established sectors. Exercise planning and risk management work well together exercises also provide feedback for risk management for real-word events.
This is because it is concentrating on using flexibility and key concepts to assess / address any vulnerabilities. For all organizations, this makes them more prepared for the challenges they will face in the future. This prevents security breaches through taking an all encompassing approach and objectively analyzing what is happening. These changes will help to deal with deficiencies the agency is facing when it comes to contingency planning, security management and access controls. These recommendations will require short term increases in the IT budget to improve training, monitoring and update technology.
The timely accurate assessment of these risk is one determining factor that contributes to their individual risk level and sets threat priority in regards to (C, V and T). In order to limit the perceived bias in regards to assessing risk, Friedman points out; ”people are likely to fail to consider each hurdle 's detrimental effect on the odds of success…they use some prior event to estimate the probability of the new one” (Friedman, 2011, p88). This is one specific problem in addressing the assessment of risk in critical areas; it must be accurate and realistic, not over estimated in order to serve a political agenda or based of a specific event. Terror threats constantly evolve and adapt in order to maintain their significance in the global arena. In order for a realistic assessment of risk to be identified, the threat must also be identified in terms of capabilities and
Securing the nation is a challenging mission, and it certainly has to be a shared obligation for essentially every person and part in society, including private sector, for profit, faith based organizations, non for profit, federal, state, and local. No member of a society shall be excluded. Prevention is crucial so that we are able to use certain techniques and technologies that ensure not only the safety of our people and country, but that the United States is prepared to avert an impending threat or attack against our nation. In order for this particular goal to be effective, it will require the attention and involvement of the intelligence, law enforcement, and homeland defense activities if there was to be an act of terrorism on American soil. Their participation is vital so that we are able to learn if there is any future attacks planned or when it comes to capturing the opposition.
But tactical denial targets the success of the attack itself and as we are dealing with a highly innovative opponent, this strategy on its own will not thwart terrorism and must be supplemented with military responses. Strategies for deterring terrorism will undoubtedly become more sophisticated overtime, and there are a number of immediate steps that could greatly improve our ability to deter terror. First, the United States needs to improveits ability to conduct strategic communications to convey a coherent and consistent message to terrorist networks. Tactical denial policies require not only that the United States develop the ability to thwart terrorist attacks, but also that it clearly communicates that capability to terrorists. Washington must clearly and consistently broadcast the message that terrorism will fail
Understanding the role of risk management within the Department of Homeland security will ultimately allow for individuals to understand how the Department manages risk and prevents incidents such as the 9/11 attacks from occurring. Formula The importance of establishing risk management is determining how exactly you can measure the risk vs the reward over a certain topic. Almost every government organization has their own version of risk management and how risk is determined. The Department of Homeland security has multiple assets which makes the process of determining risk even more difficult. In this case the Department of Homeland security has established a formula to help the process of determining risk easier.
Counterintelligence to combat counterterrorism is necessary but as stated needs improvement. For example, domestically there are terrorist operations being conducted and counterintelligence can identify these potential threats. Counterintelligence methods are always going to be controversial but when the efforts remain focused and the purpose is to protect the process of protecting our nation, then we can see that it is an effective method. If we did nothing then there would be no nation to protect. It is important to understand how the target will operate.
However, to ensure the DRR framework is fully successful, it needs a lot of effort from both parties Government and community. In Malaysia, we have a framework of DRR that we call it National Security Council Directive No. 20. This framework is based on the DRR guideline, but it’s more focus to the disaster management. Even though we have a comprehensive framework to mitigate the impact of a disaster, it must be many challenges that need to go through.