Слайд 2

RISK ASSESSMENT IDENTIFICATION OF RISKS FOR SECURITY PURPOSE RISK = THREAT

RISK ASSESSMENT

IDENTIFICATION OF RISKS
FOR SECURITY PURPOSE
RISK = THREAT
THREATS ALWAYS TAKEN INTO

CONSIDERATION IN ISPS CODE ARE:
PIRACY
TERRORISM
SMUGGLING
STOWAWAYS

NOTE: MIGHT BE DEVIDED INTO AS MANY ITEMS AS DEEMED NECESSARY (FOR GUIDANCE SEE PART B, 8.9)

Слайд 3

RISK ASSESSMENT 2. DEFINE METHODOLOGY DEFINE THE PARAMETERS / CRITERIA SCALE

RISK ASSESSMENT

2. DEFINE METHODOLOGY
DEFINE THE PARAMETERS / CRITERIA
SCALE THE PARAMETERS /

CRITERIA
SET FORMULA FOR RATING

3. APPLY METHODOLOGY
MATCH IDENTIFIED RISKS AGAINST THESE PARAMETERS / CRITERIA
OBTAIN RATING FIGURES ACCORDING TO FORMULA

Слайд 4

RISK ASSESSMENT 4. POSSIBLE METHODOLOGY FOR ISPS PARAMETERS / CRITERIA AND

RISK ASSESSMENT

4. POSSIBLE METHODOLOGY FOR ISPS

PARAMETERS / CRITERIA AND SCALING:
PROBABILITY (P)

= LIKELYHOOD OF OCCURRENCE
1 = EXTREMELY REMOTE
2 = REMOTE
3 = PROBABLE
4 = FREQUENT
5 = VERY FREQUENT
CONSEQUENCE (C) = SEVERITY
1 = MINOR
2 = MODERATE
3 = MAJOR
4 = SEVERE
5 = CATASTROPHIC
VULNERABILITY
1 = LOW
2 = MEDIUM
3 = HIGH
4 = VERY HIGH
Слайд 5

RISK ASSESSMENT 4. POSSIBLE METHODOLOGY FOR ISPS R = P x

RISK ASSESSMENT

4. POSSIBLE METHODOLOGY FOR ISPS

R = P x C x

V

TERRORISM=[REMOTE PROBABILITY (P) 2] x [SEVERE CONSEQUENCE (C) 4] x [HIGH VULNERABILITY (V) 3] = 2 x 4 x 3 = 24
SMUGGLING=[VERY HIGH PROBABILITY (P) 5] x [MAJOR CONSEQUENCE (C) 3] x [HIGH VULNERABILITY (V) 3] = 5 x 3 x 3 = 45

Слайд 6

RISK ASSESSMENT 5. PRIORITIZE ACTIONS LIMITED RESSOURCES (MONEY, TIME, PEOPLE) HAVE

RISK ASSESSMENT

5. PRIORITIZE ACTIONS
LIMITED RESSOURCES (MONEY, TIME, PEOPLE) HAVE TO MANAGE

AN ENORMOUS WORKLOAD (OPERATION, ADMINISTATION, EMERGENCY PREPAREDNESS [SAFETY + SECURITY]) UNDER RESTTIME (STCW) AND WORKING HOURS (ILO) RESTRICTIONS

ACTIONS HAVE TO BE PRIORITIZED:

Слайд 7

RISK ASSESSMENT

RISK ASSESSMENT