Quantitative and qualitative risk analysis

Residential Estate Security Handbook 2016 - Vol 1 Residential Estate (Industry), Security Services & Risk Management

In order to recognise the value and purpose of a security risk analysis it is necessary to place it within the context of the wider discipline of security risk management, which in turn can be broadly be defined as the management of security threats by analysing risks, assessing the effectiveness of existing risk controls, determining the consequences of such risks and developing appropriate countermeasures for those risks.

Aaron Schnehage.
Aaron Schnehage.

It is therefore clear that in order to succeed in managing security risks one needs to identify such risks by means of an appropriate risk analysis methodology. Failure to do so would almost certainly result in ill-conceived countermeasures for vaguely defined risks ultimately constituting the foundation of a condemned security programme.

Still, many security practitioners consider the use of a generic checklist as the core of risk analysis without giving much thought to the four basic elements of any respectable risk analysis methodology, which is the consideration of threat/risk, probability, vulnerability and consequence. Checklists invariably focus on vulnerabilities, but more often than not miss those vulnerabilities which are not contained within that checklist and in doing so, itself becomes a vulnerability. Use a checklist to facilitate the administration of the assessment, but it may not be prescriptive and inflexible to the task at hand.

Combating contemporary security risks relies greatly upon the development of a security programme underscored by the application of a risk analysis methodology that is focused upon the examination of empirical data from which informed decisions can be made, rather than mere assumptions drawn from inferior checklists. As the function of risk analysis has become a specialised skill utilising a variety of tools such as formulae, quantitative and qualitative analysis, the facility or security manager should ensure the risk analysis being conducted should consist of the following steps:

• Asset characterisation: Categorise the facility or organisation’s assets. Is it people, machinery, immovable property etc.

• Risk or threat identification: Analyse the risks and threats there are against the facilities assets. For example, is the facility appealing to petty criminals and economic criminal alike and what risks do these threat actors pose?

• Consequence analysis: Analyse how essential such assets are to the facilities operations and what the consequences may be should a harmful event occur and those assets are somehow compromised.

• Vulnerability analysis: Develop scenarios of all possible harmful events that may occur at the facility. For example, would armed men be able to overpower the security guard at the entrance. And then consider the consequence or consequences thereof.

• Probability assessment: Understand how probable a threat or risk is likely to occur by the use of historical data such as crime stats. Here a basic risk formula can be applied to estimate probability: Risk = Probability x Vulnerability x Consequence.

• Risk estimation: Demonstrate the risk in the form of calculations by using spreadsheets and developing templates. For example, apportion a value ranging from 1 to 5, with five being the most severe, of the criticality of a particular risk such as the theft of records of the accounting system of an organisation.

• Risk prioritisation: Limited budgets almost always dictate, therefore the most important risks must be mitigated first and the least, last.

• Risk management: Research, budget and provide recommendations for countermeasures to mitigate the risks.

By following these steps the analyst shall be applying two critical skills in conducting assessments; quantitative and qualitative analysis. And these in fact, represent the two main schools of risk analysis reporting. Quite simply put, quantitative analysis concerns the interpretation of numbers from data and estimates, such as in the case of allocating a value from 1 to 5 in estimating the criticality of a particular risk as discussed above.

Various matrices could be developed to express certain aspects in numbers. For example, by developing a Vulnerability Matrix using a spreadsheet, one could numerically estimate the vulnerability of a facility by considering the level of difficulty in accessing the facility, what physical security measures are currently in place, what electronic measures are used and so forth. The same rings true for developing a Consequence Matrix in response to the Consequence Analysis step listed above.

Qualitative analysis, on the other hand, represents the interpretation of interviews and descriptions of characteristics, features or values of the subject under consideration. It relies heavily on the skill of the analyst’s research, analysis and interpretation of data collected since conclusions and recommendations are drawn from this.

Considering the specialisation of risk analysis it is posited that the application of both methods will produce a much more thorough result. Similarly, the quality of the analysis will rely heavily of the analyst’s ability to be critical during the assessment and to avoid prejudices and pre-conceived ideas of what the analysis will entail.

What used to be a clipboard approach with a long checklist has evolved into what may seem to be an overwhelming and convoluted process. On the contrary, a methodical, well researched and critical analysis will mitigate and hopefully prevent a harmful event from taking place. The security management environment changes rapidly and is locked in a constant campaign to appropriately respond to the ingenuities of criminals who always seem to be one step ahead. Failing to develop a compelling response founded upon a scientifically based risk analysis, is surely an exercise in futility.

Moreover, a well-developed risk analysis is the cornerstone of any security plan from which countermeasures are advanced and standard operating procedures are formulated to support such countermeasures. Poor identification and treatment of risks will inevitably lead to the misallocation of budget on risk measures that are inappropriate and ineffectual.

The international security association, the American Society for Industrial Security, better known as ASIS, has developed several standards and guidelines for best practice in risk analysis and several books by ASIS members have been written on the subject. These resources provide a wealth of information on the subject and address the whole spectrum of risk analysis from Department of Homeland Security approved methodologies right down to small facilities and organisations. It is therefore possible and quite frankly incumbent on the responsible facility manager or security practitioner to become aware and avail them of the importance of risk analysis to any security programme.


1. Risk Analysis and the Security Survey: 4th Edition (James F. Broder; Eugene Tucker);

2. Risk Assessment (ASIS Commission on Standards and Guidelines);

3. General Security Risk Assessment Guideline (ASIS International Guidelines Commission).

For more information contact Aaron Schnehage, Definitive Risk Services, +27 (0)11 476 1895, www.definitive.co.za

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

The evolution of security in residential estates
Residential Estate Security Handbook 2020 , Editor's Choice, Integrated Solutions, Security Services & Risk Management
Two large estates discuss their security processes and the ever-expanding scope of responsibilities they need to fulfil.

Bang for your security buck(s)
Residential Estate Security Handbook 2020, Alwinco , Editor's Choice, Security Services & Risk Management
Hi-Tech Security Solutions asks how estates can maintain a good security posture in the time of the ever-shrinking budget.

Range of grid-independent power systems
Residential Estate Security Handbook 2020, Specialised Battery Systems , Products, Security Services & Risk Management
SBS Solar has a range of solutions to provide power, save on costs and above all provide peace of mind.

Efficient security monitoring and control
Residential Estate Security Handbook 2020 , Residential Estate (Industry)
PowerManage is a cloud-based virtual control room tool for residential estates to self-monitor their security solutions.

Directory listings
Residential Estate Security Handbook 2020 , Residential Estate (Industry)

From physical security to cybersecurity
Access & Identity Management Handbook 2020, Genetec , Cyber Security, Security Services & Risk Management
Genetec discusses the security-of-security concept as a means to protect cameras, door controllers and other physical security devices and systems against cybercriminal activity.

Visitor management for estates
Access & Identity Management Handbook 2020, Powell Tronics , Residential Estate (Industry), Access Control & Identity Management
Residential estates and business parks around South Africa have installed access control systems that aim to streamline access for both pedestrians and vehicular traffic.

Biometrics in identity
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Security Services & Risk Management
With multiple identity providers offering to manage digital identities for the general public, the root identity – the single sovereign trusted identity upon which all others are based – must start with government.

Residential Estate Security Conference 2019
October 2019, Technews Publishing , Editor's Choice, Residential Estate (Industry), Conferences & Events
Hi-Tech Security Solutions hosted the Residential Estate Security Conference in August, focusing on the people, technology and processes involved in an effective security solution for estates.

ContinuitySA offers ISO 22301 Lead Implementer course
October 2019, ContinuitySA , Training & Education, Security Services & Risk Management, Transport (Industry)
ContinuitySA is once again offer its five-day Certified ISO 22301 Lead Implementer course on 18-22 November 2019 at the company's Midrand facility.