AllBestEssays.com - All Best Essays, Term Papers and Book Report
Search

Security Plan

Essay by   •  December 5, 2011  •  Essay  •  1,492 Words (6 Pages)  •  1,221 Views

Essay Preview: Security Plan

Report this essay
Page 1 of 6

The target environment I am going to have a security plan for is a multi-business complex. This building is going to have an appliance store with game tables, a conference room, a gym as well as a front office with a help desk and a security office with monitors to watch the building. There are cameras located all over the building inside and outside. As well as a security office with monitors to watch everything these cameras catch. A security guard will be in there watching these monitors at all times to make sure nothing suspicious is going on. They will be in their watching twenty four hours, 7 days a week, even on the holidays. There are many threats and risks that can happen at this business as well as many others. According the text it states; "First, a threat is an impending or potential danger or harm." (Identifying and Exploring Security Essentials) Then a risk according to the text is; "second, risk actually refers to two things: (1) the likelihood of a threat materializing, and (2) the degree of damage that can be expected if the threat does occur. For security professionals, these two aspects of risk are referred to as a threat's probability and criticality." (Identifying and Exploring Security Essentials) Some threats for this business are;

1) Robbery- This has a risk level of 5 or 6. This does not happen that often depending on the type of neighborhood you are in. When it does happen though it becomes very critical.

2) Sexual harassment and or sexual assault- this has a risk level of 8 to 9. Everybody has some kind of sexual harassment at work, but many of times it ends up into some kind of assault. This makes this threat a medium one.

3) Break-in - this is a risk level of 7 to 8. Many businesses get broke into daily, may not have anything stolen but they get broke into. A break-in is the most common crime to happen to any business, so this one is a critical threat.

4) Bomb threat - risk level of 3 to 4. This has got more common since September 11th happened but it is still not as common as many thing. 98% of the time there may be a threat but there never really is actually a bomb there. Most of the time there are just people running their mouth to scare others. This one is not really critical until it happens.

5) Computer system hacked- this has a risk level of 7 to 8. Many computers are getting hacked more and more today, just like all the virus there are out to help crash the systems to. One the system is hacked and the security level had been done away with, anybody can get into the buildings and do what the like. This threat is a very critical one.

As with any other business there are vulnerability gaps. According to the textbook it states; "A vulnerability gap is the difference between the level of security in place and the level of security needed for appropriate protection in a target environment. The larger the vulnerability gap, the higher the risk factors (in terms of probability and/or criticality) associated with that threat." (Identifying and Exploring Security Essentials,) The gaps for my building are; I am not exactly sure that my building has any. With security cameras everywhere and a security guard watching the monitors all the time day in and day out the only way anybody would be able to get in would be by the system being hacked. Another way is if someone does an inside job. I have one front door and no backdoors. If the system was to get hacked then they could shut the video cameras down and does anything without having someone watch you. The other gap is not having security guard walking around incase this does happen. I should have security officers in the security office as well as out on the floor watching everything that is going on.

Countermeasures are a way to keep any of the threats from happening again. The types of countermeasures are; Physical security (components include security hardware: alarms, closed-captioned television (CCTV), locks, and lighting) (Identifying and Exploring Security Essentials), Informational security, personnel (involves the hiring (and firing) of employees and the control of employee movements and activities.) (Identifying and Exploring Security Essentials), liability, and last department dependencies, (A final interdependent element used to establish and maintain stability and predictability in a given environment) (Identifying and Exploring Security Essentials). Listed below are countermeasures for each of my threats;

1) Robbery- Physical Security is the security officers and the cameras and monitors that they watch. In order for them to keep from having robberies they need to hire more security guards and place up a few more cameras.

...

...

Download as:   txt (8.6 Kb)   pdf (112 Kb)   docx (12.1 Kb)  
Continue for 5 more pages »
Only available on AllBestEssays.com
Citation Generator

(2011, 12). Security Plan. AllBestEssays.com. Retrieved 12, 2011, from https://www.allbestessays.com/essay/Security-Plan/14973.html

"Security Plan" AllBestEssays.com. 12 2011. 2011. 12 2011 <https://www.allbestessays.com/essay/Security-Plan/14973.html>.

"Security Plan." AllBestEssays.com. AllBestEssays.com, 12 2011. Web. 12 2011. <https://www.allbestessays.com/essay/Security-Plan/14973.html>.

"Security Plan." AllBestEssays.com. 12, 2011. Accessed 12, 2011. https://www.allbestessays.com/essay/Security-Plan/14973.html.