Premium Essay

Physical Security Plan

In:

Submitted By Yankees72
Words 1710
Pages 7
Perimeter Protection

As the Security Manager of Palm Beach Marina Cove (PBMC), I was informed that there will be an expansion to the existing condominium. PBMC II will be built next to PBMC on the east side of the property near the seawall. ABC construction will be the lead company to erect the PBMC II. A construction site has a high probability of internal and external threats. With the ongoing construction, we must put in place a perimeter protection plan. The perimeter protection plan must include best practices in perimeter protection for a construction site that integrates with the contiguous existing building, properly safeguard the perimeter of both sites during construction, my recommendations, and a budget for all recommendations. The protection plan will come with a price but we need to ensure the safety of all the residents of PBMC, but also take into considerations of ABC constructions equipment and materials.

With undertaking of this huge project, we must look at the best practices for the construction site that integrates with the contiguous existing building. The first step in this process will ensure that the individuals that are working on the construction site will have a complete background check. The background check will be conducted by ABC Construction. If the employee is suitable to work on the site, he will be issued a badge with his or her picture on the card. If the individual is not suitable for the work site, then he or she will not be allowed on the site for any reason. This is practice ensures these individuals have a good character to work at the construction site. It also gives our tenants the peace of mind that the workers are trustworthy. The next step of this process is having specific roads going in and out of the construction site. By having this practice limits the access to the construction

Similar Documents

Premium Essay

Physical Security Plan

...CURRICULUM VITAE Nemwel Nyaigoti Nyagisera Permanent address: P.O Box 240-00516. Cell phone 0724 082 724 E-mail nemwelnessy@gmail.com Personal information Sex: Male Marital status: Single Nationality: Kenyan ID number: 24528810 Date of birth: 15/05/1985 Languages: English and Swahili Religion: Christian Career objectives: • To develop a career in an organization that offers an opportunity for enhancing appropriate skills in an industry. • To be resourceful and provide positive influences to any working environment and in the process acquire personal fulfillment. • To carry out project implementation, monitoring and evaluation. Personal strengths: • An innovative, hardworking, decisive, insightful person with a passion for quality output. • Good communicator, able to take initiatives, makes amendments and delivers on tight deadlines. Educational Background Dec 2007 to June 2010: Visions Institute Nairobi Course: CPA PART I-III Grade: Pass 2001 to 2005: Nyamasaria Secondary School P.O Box 53 Kisumu. Grade: B+ Points: 73/84- (KCSE) 1996-1999: Eronge Boarding Primary, P.O Box, Kisii Marks: 487 / 700- (KCPE) Computer proficiency: Medinnum College Certificate in Computer Work Experience ...

Words: 396 - Pages: 2

Premium Essay

Ccsecurity Mp Outlin

...SECURITY MASTER PLAN OUTLINE for CHABOT LAS POSITAS Community College District Submitted by: CATALYST Consulting Group, Inc. 851 Napa Valley Corporate Way, Suite D Napa, CA 94558 In Association With: DMJM, Program Management For Measure B Bond Program 6601 Owens Drive, Suite 238 Pleasanton, CA 94588 May 2, 2005 9/21/2005 2 SECURITY MASTER PLAN OUTLINE Chabot Community College District This outline presents the fundamental topics of the Security Master Plan, an independent document incorporated by reference into the TBP Architecture District Master Plan for the Chabot College campus new construction and building improvements. To develop the Security Master Plan, CATALYST has first performed numerous site surveys and interviews, analyzed crime index data, reviewed the relevant technologies, and assessed the campus physical environment to define the risks and vulnerabilities that need to be addressed for a long-term vision of campus security. From this goal set, CATALYST has developed the guidelines and recommendations for the District to standardize the approach and cost of physical security on their campuses. The Security Master Plan will include the topic sections listed in the outline following. The primary intent of the Security Master Plan is to define security mitigation standards that integrate efficiently with new building construction and building improvements, saving upgrade costs today by planning for the campus of tomorrow. By first prioritizing...

Words: 1345 - Pages: 6

Premium Essay

Final Information Security Policy

...1. Executive Summary 2 2. Introduction 3 2.1 Company Overview 3 2.2 Security Policy Overview 4 2.3 Security policy goals 4 2.3.1 Confidentiality 4 2.3.2 Integrity 5 2.3.3 Availability 5 3. Disaster Recovery Plan 6 3.1 Risk Assessment 6 3.1.1Critical Business Processes 7 3.1.2 Internal, external, and environmental risks 7 3.2 Disaster Recovery Strategy 8 3.3 Disaster Recovery Test Plan 8 3.3.1 Walk-throughs 8 3.3.2 Simulations 9 3.3.3 Checklists 9 3.3.4 Parallel testing 9 3.3.5 Full interruption 9 4. Physical Security Policy 10 4.1 Security of the building facilities 10 4.1.1Physical entry control 10 4.1.2 Security offices, rooms and facilities 11 4.13.Isolated delivery and loading areas 12 4.2 Security of the information systems 12 4.2.1Workplace protections 12 4.2.2Unused ports and cabling 13 4.2.3 Network/server equipment 13 4.2.4 Equipment maintenance 13 4.2.5 Security of laptops/roaming equipment 13 5. References 14 Executive Summary The objective of this proposal is to present the information security policy created for Bloom Design Group. The issue of a company’s network security continues to be crucial because the results of data loss or significant system failure can be disastrous for a company. An alarming number of companies fail to realize how vulnerable their network is to internal, external, and environmental risks. One of the top priorities of an organization should be maintaining...

Words: 3568 - Pages: 15

Premium Essay

Failed Project Essay

...OVERVIEW Physical security is primarily concerned with restricting physical access by unauthorized people (commonly interpreted as intruders) to controlled facilities, although there are other considerations and situations in which physical security measures are valuable (for example, limiting access within a facility and/or to specific assets and controls to reduce physical incidents such as fires). Security unavoidably incurs costs and, in reality, it can never be perfect or complete - in other words, security can reduce but cannot entirely eliminate risks. Given that controls are imperfect, strong physical security applies using appropriate combinations of overlapping and complementary controls. For instance, physical access controls for protected facilities are generally intended to: • deter potential intruders (e.g. warning signs and perimeter markings); • distinguish authorized from unauthorized people (e.g. using pass cards/badges and keys) • delay and ideally prevent intrusion attempts (e.g. strong walls, door locks and safes); • detect intrusions and monitor/record intruders (e.g. intruder alarms and CCTV systems); and • trigger appropriate incident responses (e.g. by security guards and police). It is up to security designers to balance security controls against risks, taking into account the costs of specifying, developing, testing, implementing, using, managing, monitoring and maintaining the controls. Physical access control is a matter of who, where, and...

Words: 2097 - Pages: 9

Premium Essay

It 244 Week 1

...sections of an Information Security Policy. Final Project Timeline You should budget your time wisely and work on your project throughout the course. As outlined below, the assignments in the course are designed to assist you in creating your final project Information Security Policy. If you complete your course activities and use the feedback provided by the instructor, you will be on the right track to successfully complete your final project of creating an Information Security Policy. □ Week One: Introduction Review the two company profiles provided in your syllabus and select the one you will use for your final project company. You design the Information Security Policy for this company throughout the course. Once you have decided which company you are using, it may not be changed; therefore, considerable thought should be put into this decision. Next, decide which type of information security policy—program-level, program-framework, issue-specific, or system-specific—is appropriate for your final project company. Assignment: Final Project Information Security Policy: Introduction Complete and submit Appendix C. Note. Section 1 Introduction of Appendix C corresponds to Section 2 of Appendix B in the final compilation due in Week Nine. In completing Appendix C, provide an overview of your final project company, describe the type of security policy that is appropriate for your scenario, and explain your security goals in terms of confidentiality...

Words: 899 - Pages: 4

Premium Essay

It Ceo

...System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many of the sections depending on your specific project with NIH. We have highlighted all the instruction areas in yellow. Please review each section carefully and contact SPH IT Services for any additional details. 1. Information System Name/Title [Enter the name of the system (or systems)] 2. Information System Owner [Enter the name and contact information for the system owner] Derek Drawhorn Asst Dean, Information Technology Services University of Texas Health Science Center Houston School of Public Health 1200 Herman Pressler Suite RAS E-17 Houston, TX 77030 (713) 500-9533 Derek.d.drawhorn@uth.tmc.edu 3. Other Designated Contacts, Including Those with “root” Access. [Enter the names and contact information for any other critical technical or administrative contacts for this system. This should include the IT (policy) director, system administrators, data center contacts, etc] Chris Harvey Asst Director, Information Technology Services University of Texas Health Science Center Houston School of Public Health 1200 Herman Pressler Suite RAS E-17 Houston, TX 77030 (713) 500-9544 Christopher.m.harvey@uth.tmc.edu 4. Assignment of Security Responsibility [Who is responsible for implementing security policy? Enter the name and contact information...

Words: 2842 - Pages: 12

Free Essay

Wan Security

...Wan Security In: Computers and Technology Wan Security Executive Summary This document describes the security plan for a WAN (wide area network) that has been setup for an organization to work in an efficient manner. The WAN connects many different locations scattered across a wide area. The WAN is an important feature of the organization and has to play an important role in its working. Huge amount of information is transferred everyday and is crucial for the organization. A network crash due to any reason may cause a huge loss to the organization. Also any intrusion in the network may allow somebody to get hold of private and confidential information about the company. Hence, the security of the network is very crucial to the organization and its business. The goals of this security plan are to ensure the complete security of the network. This would include physical security, network security and access control systems. Physical security is about keeping the network equipments safe from being physically damaged, tampered with or from being stolen. Network security is about keeping the information safe over the network while transmission. Access control systems refer to the control systems that would allow a user to access the information, that could be crucial to the organization, or the private information of the organization. These are discussed in detail in the following sections. While discussing the security of the network, we make some assumptions. The security...

Words: 328 - Pages: 2

Premium Essay

Private Security

...Physical Facilities Evaluation Paper Keco L.Motton SEC370 September 17, 2012 Instructor: Jeffery Newton Physical Facilities Evaluation Society has witnessed a growing epidemic affecting the sanctity of colleges and universities nationwide. Campus violence has placed stress and strains on the physical security efforts established by the educational institutions. The John Doe University security division has been charged with providing and sustaining a safe environment for staff and students attending the university. Additionally, the security divisions have the daunting task of securing sensitive information supported by cyber and physical platforms. To help better the lives of the student and faculty population of our university the management of the university has researched budget improvements that would help in reaching this goal. It has been determined in an attempt to improve the lives of the campus population a strong security budget is essential in improving the quality of life on campus. It is essential for colleges and universities to have physical security and emergency plans established. Revamping the current budget will work toward revitalizing associated security pitfalls faced by the university. John Doe University is housed on 10 acres of land. The university is engulfed by a heavily wooded perimeter accented with 10-foot high fences. Four main access points allow citizens to access the campus grounds. The layout of...

Words: 1706 - Pages: 7

Free Essay

Ethina

...America. Then I would analyze the security risks. For instant I would use the Hacked network devices – Data can be intercepted, analyzed, altered, or deleted, user passwords can be compromised or device configurations can be changed reconnaissance attacks and Denial- of- service attacks then I would analyze security requirements and tradeoffs by making sure the security goals are affordable, usable, performable, available and manageable so that we are protected from hackers at all cost. I will develop a plan that will by creating a networking assets such hardware, software, application, data, intellectual property, trade secrets and company’s reputations. I would have a secure plan in place so that the first part of the security plan should describe its scope — just what is it intended to cover. For a small company the security plan scope might be the entire organization; for a larger organization, it might be limited to just one location or one department. The scope may also be limited by the type of threats it covers. Often a separate security plan is written just for IT related threats since these require specialized knowledge to understand and address. The scope may also be limited to certain operations on a need-to-know basis: office staff do not need to know about the security plan for the movement of cash to and from bank branches, for example. The next part of the security plan is the security assessment. This is the part of the plan which answers the question: where...

Words: 468 - Pages: 2

Premium Essay

Sec 402 Request for Proposals (Rfp)

...Summary Details The Board of Directors request that their information security strategy be upgraded to allow greater opportunities of secure cloud collaboration. Also dress the concerns on the recent number of hack visit attacks that have caused the network to fail across the enterprise. The organization has know brand products across the world and expects top-secret methods for safeguarding proprietary information on its recipes and product lines Note to Proponents: Please be sure to review the RFP document in its entirety before submitting proposals. Submission Format 1. Letter of Introduction • Preferably a one page document introducing the proponent and proponent’s submission. • It should include a brief history of your company and how long you have been in business. 2. Proposed Approach, Project Resources, Costs • An outline of the proposed project approach, process, procedures and timelines in other to meet the objectives of the project. If you have a lengthy document please provide a summary no more than 3 pages. • Performance measures for each of the key result areas (objectives.) • One of the key roles and equipment that needs to be monitors is our servers that monitor our security software on it. This would detail a 24 hours monitoring. • To provide 24 hours support in our Data Center on the QDX servers and threads. • Identification of the project manager and key project support personnel. Include a brief resume of the persons providing the services. • Identify...

Words: 1200 - Pages: 5

Free Essay

Wan Security

...Executive Summary This document describes the security plan for a WAN (wide area network) that has been setup for an organization to work in an efficient manner. The WAN connects many different locations scattered across a wide area. The WAN is an important feature of the organization and has to play an important role in its working. Huge amount of information is transferred everyday and is crucial for the organization. A network crash due to any reason may cause a huge loss to the organization. Also any intrusion in the network may allow somebody to get hold of private and confidential information about the company. Hence, the security of the network is very crucial to the organization and its business. The goals of this security plan are to ensure the complete security of the network. This would include physical security, network security and access control systems. Physical security is about keeping the network equipments safe from being physically damaged, tampered with or from being stolen. Network security is about keeping the information safe over the network while transmission. Access control systems refer to the control systems that would allow a user to access the information, that could be crucial to the organization, or the private information of the organization. These are discussed in detail in the following sections. While discussing the security of the network, we make some assumptions. The security employees or the security guards are trustworthy. The employees of...

Words: 1341 - Pages: 6

Premium Essay

Security Policies Overcoming Business Challenges

...Unit 1 Assignment 1: Security Policies Overcoming Business Challenges There are a number of Information Technology security controls. The three most common are: physical, technical, and administrative controls; however, many organizations break down administrative controls into two separate categories: procedural and legal controls. "Security controls are the means of enforcing security policies that reflect the organization's business requirements, " (Johnson). Security controls are implemented to guarantee the information security C-I-A triad. Furthermore, security controls fall into three types of control classifications, they are: preventive, detective and corrective. These classifications are used to specify when a security control applies. Physical Controls are exactly what they sound like, physical obstacles used to prevent or deter access to IS resources. Physical controls can be barriers such as locked doors, requiring some sort of authentication/authorization command to enter, like a cipher lock or keycard. Biometric scanners are also excellent controls to identify and allow access to authorized personnel. Video cameras and closed-circuit television are also examples of physical controls. For organizations requiring extreme security measures, perimeter barriers such as walls or electric fences are used; additionally, security guards fall into the physical controls category. Technical Controls are logical and/or software related controls designed to restrict access...

Words: 470 - Pages: 2

Premium Essay

It Security

...Information Security Policy University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Mark Cherry Date: 03/11/2012 * Table of Contents 1. Executive Summary 1 2. Introduction 1 3. Disaster Recovery Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3 Executive Summary This plan seeks to provide the best security available while keeping cost at a minimum. The security plan will implement the best software available along with other security measures to keep all information as secure as possible. The plan should be able to provide top notch security measures with the least amount of monitoring and maintenance. The plan should be fully active and available in the least amount of time with the least amount of disruption from day to day business. Project constraints will be mostly likely be in the cost sector, this may delay certain implantation of security measures but should not delay the...

Words: 2076 - Pages: 9

Premium Essay

Mr Greg

...Physical Security Paper Mitch Greg January 23, 2012 Physical Security Paper Every organization in today’s world needs to have security, and this security can come in many forms. The security can be for the information an organization has to physical security needed to protect assets of a company as well as helping to protect that information as it is also part of the company’s assets. There needs to be a plan in place to look at what an organization needs to create that protection. It can be discussed the type of physical security protection that is needed in organizations, and why they are important as well as why they are needed, and how they may work. This paper will discuss the core concepts of physical security, security assessments, and basic physical controls to create a better understanding of physical security of an organization and its assets. Physical Security The definition of physical security states that physical security is designed with the intent on denying access to unauthorized personnel such as attackers or even intruders that may have entered an area unintentionally. This type of security can deal with stored information, resources, buildings, property, or just about anything that an organization values as its assets (Harvey, 2009). The security may be something as simple as a lock on a door to an integrated technical system that has many layers of protection. The Physical Protection System (PPS) is a way to integrate the people needed with...

Words: 1119 - Pages: 5

Free Essay

Internal Building Security

...Internal Building Security Proposal Internal security or the inner layer of security is an important aspect in any physical protection system and may contain several layers within. The placement of internal security addresses intruders or adversaries who could penetrate the outer and middle layers of the system, also known as the perimeter and external layer. Controls found within this layer include windows, protective lighting, intrusion detection systems, signs, barriers, locks, access control, and surveillance, all of which protect organizational assets (ASIS International, 2008). The value of the assets protected will determine the internal security protection required. An organization’s security plan will primarily address their perimeter security, external security, and access control. During this process internal security is often not addressed and no security measures are put into place (Curtis & McBride, 2011). To ensure an organization has a comprehensive security plan they must implement protective measures into their internal security plan. These protective measures include access requirements, reinforced walls and doors, biometric locks, safes and vaults, closed circuit television, and intrusion detection systems (ASIS International, 2008). Access/Entry Control and Recommendations Access control, just like any other security layer, is an important function of any security plan. It is also important to any business, especially those in the design, development...

Words: 1788 - Pages: 8