...SECURITY MASTER PLAN OUTLINE for CHABOT LAS POSITAS Community College District Submitted by: CATALYST Consulting Group, Inc. 851 Napa Valley Corporate Way, Suite D Napa, CA 94558 In Association With: DMJM, Program Management For Measure B Bond Program 6601 Owens Drive, Suite 238 Pleasanton, CA 94588 May 2, 2005 9/21/2005 2 SECURITY MASTER PLAN OUTLINE Chabot Community College District This outline presents the fundamental topics of the Security Master Plan, an independent document incorporated by reference into the TBP Architecture District Master Plan for the Chabot College campus new construction and building improvements. To develop the Security Master Plan, CATALYST has first performed numerous site surveys and interviews, analyzed crime index data, reviewed the relevant technologies, and assessed the campus physical environment to define the risks and vulnerabilities that need to be addressed for a long-term vision of campus security. From this goal set, CATALYST has developed the guidelines and recommendations for the District to standardize the approach and cost of physical security on their campuses. The Security Master Plan will include the topic sections listed in the outline following. The primary intent of the Security Master Plan is to define security mitigation standards that integrate efficiently with new building construction and building improvements, saving upgrade costs today by planning for the campus of tomorrow. By first prioritizing...
Words: 1345 - Pages: 6
...Author Institution Computer Forensics and Cyber Crime A security survey or audit can also be referred to as a vulnerability analysis. A security survey is an exhaustive physical examination whereby all operational systems and procedures are inspected thoroughly (Fischer & Green, 2004). A security survey involves a critical on-site examination and analysis of a facility, plant, institution, business or home to determine its current security status, its current practices deficiencies or excesses, determine level of protection needed, and ways of improving overall security levels are recommended. A security survey can either be done by in-house personnel or by external security consultants. However, outside security experts are preferred their approach to the job would be more objective and would not take some parts of the job for granted therefore resulting to a more complete appraisal of current conditions. A security survey/audit should be carried out regularly so as keep improving to and up to date especially with the growing rate of technology. Overall objectives of a security survey are: determination of current states of security, location various weaknesses in the security defenses, determination of level of protection required and finally give recommendations for the establishment of a total security program (Fischer & Green, 2004). Some weaknesses identified in the process of a security survey may be: vulnerability to injury, death or destruction by natural...
Words: 686 - Pages: 3
...Evaluation of Security Programs SECURITY SITE SURVEY REPORT THE DEVRY CENTER 9210 HIGHER EDUCATION DRIVE NEW YORK, NY 11747 OVERVIEW A security survey is the official procedure utilized to review specific applications, areas, or Processes of residence or a business to document security, risk vulnerabilities, and authenticate the program in place (Broder & Tucker, 2011). One could perform a survey from all the risk perspectives such as facility security, physical security, or life safety. An expert conducts a involving a pre-determined constraint of checklist as well as an official reporting system. A security survey is a significant element of the general risk and security program (Craighead, 2009). When carrying out a security survey one must set clear goals. The goals would also be extensive from reviewing the fitness of the whole security program to more summarizing goals, such as the value and effectiveness of the physical security of the programs (Luis, 1994). SITE DESCRIPTION The Devry center building is located in downtown New York City on a four-acre piece of land. The building is a thirty story high containing 1,250 underground garage parking spaces and a rooftop garden. The building has a maximum capacity of 2000 tenants, and the tenants occupy the 27th and 30th floor of the building. SCOPE I conducted the security survey at Devry Center on December 1, 2013 to December 5, 2013. This report...
Words: 1939 - Pages: 8
...6, 2011 Case Study #1 Building the Foundation – Security Assessments As the security manager of a major corporation tasked with creating the initial security assessment and auditing program for the company, the first step in developing proposals for the security services would be conducting a comprehensive survey (policies, procedures and operations) of the entire facility to identify the critical factors affecting the security of the premises (Broder, 2006). The next step would be to analyze the vulnerabilities and recommend protection which is cost-effective (Broder, 2006). To start, establishing policies and procedures which define the mission of the security department should be the bare minimum in the role of the security department. These would include the following: * Protection against internal and external theft (to prevent embezzlement, fraud, burglary, robbery, industrial espionage and theft of trade secrets and proprietary information) * Developing access-control procedures (to protect the perimeter of the facility and other sensitive areas) and anti-intrusion systems * Establishing lock-and-key control procedures * Establishing a workplace violence program * Controlling the movement of people on the premises * Reviewing security personnel hiring and deploying * Establishing emergency and disaster recovery plans * Identifying the resources needed and available for the security program to operate efficiently * Developing and...
Words: 802 - Pages: 4
...Site Security Survey Checklist Worksheets Risk Assessment Checklist This checklist is a guide for Risk Assessment Teams. It is also a tool to assist in familiarizing clients with risk assessment concepts and processes. It should be noted, that each client’s facility or enterprise surveyed would be different. So at some point individual surveys through the site survey and interview process will take on a form of their own. Remember the interview and review process is designed to assist all the risk and client Assessment Team members to maximize their understanding of the clients needs. Risk Assessment and Prevention Goals • To have the client identify all key facility assets and develop a comprehensive Asset Protection Plan developed by using the rings of protection concept. • To have the client perform a hazardous materials evaluation and develop a comprehensive Hazardous Materials Plan. • To have the client perform a Process Hazard Analysis and develop a comprehensive Critical Point Protection Plan and process. • To have the client perform a consequence assessment of personnel policies and processes. • To have the client perform a physical factors assessment and develop Physical Factors Plan. • To have the client perform a mitigation assessment and to develop a comprehensive Mitigation Process Plan. • To have the client perform a security assessment analysis and to develop a comprehensive Site Security Plan...
Words: 3641 - Pages: 15
...SECURITY SITE SURVEY DEVRY CORPORATE HEADQUARTERS – The Devry Center Jim Jones February 15, 2013 Eval of Security Systems Professor Semore Butts Overview This site survey was conducted by Jim Jones on February 15, 2013. This document is intended to detail the security survey and analysis for Devry Corporate headquarters. The report will detail the strengths and weaknesses of each of the operational areas. While it will detail an overview of staff and visitor procedures it will not be a personal evaluation of the staff’s readiness or ability to carry out those activities and responsibilities. The objective of the recommendations in this audit are to ensure that Devry Corporate headquarters complies with state, local, and federal regulations for the safety of its employees, the public, and visitors. It will also assist with recommendations that ensure Devry Corporation is free from any legal liabilities as a result of action or non action as it relates to security and safety (Garcia, 2008). Summary The Devry Corporate Headquarters is the central location for Devry Inc., which owns and operates fourteen educational institutions, their supporting both domestic and international operations. These Institutions are comprised of large scale educational facilities requiring sophisticated infrastructures. Each of the supported institutions must adhere to the Higher Education Act standards of security and safety. Those standards would not be applicable in the corporate...
Words: 2015 - Pages: 9
...Project scope The scope of the project is to develop a security system that will be used by the school to control the access to the dormitory. The project will start with dormitory as a pilot project. The project will entail getting the survey of the dormitory and assessing the areas where the card reader will be installed. There will also be the need to integrate the system with the camera system which is already in place. The project will also include having a records system which will include the details of all the people who are authorized to access the dormitory (Liu, & Silverman, 2001). This will mean that there is a server which contains all the details of the students and staff members who are able to gain access to the building. The system will then be connected to the camera system so that there will be the possibility to have a biometric system. The biometric system will make use of the face of the person so that they will be able to get the required information (Kerzner, 2013). The cards will have to be integrated with the information that will be required to give access to the card-owner. Tasks 1. Undertake feasibility study of the dormitory. This is where the dormitory is assessing to check where the system will be installed and how the camera system will be connected to the access control system. 1.1 Assess the physical access and how it has been designed. This is where the access to the dormitories is checked so that it will be clear where the doors and...
Words: 930 - Pages: 4
...Security Monitoring Security Monitoring Hector Landeros University of Phoenix Security Monitoring In today’s business environment an organization may consist of various applications all in which require a certain level of risk assessment and security measures must be taken. Applications being used within the organization must be reviewed to determine security risks that application might have and how to protect the company from those vulnerabilities. Another factor that must be considered is a risk may vary between internal and external applications. There are many activities which can be incorporated into an organizations security plan which will help minimize possibility of a security breach. Policies Security monitoring is a method typically used to test or confirm security practices being used are effective. Most of the time monitoring of activities such as the review of user account logs, application logs, data backup and recovery logs or in many applications being used automated intrusion detection system logs. When using security monitoring one is trying to ensure that information security controls are in place are effective and not being bypassed at any point. One of the benefits of security monitoring is the early identification of wrongdoing or security vulnerability. Rudolfsky (1983-2010), “It will be difficult for a company to achieve information security objectives without security event...
Words: 525 - Pages: 3
...The security industry is no longer the simple entity it was once considered, over the decade or so it has become a very diverse profession and can be compared to both the medical and legal professions. Changes in technology and the events of 9/11 have forever changed the face of the security industry and has lead to the diversification of the field. Where it was thought that security consisted of only security guards patrolling an area or watching CCTV, the industry now specializes in areas spanning from physical, IT and forensic security. With these specializations come the need for both specialized higher education degrees and industry certifications. The principal purpose of certification is to create a standard level of knowledge for those individuals employed in a particular industry. Certification in security management communicates to potential employers and the public that the possessor has demonstrated they have the basic skills, education and proficiency to take on a particular assignment. My research has identified one primary source for security certifications: American Society for Industrial Security (ASIS). The American Society for Industry Security (ASIS) offers three board certifications: Certified Protection Professional (CPP), Professional Certified Investigator (PCI) and Physical Security Professional (PSP). Beginning in 1977 ASIS certifications have been setting the standard fro security professionalism. ASIS claims their certifications are the global...
Words: 2289 - Pages: 10
...information security. Ensuring a secure network involves good design, implementation, and maintenance. The information in your organization is potentially vulnerable to both internal and external threats. Identify these threats and create methods of countering them before they happen. Be able to identify the potential physical, operational, and management policy decisions that affect your information security efforts. It isn’t good enough to have a plan if the plan is unsound or has gaping holes. You must make sure that the plans you develop and the procedures you follow to ensure security make sense for the organization and are effective in addressing the organization’s needs. Be able to explain the relative advantages of the technologies available to you for authentication. You have many tools available to establish authentication processes. Some of these tools start with a password and user ID. Others involve physical devices or the physical characteristics of the person who is requesting authentication. This area is referred to as I&A. Be able to explain the relative capabilities of the technologies available to you for network security. In most situations, you can create virtual LANs, create connections that are encrypted, and isolate high-risk assets from low-risk assets. You can do so using tunneling, DMZs, and network segmenting. Be able to identify and describe the goals of information security. The three primary goals of information security are prevention...
Words: 5056 - Pages: 21
...their meat pies, pasties and sausage rolls. Nanna’s is also a brand for fruit pies. And for Herbert Adams, it is a brand for its beef pies, pasties and rolls. Creative Gourment is a brand for frozen fruit, berries and desserts. Chefs Pride, it contain a lot of categories, such as IQF fruit, Fruit Coulis, French Crepes and Chocolate Dessert Cups. They are delicate. All in all, the majority of Patties’ product is packaged freezing food, which is available from Coles and Woolworths Supermarket nationally, Internet security is a catch-all term for a very broad issue covering security for transactions made over the Internet. Generally, Internet security encompasses browser security, the security of data entered through a web form, and overall authentication and protection of data sent via Internet protocol (Techopedia 2013). In order to maintain the Internet security, there are two types of measures, which are physical security and logical security. Physical security are...
Words: 2911 - Pages: 12
...Perimeter Security Applications Robinson Paulino DeVry College of New York Sec- 330 Professor: Gerard Beatty Perimeter Security Applications Outline Introduction 2 Intruder Detection Accuracy 3 Security Cameras 4 1. Using Size Filters for Video Analytics Accuracy 4 2. Geo-Registration and Perimeter Security Detection Accuracy 5 3. Clarity against a moving background 5 Perimeter Security Best Practices 6 Auto Tracking PTZ Camera 6 Long Range Thermal Camera 6 Covering Perimeter Camera Blind Spots 7 Determine a Perimeter Camera’s Range 7 Perimeter Fence . 8 Chain-Link Fences Protection 8 Electric and Infrared Fences 8 Fiber Optic Intrusion Detection Systems 9 In-Ground Intrusion Detection Systems 10 References 11 Perimeter Security Applications Introduction Physical security is the protection offered for property, these may be buildings or any other form of asset, against intruders (Arata, 2006). . The idea therefore, is to keep off unwanted persons or objects from ones premises. One’s premise is defined by a boundary which separates private property from the rest of the land. This boundary is referred to as the perimeter. The perimeter could be physical or logical. Physical security is intended to keep intruders from land and grounds around such property. Logical perimeters on the other hand, are for protection against computer sabotage or any other remote malicious activities (Fennelly, 2012). In a nutshell, perimeter security is being...
Words: 2429 - Pages: 10
...www.miningsecurityforum.com & MINING SECURITY CRISIS MANAGEMENT FORUM 2014 12-13 November Taj Cape Town South Africa Supported by: Gold Sponsor: Sponsors: Exhibitor Sponsor: Organised by: ABOUT THE SUMMIT MINING SECURITY & CRISIS MANAGEMENT FORUM 2014 | 12-13 NOVEMBER 2014 | CAPE TOWN The mining sector in the developing world is growing rapidly, but As global resources dwindle, companies are venturing into ever associated new risk and threat environment is crucial to the equipment and valuable minerals from mines, work place violence and and tested crisis management planning Terrorism across Africa is a growing concern, in 2013 the mining world was shocked by the deadly on the Areva mine in Niger, The Mining Security & Crisis Management Forum will address Managing and being highly alert to the insider opportunity to with industry a rise Security Survey 2013 found that 41% of the mining and metals 2 Mining Security & Crisis Management 2014 Forum SPEAKERS • • • • • • • • • • • • • • • • • • • Security • • • • MEDIA PARTNERS FireSpec Systems AFIMAC Global Control Risks Mwana Africa Vale (Mozambique) De Beers Namibia Debswana Diamond Co. Exxaro Resources Vale Brazil Antwerp World Diamond Centre (AWDC) De Beers Consolidated Mines Newmont Mining Mining Security & Crisis Management 2014 Forum 3 DAY 1 | WEDNESDAY 12TH NOVEMBER 2014 • • • • • • • • • mining industry • • • • • • • • P •...
Words: 1128 - Pages: 5
...networks and equipment. An attacker may appear to be trustworthy and authorized, possibly claiming to be a new employee, repair person, researcher and even offering credentials to support that identity. If an attacker is not able to gather enough information from one source, he or she may contact another source within the same organization and rely on the information from the first source to add to his or her credibility. In the past companies would assume if they setup authentication processes, firewalls, virtual private networks, and network-monitoring the software their network would be safe. Social Engineering bypasses the technical security measures and targets the human element in the organization. SOCIAL ENGINEERING ATTACK Social engineering attacks are personal. Hackers understand that employees are often the weakest link in a security system. One of the greatest dangers of social engineering is that attacks need not to work against everyone. A single successful victim can provide enough information to trigger an attack that can affect entire organization. There are numerous types of social engineering attacks including but not limited to Trojan and phishing email messages, impersonation, persuasion, bribery, shoulder surfing,...
Words: 948 - Pages: 4
...www.miningsecurityforum.com & MINING SECURITY CRISIS MANAGEMENT FORUM 2014 12-13 November Taj Cape Town South Africa Supported by: Gold Sponsor: Sponsors: Exhibitor Sponsor: Organised by: ABOUT THE SUMMIT MINING SECURITY & CRISIS MANAGEMENT FORUM 2014 | 12-13 NOVEMBER 2014 | CAPE TOWN The mining sector in the developing world is growing rapidly, but As global resources dwindle, companies are venturing into ever associated new risk and threat environment is crucial to the equipment and valuable minerals from mines, work place violence and and tested crisis management planning Terrorism across Africa is a growing concern, in 2013 the mining world was shocked by the deadly on the Areva mine in Niger, The Mining Security & Crisis Management Forum will address Managing and being highly alert to the insider opportunity to with industry a rise Security Survey 2013 found that 41% of the mining and metals 2 Mining Security & Crisis Management 2014 Forum SPEAKERS • • • • • • • • • • • • • • • • • • • Security • • • • MEDIA PARTNERS FireSpec Systems AFIMAC Global Control Risks Mwana Africa Vale (Mozambique) De Beers Namibia Debswana Diamond Co. Exxaro Resources Vale Brazil Antwerp World Diamond Centre (AWDC) De Beers Consolidated Mines Newmont Mining Mining Security & Crisis Management 2014 Forum 3 DAY 1 | WEDNESDAY 12TH NOVEMBER 2014 • • • • • • • • • mining industry • • • • • • • • P •...
Words: 1128 - Pages: 5