...Security plan The security plan is based on the fact that the institution is working on a stringent and anything expensive would be unfair and might seem unreasonable. The security plan is as a result of the increasing population at the institution. Its also facilitated by the fact that Physical plant intrusion eg burglary A watch tower should be raised above the MPSETC this will ensure that everything around the institution can be seen well. The street lighting should also be raised with the lighting focusing around the whole institution. Plant intrusion can most likely happen at night and that is why it is important to make sure that the education and training center is well lit and guarded at night. Mpsetc ought to employ more security officers to watch over this area from the proposed towers. Doing this will also be very cheap as it does not require any complex resources. Property damage interior and exterior eg vandalism and theft Personal security eg assault, personal property loss/damage The top priority of the Maryland Department of Public Safety and Correctional Services is to ensure the safety of our staff and the incarcerated offenders in our care. That we have been able to drive down department-wide serious assaults on our correctional officers by 60 percent since FY 2007 is evidence of that, as is the 53 percent drop in inmate serious assaults during that time. We've lowered total assaults on staff by 34 percent at North Branch Correctional Institution since...
Words: 550 - Pages: 3
...The Security Plan The Floor Plan Name: Empire Purpose: Dance, Bar, VIP, Club Function: NightClub 13,000 Square feet, Two Story Building, 8 VIP Sections, Overlooking Balcony, Two Dance Floors, and Two Dance Cages, Front and Back Entrances. Our location is a prime for criminal behavior and we need to put an end to it. [www.empirelive.com] Threats, Risk Assessments and Counter Measures | | | | |THREAT |RISK |COUNTERMEASURE | | |Probability |Criticality |Total | | |Theft incl. Vehicles |5 |5 |10 |Security stationed outside monitoring| | | | | |activity. Plain clothed officers | | | | | |monitoring indoor and outdoor | | | | | |activity. | |Assault |9 |10 |19 |Plain clothed officers inside and out| | ...
Words: 1426 - Pages: 6
...Your Company Security Plan for Unclassified Data Version 1.3 March 20, 2012 Developed By: Your Committee Committee Your Company Important Disclaimer: The Aerospace Industries Association of America, Inc. (“AIA”) has no intellectual property or other interest in this Aerospace Industry Guideline for Developing a Security Plan for Unclassified Data. By developing this Aerospace Industry Guideline for Developing a Security Plan for Unclassified Data Plan and making it freely available to anyone, AIA assumes no responsibility for this Guideline’s content or use, and disclaims any potential liability associated therewith. Executive Overview From time to time an AIA member company may be requested to provide the DOD, a prime contractor or an industry partner an Information Technology Security Plan for unclassified data. This security plan could be required at the enterprise, program or application level depending on the unique requirements of the request. This request might be challenging for those members that have never been required to provide such a document. This “Aerospace Industry Guideline for Developing a Security Plan for Unclassified Data” provides a template and guidance to assist member companies in the development of a security plan to meet their customers or partners needs. Please keep in mind that this document is provided as a guideline and not a mandatory standard. AII member companies are encouraged to use this guideline. Use...
Words: 2097 - Pages: 9
...The Security Plan The name of my target environment is Western Cash Advance. Western Cash Advance is an establishment that issues individuals payday loans. A payday loan is when someone is issued a loan until their next payday and a personal check is used as collateral. There is cash on hand in this business on a daily basis because they only issue cash to their customers as well as except only cash for payments. This store is normally run by two people but on many occasions there is only one employee in the store at a time. The basic floor plan to this business is an office space in a small strip mall that consists of three stores. The size of the store is approximately 900 sq. feet. It is one room that has a sectional desk where customers are assisted and another desk in the back of the room. The lobby consists of one big round table and six chairs that are situated around the lobby. There is a door on the back wall that leads to a hallway. In the hallway there is a bathroom and two storage closets. This business has a very basic open floor plan. When it comes to the current security features it is very limited. When going by the three models in physical security, which is the dynamic D’s, lines of defense, and internal/external threat identification, this business definitely needs some improvement (Clifford, 2004). The only security features that this establishment contains are a security alarm system, one motion detector, and one panic button. The outer perimeter has no...
Words: 937 - Pages: 4
...Security Plan Your Name CJS 250 Axia University of Phoenix Background This security plan is for a hotel, equipped with a mini mart and service station. The location of this establishment is off Interstate 95 in Jacksonville, Florida. Jacksonville, Florida is a popular tourist city and home of the Jacksonville Jaguars football team in which makes this a very lucrative position for this company. The hotel has two floors dedicated to 32 guest rooms. There are 15 employees, who are employed for the service station. The hotel employees 4 housekeepers, 3 managers, 4 security officers 6 clerks and 2 maintenance personnel. The total employees included in this security plan are 34 employees. Security Layout The security features in place include security cameras that are strategically placed throughout the premises, two way mirrors, parking lot lighting, security officers, door censors, smoke detectors and fire extinguishers. The security office and its’ personnel will monitor all cameras and receive the censor warnings that are placed on the entrance doors, stairways, elevator, pool and playground area. Each hotel room is equipped with a smoke detector. Both room floors are monitored with a security camera and have a fire extinguisher and first aid kit strategically placed. The elevator is equipped with a camera, smoke detector, fire extinguisher, first aid kit and a sensor. General Information. This essay includes the floor plan design for the hotel/ store, a list of possible...
Words: 1439 - Pages: 6
...Enterprise Security Plan Enterprise Security Plan Smith Systems Consulting (SSC) is a major regional consulting company. Headquartered in Houston, Texas, the firm’s 350 employees provide information technology and business systems consulting to its clients in a wide variety of industries including manufacturing, transportation, retail, financial services and education. Smith Systems Consulting (SSC) is a service provider. It provides IT services for other companies. Security is essential for SSC because it not only requires security for itself, but SSC also has many customers depending on it to provide top level IT services, which also includes security. Enterprise risks are a part of all business and how we address these risks determines how successful we are in the business world. Risks can be defined by “any exposure to the chance of injury or loss.” (Cheryl l. Dunn, 2005) Risks can be internal or they can come to us from outside sources in the form of external risks. Both types of risks pose a threat to the overall security of the enterprise. An Enterprise Security Plan (ESP) outlines possible risks by identifying the vulnerabilities within the business process and ranks the vulnerabilities for ease in developing a mitigation plan. The ESP also identifies technologies and policies that will help in the development of an operational plan that protects the business process and intellectual property of your corporation. Within this ESP we have developed 3 different...
Words: 1749 - Pages: 7
...IT 454 Security Management Plan Marshall Miller December 20, 2015 Table of Contents Section 1: Information Security Management 4 Intro to Organization 4 People 4 Physical Security 4 Training of Security 4 Information Technology Training 4 Technology 5 Project Manager Roles 5 Section 2: Security Program 6 Data Classification 6 Management Support 7 Hierarchy Reporting Structure 8 8 Section 3: Security Policies 10 Acceptable Use Policy 10 1. Overview 10 2. Purpose 10 3. Scope 11 4. Policy 11 5. Enforcement 13 6. Definitions 13 7. Implementation Date 13 Section 4: Security Policies 14 Risk Assessment 14 Quantitative Risk Analysis 14 Quantitative Risk Analysis 14 Methodologies 15 1. Transfer 15 2. Avoid 15 3. Reduce 15 4. Accept 16 Summary 16 Section 5: Controlling Risk 17 Administrative 17 Human Resources 17 Organizational Structure 17 Security Policies 18 Technical 18 Access Control 18 System Architecture 18 System Configuration 18 Physical 19 Heating and Air Conditioning 19 Fire 19 Flood 19 Summary 19 Bibliography 20 Section 1: Information Security Management Intro to Organization My organization is about a federally recognized business called JPPSO (Joint Personnel Property Shipment Office). JPPSO specializes in the shipping of military personnel goods. JPPSO works hand in hand with the United States Air Force to enforce the safe shipping of military household goods...
Words: 2755 - Pages: 12
...Name: Professor’s name: Course: Date: Introduction System security plan document describe all the possible system security control measures, their application status and how they are implemented. It can therefore facilitates the implementation of security processes by guiding the individual involved in this process. This document addresses the first version of system security plan (SSP) of automated banking system. The purpose of this report is to describe the controls that are in place or are in the plan, the expected behavior and the responsibilities of the individuals who uses or access the system. The document structures the planning process of implementing the security control procedures to provide adequate security and cost-effective security protection for the system. Management, operational and technical controls have been identified and discussed in details. The different family of system security controls are defined and discussed comprehensively how their implementation status and how they are implemented. DOCUMENT CHANGE CONTROL Version | Release Date | Summary of Changes | Addendum Number | Name | Version 1 | 22/4/2015 | | 1 | System security plan 1 | SYSTEM IDENTIFICATION Automated banking system is a company application system that has been categorized as a primary system according to FIPS 199...
Words: 1354 - Pages: 6
...Industrial Security Plan Lionel San Jose 05/04/15 SEC 330 Craig Barnhart Industrial Security Plan When people think about different organizations and businesses all they think about is profit and how well the organization or business is thriving but organizations and businesses see more than just profit, they have to deal with protecting this profit along with all other assets affiliated with them. Most people think that hiring security guards and putting up some cameras are enough to keep a place safe but there is much more to keeping assets safe. Organizations should have an industrial security plan in place which will help protect their assets and make their facility a safer working environment. There are a few requirements that need to be addressed in this industrial security plan such as the roles and responsibilities of safety and security officers, OSHA and EPA regulations, emergency response to manmade and natural disasters, and business continuity and recovery from disasters. Roles and Responsibilities Organizations need safety and security personnel within their organization if they want to be protected. There are many different kinds of hazards and risks that can harm any organization but with the help from safety and security personnel these risks and hazards can be minimized or even prevented. Safety and security personnel are not required for an organization to operate as long as the organizations are operating within regulations and it is up to the...
Words: 1883 - Pages: 8
...Perimeter Protection As the Security Manager of Palm Beach Marina Cove (PBMC), I was informed that there will be an expansion to the existing condominium. PBMC II will be built next to PBMC on the east side of the property near the seawall. ABC construction will be the lead company to erect the PBMC II. A construction site has a high probability of internal and external threats. With the ongoing construction, we must put in place a perimeter protection plan. The perimeter protection plan must include best practices in perimeter protection for a construction site that integrates with the contiguous existing building, properly safeguard the perimeter of both sites during construction, my recommendations, and a budget for all recommendations. The protection plan will come with a price but we need to ensure the safety of all the residents of PBMC, but also take into considerations of ABC constructions equipment and materials. With undertaking of this huge project, we must look at the best practices for the construction site that integrates with the contiguous existing building. The first step in this process will ensure that the individuals that are working on the construction site will have a complete background check. The background check will be conducted by ABC Construction. If the employee is suitable to work on the site, he will be issued a badge with his or her picture on the card. If the individual is not suitable for the work site, then he...
Words: 1710 - Pages: 7
...Network Security Plan For a general security solution plan at Richman Investments, this report will give an outline of the needed multi-layered security plan for the entire network including all branch offices. There are many risks that are involved with any network, good planning and policies put into place can mitigate security flaws. The multi-layer security solution can be a useful guideline to start and sustain these security measures within the company. The following topics for security planning will be discussed in a brief and general detail are; User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain. There are many different and unique threats to all domains listed; this report only covers a small portion of ways to mitigate such threats, risks, and vulnerabilities. User Domain In the first layer of the multi-layer security is the user domain. For any user within the company accessing the network on any given workstation or portable device, that user is subjected to the acceptable use policy (AUP). Users are the greatest risk to any network and proper assessment of user policies and the Global Policy configurations need to be well thought out and enforced by these policies. Under this AUP, if violated can be subjected to employee dismal or grounds for punishment actions. Users can be disgruntled employees and can cause serious issues to the network if they have access to sensitive information...
Words: 1254 - Pages: 6
...The survey conducted of Corporation Tech existing hosts, while using NetWitness Investigator found that the company does not have a properly configured DMZ which exposes an organizations external services to the internet. Adding an additional layer to the security LAN will help the organization against any outside hackers. Another issue found was that the company did not have secure remote access to their computers while away from the organization. Granting access on a per-user basis only to those who have a bona fide need to access the network remotely. Implementing a remote access to the organizations computers while keeping it secure via firewalls and VPN server will ensure protection from outside intruders. I recommend that you install a VPN server as well as Remote access security. One firewall with Network Address Translation (NAT) this will add to the security that will not be visible outside of the organization and another firewall without NAT which will be visible outside of the organization. Network Security Plan Purpose Computer and network security incidents have become a fact of life for most organizations that provide networked information technology resources including connectivity with the global Internet. Current methods of dealing with such incidents are at best piecemeal relying on luck, varying working practices, good will and unofficial support from a few individuals normally engaged in central network or systems support. This approach undoubtedly...
Words: 3365 - Pages: 14
...Riordan Security Plan CMGT/441 October 14, 2013 University of Phoenix Executive Summary: Riordan Manufacturing is a global corporation and has been performing both research and development activities and manufacturing plastics products for a number of uses since 1992. Riordan’s R&D efforts supply the company with new products to break into new markets, most recently the health care market. Riordan has grown and now has three United States locations and one location in China. Each location has a recently upgraded its information technology infrastructure including their network hardware and software. Riordan has also kept up with quality standards for its management and manufacturing operations, including following Six Sigma and ISO 9000 quality standards. The Sarbanes-Oxley Act of 2002 requires Riordan to implement some changes to their security processes to ensure compliance with the new law. The Sarbanes-Oxley Act is focused on to the regulation of corporate governance and financial practice, maintaining the security of all financial data and ensuring the systems that access or store financial data and information must be secure to maintain compliance and pass an audit. Team B responded to the service request SR-rm-013 by performing an analysis of Riordan’s current network, data, and web security issues. Team B’s analysis focused on the security of information to ensure Riordan will be able to pass a security audit as a result of the Sarbanes-Oxley Act....
Words: 2934 - Pages: 12
...How to Plan for Security i). Statement of Policy This policy statement seeks to address the optimum and responsible use of the wireless local area network WLAN facility available at the university in relation to specific network security issues. The issue of concern in this policy is the promotion of responsible use of the WLAN facility among the university’s student and workers. The strategy aims at preventing security problems that may arise from the misuse and malicious exploitation of the facility by people granted approval to access the university’s WLAN information systems. a) Scope and Applicability The scope of this policy statement covers the hardware, software and access protocols associated with the WLAN use by students and workers at the university. The policies adopted will seek to regulate access permissions for the users of the WLAN facility and to promote responsible use in line with policies outlined in this policy document and by industry standards and legal requirements of use. b) Definition of Technology Address The WAN is available for use by the students and workers within the university. The WLAN facility provides access to information systems meant to facilitate the learning and worker needs by providing information access and software platforms. c) Responsibilities The administration and management of the WLAN facility is the responsibility of appointed network administrators at the university’s faculty of Information and Communication Technology. The...
Words: 1907 - Pages: 8
...Intro/Definition 1. Cyber security is a type of technology where it takes preparatory measure to ensure user protection and information privacy. (http://www.idigitaltimes.com/cybersecurity-information-sharing-act-advances-senate-heres-why-apple-twitter-485485) Cyber security growing challenges (2 prominent topics) Complexity of the joined environment * The technique with movement of the web is represent by a huge measure of data. * The advanced economy dynamically depends on upon boundless measures of computerised data that are made through money related trades, diversion, communications, travel, web filtering, shopping and a few other routine activities. * Threats in the cyber world will continue concentrating on the weakest joins in any puzzling web of business associations or government methodology, which means partners in cyber security, tries having a shared part in guaranteeing the structure and the information that course through. Threats are moving to the mobile sphere * Mobile phones contain a considerable measure of individual information. * In this new advanced time, there is variety of components and applications that is highly important and valuable, however near to these utilities for user is the probability for new vulnerabilities or open entryways for breaches. * As cyber threats continuously target mobile phones especially smartphones, which is a booming trend for the past few years, data security transforms into all the...
Words: 567 - Pages: 3