Preview

Psy/250 Appendix G

Satisfactory Essays
Open Document
Open Document
398 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Psy/250 Appendix G
Axia College Material: Robin Mravik
Appendix G

Security Assessment

Directions

Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.

Setting 1:

THREAT | RISK | COUNTERMEASURE | | Probability | Criticality | Total | |
…show more content…
| Earthquake or Fire | 5 | 10 | 15 | Extensive evacuation plan, sprinkler system installation | Firearm or Bomb | 4 | 9 | 13 | Metal detectors at all entrances, have armed guards and unarmed guards, security cameras and CCTV installed. | Internal Theft | 3 | 6 | 9 | Security managers to keep an eye out the employees, have security cameras, metal detectors and have every employee checked before they leave the store, CCTV, employee screening for all employees. |

Setting 2:

THREAT | RISK | COUNTERMEASURE

You May Also Find These Documents Helpful

  • Good Essays

    Cjs/250 Appendix D

    • 574 Words
    • 3 Pages

    A six foot fence secures the outer perimeter. Video surveillance is active on the north fence and inactive on the south. A manned guard station permits entrance into the outer perimeter from the west; an unmanned and unlocked gate permits entrance from the east. No Trespassing signs are posted at intervals upon the perimeter fence; Employees Only is posted on the gate. Visitors must obtain a pass at the guard station.…

    • 574 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 616 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Com 135 Week 5 Analysis

    • 678 Words
    • 3 Pages

    Three complete security policies. Use the Week 5 writing assignment as your starter policy for this section.…

    • 678 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. When you assemble all of the “1” and “2” and “3” risk impact/risk factor values to the identified risk, threats, and vulnerabilities, how did you prioritize the “1”, “2”, and “3” risk elements? What would you say to the executive management in regards to your final recommended prioritization?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Psy265 Appendix B

    • 340 Words
    • 2 Pages

    | |(only 60% of men) and their skin becomes flushed. |erection in their nipple and their skin |…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Com/220 Appendix F

    • 353 Words
    • 2 Pages

    |persuasive essay? |explain why it’s important to use legal drugs for what they’re intended. |…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    If a security guard is already on site then they are able to respond immediately. Hiring private security also reduces the chance that physical security operations are run properly. Security guards are able to test locks, cameras and alarms to ensure that they are always working properly. Security guards can remain in certain areas or they can monitor cameras and cover a much larger area. With these safeguards in place the church members are able to feel comfortable and enjoy their beliefs without the fear of hate crimes, robbery or vandalism. With everyone safe the staff members are able to do their job in peace and provide a great service for their followers. Now that the church is safe from intruders, it is pertinent that all internal employees and staff members are…

    • 1090 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Psy240 Appendix C

    • 256 Words
    • 2 Pages

    Why do we sleep? What governs when or how long we sleep? This activity will assist you in understanding two common sleep theories, recuperation and circadian, which provide different answers to these questions. Depending on which one you support, it may change your outlook on sleep and your current sleeping habits.…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Risky Situations

    • 2619 Words
    • 11 Pages

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 2619 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    psy appendix b

    • 391 Words
    • 2 Pages

    -The first issue of journal and personality was published in 1932, this was aimed to join German studies.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Business Requirment

    • 2599 Words
    • 11 Pages

    4-I Inc. was founded in 2002 by Israel Telleria as an independent security consulting firm in Miami, State of Florida, with a focus on database application security. Since then, we have grown to provide a wide range of offerings, including physical security assessments, security training, auditing and policy review. Operational Systems and Databases, Infrastructure and security We have done a significant amount of work for city, state, local and Federal government agencies throughout the country, in addition to private sector and corporate clients. We believe that our experience and expertise are well aligned with your needs.…

    • 2599 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Appendix B Bus/210

    • 260 Words
    • 2 Pages

    | |Ensuring that all functions of the business are being ran to the best of company’s |…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    hotel security

    • 1281 Words
    • 6 Pages

    A successful hotel security manager needs to be professional, well-trained in topics ranging from life safety to liability, a good communicator, and open to addressing new and challenging needs. Understanding new technology is especially important. Security salespeople and security managers can work together to bring the best system and product to the hotel property in such areas as: 1. guest room key systems, 2. fire alarm systems, 3. radio systems, and 4. closed-circuit television cameras. Litigation also is a serious concern. In addition to protecting life and property, security managers must plan to prevent any act that threatens the well-being of guests and the assets of the company. Planning ahead is essential. Consequently, a risk analysis should be prepared for each property, listing the vulnerability of every aspect of the property, including employees, guests, and assets. A management plan should outline procedures to prevent and respond to possible situations identified in the analysis.…

    • 1281 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Week 2 Lab

    • 507 Words
    • 3 Pages

    1.) From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5, High/Medium/Low Nessus Risk Factor Definitions for Vulnerabilities)…

    • 507 Words
    • 3 Pages
    Good Essays