Preview

Cjs/250 Appendix G Week 6

Satisfactory Essays
Open Document
Open Document
353 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cjs/250 Appendix G Week 6
Associate Level Material
Appendix G

Security Assessment

Directions

Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.

Setting 1: Hospital

| | | |
|THREAT |RISK |COUNTERMEASURE |
| |Probability |Criticality |Total | |
|Example: | | | | |
|Information theft |4 |7 |11 |Employee screening, limited computer |
| | | | |access, and computer monitoring |
|Bomb threats |4 |4 |8 |Take the call seriously and get as |
| | | | |much of info as you could to give to |
| | | | |the local police. |
|Physical assault on the staff members|6 |6 |12 |Have another

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It210-Appendix G

    • 436 Words
    • 2 Pages

    Write “The purpose of this program is to calculate tax for a given salary range”…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 670 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Com/220 Appendix F

    • 353 Words
    • 2 Pages

    |persuasive essay? |explain why it’s important to use legal drugs for what they’re intended. |…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |Patient Property Form |List of patient belongings which was with the patient upon|Patient and admitting staff |(Not stated in the text, but |…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hum 130 Appendix B Week 4

    • 481 Words
    • 2 Pages

    The materials that I expect to use for this project will be books, websites, and churches that are pertaining to Non-denomination Christianity. Another way that I will gain access to materials that pertain to Non-denomination Christianity will be from Mr. Sheldon, which he is a pastor of a Non-denomination Christianity church.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Appendix G Case Study

    • 459 Words
    • 2 Pages

    The client’s performance in the initial few days of the program experienced a negative trend, which is visible in the graph in appendix G. The possible reasons for the trend were discussed with the client’s primary instructor therapist and the supervising therapist. Revisions were proposed although ultimately deemed unnecessary. A lack of attention was hypothesized as the main obstacle linked to the client’s low performance. Possible changes that were considered included: holding up the pictures at eye level or labeling the cards with the corresponding names prior to the Sd. However, the supervising therapist suggested that there were no issues with the program plan, the problem rested with the client’s attending behaviour. Thus, ITs were asked to ensure they had the client’s attention before delivering the Sd. If attention was an issue, the IT should stop running the program to limit the impact on the data. The data collected initially could be considered a non-comprehensive representation of the client’s true abilities with identifying his picture due to an attention problem.…

    • 459 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Hsm 210 Appendix E

    • 507 Words
    • 2 Pages

    In scenario one the prevention level being used is the Primary level of prevention. The reason I believe that this method is being used because the services offered through the agency are ones to prevent the abused women from being depressed and leading to other psychological disorders. In this particular scenario I wouldn’t do anything different, I think that the agency has a good plan in effect for dealing with potential hostile or violent situations. Instead of confronting the husband trying to talk rationally with him and defuse the situation while alarming the authorities is the best route for dealing with a person like that. In the case of the wife the programs offered through the agency promote self-worth and help prevent her from feeling bad about herself. Learning new job skills and healthy ways of thinking about oneself should prepare her for an independent lifestyle to provide for her and her children.…

    • 507 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Risky Situations

    • 2619 Words
    • 11 Pages

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 2619 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Risky Situation

    • 1497 Words
    • 6 Pages

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1497 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Risk Register

    • 277 Words
    • 2 Pages

    3. Develop a response strategy for one of the negative risks and one of the positive risks. Enter the information in the risk register. Also write a separate paragraph describing what specific tasks would need to be done to implement the strategy. Include time and cost estimates for each strategy as…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BTC200 HW2

    • 422 Words
    • 2 Pages

    2) What are the two primary lines of security defense and how can organizational employees use the information taught by the Intense School when drafting an information security plan?…

    • 422 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    HCA 240 Appendix D

    • 743 Words
    • 3 Pages

    The cause of Ms. Jones’s kidney disease is slow blood flow to her kidneys. This could be related to the blocked vessels in her heart and the operation she just went through to repair those damages.…

    • 743 Words
    • 3 Pages
    Satisfactory Essays