Preview

Material Security Case Study

Good Essays
Open Document
Open Document
570 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Material Security Case Study
1. What component of the overall security objective deserves the most attention in the environments mentioned in the article? What components would be less pertinent for these particular environments during a vulnerability assessment? Why?

I am fairly torn on what component of the overall security objective deserves the most attention when it comes to church safety, or any place of worship. The majorities of churches are small and are funded on public money. Thus, they cannot afford some of the “higher end” security measures, like a security agency or implementing metal detectors, which I believe would be scary for a place of worship to have to do.

I believe there are two important components to the overall security objective that deserve
…show more content…
I understand that the majority of places of worship are funded through public donations and congregation but if none of those who donate feel it is a safe place they can practice their religion, there is not likely to be anyone in attendance and the place of worship will fade anyways. I do not feel these places must have an “around-the-clock” professional security team watching surveillance cameras, as that can get very expensive but to ask for volunteers from the local community is not unheard of. If the place of worship had the ability to add more lighting around the outside of their building and perhaps a few surveillance cameras, whether they are monitored “around the clock” or not, I believe crimes such as arson or bombing would lessen. With enough lighting, the cameras can then cause the criminals features to be more discernable. With even somewhat clear images of the criminal, the place of worship can then ask for aid from the local community in capturing the one responsible. In this way, the crimes being wrought against the place of worship then sort of become a type of personnel security, involving the community in the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Argyle Security Inc. is a detention and commercial security provider based out of San Antonio, TX. Established in 2005 originally as Argyle Security Acquisition Corporation, Argyle Security Inc. operates through five different business units ISI, MCS, PDI, Com-Tec, and MCS Fire & Security business units. In April 2008, the private equity firm MML Capital made a $15 million investment into Argyle Security. The company has since successfully positioned itself to take advantage of increasing domestic incarceration rates and the need to house and secure an ever growing number of inmates.…

    • 756 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    4. When you assemble all of the “1” and “2” and “3” risk impact/risk factor values to the identified risk, threats, and vulnerabilities, how did you prioritize the “1”, “2”, and “3” risk elements? What would you say to the executive management in regards to your final recommended prioritization?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cjs 250 Appendix G

    • 288 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    CJS 250 Appendix G

    • 603 Words
    • 3 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    The purpose of this risk assessment is to evaluate the adequacy of the Global Finance, Inc. security and network. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost effective safeguards to mitigate threats and associated exploitable vulnerabilities. Safeguards are security features and controls that, when added to or included…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    9. When considering access control security options to mitigate vulnerabilities within the infrastructure, it is ________.…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    To start off with I chose to go with our banking or financial industry. The banking industry is constantly getting attacked by various methods on a daily basis. I chose this industry because I happen to know someone who works in the security sector at Wells Fargo Bank, he was a good person to get information on what he sees on a daily or weekly basis. This paper is the opinion of myself and with gathered information from various resources.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Good Essays

    I think that the information security would be the less pertinent because I don’t think that any vandal or anybody who wants to hurt people within the church by shooting at them would be concerned with any documents or paperwork within any church. I don’t think that any disturbed person who wants to do a shootout would be concerned with any paperwork or documents that would be within a church, and if there were security cameras and at least one security personnel who could watch the security cameras for any suspicious activity and hopefully stop a disturbed person(s) from doing a shoot-out.…

    • 669 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 537 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fabletics Case Study

    • 478 Words
    • 2 Pages

    Fabletics is an athleisure online retail shop that sells men and women sportswear and accessories. The company offers membership subscription where members choose outfits based on their fashion preferences and one's lifestyle. Fabletics is a subsidiary of justFab rebranded to Techstyle Fashion group.…

    • 478 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Swot for Watch Industry

    • 474 Words
    • 2 Pages

    I have chosen to eliminate the words “Weaknesses” and “Threats” in the S.W.O.T. methodology and replace them with “What’s important” and “The future.”…

    • 474 Words
    • 2 Pages
    Good Essays