Preview

Organizational Security and Expansion Assessment

Good Essays
Open Document
Open Document
1473 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Organizational Security and Expansion Assessment
Organizational Security and Expansion Assessment

University of Phoenix

SEC/320- SURVEY OF SECURITY SPECIALIZATIONS
Instructor: David Bagnoni
November 17, 2012

Relationship between Private and Public Police As director of security for this company I will ensure a threat and vulnerability assessment to protect the company and remain profitable in business. In preparing to expand my security company in the Middle East and Africa there are several things that I must consider. Some of them are threats, threats of other security companies trying to buy me out, internet hacking, surveillance system, personnel, and how to secure the perimeter when a natural disaster strikes. When it comes to human threats you have to worry about your staff who is working for the company that you are security. What kind of staff do you have? Can they be trusted? Some staff member may use your security system to block up other things that don’t pertain to your security business. By using the computer to look at other sites you are leaving your sites open to other websites that don’t pertain to your job. They may be able to log in to your security system to find out about it. If your staff member don’t do this, they may be asked by a member of the working company staff to do it. They may offer to pay them a lot of money or to do favors to get what they want from the security staff. Secondly, there are threats of other security companies trying to buy you out. They may place a bid to that same company you are trying buy out. Their bid maybe lower company than yours or they may promise better security for the company. They may say that theirs is better because they offer more. Their ways of securing the company from threat than you. Their technology maybe more up to date than yours, with extra features. They may say that not only can they charge you less, but that they can use less people on the staff to get the job done. There is also the threat of



References: www.wbdg.org/resources/riskanalysis.php http://www.securitymanagement.com/article/introduction-business-and-industrial.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is4796 Unit 1 Assignment

    • 370 Words
    • 2 Pages

    My company; RLR Securities Inc., has been in the security service since 2002 we started out with only four (4) people, now we have grown to twenty-two (22) people, RLR Securities Inc. was formed as a small corporation who’s focus was mainly on database performance tuning and security services for database applications. By 2006 we started providing complete security services, including assessments, penetration testing, policy creation, and regulatory compliance assistance.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    7. List at least 3 risks your company will face, and explain how you will manage those risks.…

    • 309 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    The purpose of this risk assessment is to evaluate the adequacy of the Global Finance, Inc. security and network. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost effective safeguards to mitigate threats and associated exploitable vulnerabilities. Safeguards are security features and controls that, when added to or included…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Chipotle

    • 8563 Words
    • 26 Pages

    -Provide a discussion of the opportunies and threats within the industry that are particularly applicable to your firm.…

    • 8563 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    To start off with I chose to go with our banking or financial industry. The banking industry is constantly getting attacked by various methods on a daily basis. I chose this industry because I happen to know someone who works in the security sector at Wells Fargo Bank, he was a good person to get information on what he sees on a daily or weekly basis. This paper is the opinion of myself and with gathered information from various resources.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Describe potential risks to the information and the related vulnerabilities within the organization. Identify the forces that drive each threat and the related vulnerabilities.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Threats) analysis would be applied to what this corporation may face in or near the…

    • 2625 Words
    • 19 Pages
    Better Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Organizing police departments in a militaristic manner is a theory that contends to lessen corruption amongst the police officers within the department. Depending on how stringent the military model is followed, a police department could have a well functioning system or it could create quite the opposite and develop a department full of corruption, chaos, and mismanagement. Because a department uses the military as a model to develop itself, it does not mean that it is foolproof. Many factors outside of organizing can lead to a well-balanced department or a department as involved in crime as the criminals from which they swore to protect the public. Using a hierarchy of command in departments gives a sense of stability, it delegates responsibilities and it has a person who is…

    • 595 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Ortmeier, P. (2009). Introduction to security: Operations and management (3rd ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.…

    • 1225 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Ortmeier, P.J. (2008). Introduction to Security: operations and Management (3rd ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.…

    • 1335 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    student

    • 287 Words
    • 1 Page

    3. What questions would you bring to executive management prior to finalizing your IT risk mitigation plan? What is the budget and time frame for the migration…

    • 287 Words
    • 1 Page
    Good Essays
  • Better Essays

    Terrorism

    • 1452 Words
    • 6 Pages

    “Prepare a written briefing for a Board (you can choose any company real or imaginary) explaining why they should increase or decrease their security in relation to the threat of terrorism.”…

    • 1452 Words
    • 6 Pages
    Better Essays

Related Topics