Preview

Psy/250 Appendix G

Satisfactory Essays
Open Document
Open Document
398 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Psy/250 Appendix G
Axia College Material: Robin Mravik
Appendix G

Security Assessment

Directions

Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.

Setting 1:

THREAT | RISK | COUNTERMEASURE | | Probability | Criticality | Total | |
…show more content…
| Earthquake or Fire | 5 | 10 | 15 | Extensive evacuation plan, sprinkler system installation | Firearm or Bomb | 4 | 9 | 13 | Metal detectors at all entrances, have armed guards and unarmed guards, security cameras and CCTV installed. | Internal Theft | 3 | 6 | 9 | Security managers to keep an eye out the employees, have security cameras, metal detectors and have every employee checked before they leave the store, CCTV, employee screening for all employees. |

Setting 2:

THREAT | RISK | COUNTERMEASURE

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    • Physical controls (such as perimeter security controls, badges, keys and combination locks, cameras, barricades, fencing, security dogs, lighting, and separating the workplace into functional areas)…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Appendix B Bus/210

    • 260 Words
    • 2 Pages

    | |Ensuring that all functions of the business are being ran to the best of company’s |…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 616 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Com 135 Week 5 Analysis

    • 678 Words
    • 3 Pages

    Three complete security policies. Use the Week 5 writing assignment as your starter policy for this section.…

    • 678 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. When you assemble all of the “1” and “2” and “3” risk impact/risk factor values to the identified risk, threats, and vulnerabilities, how did you prioritize the “1”, “2”, and “3” risk elements? What would you say to the executive management in regards to your final recommended prioritization?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    6.03 Fact Sheet

    • 1065 Words
    • 5 Pages

    Do u know if the security guard has a check in log when you drive into the facility? Both person in charge and 23 persons. 30. Does the guard keep a log of his shift? I.E roaming the grounds to ensure its secure or does he stay only on the main entry?…

    • 1065 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Psy265 Appendix B

    • 340 Words
    • 2 Pages

    | |(only 60% of men) and their skin becomes flushed. |erection in their nipple and their skin |…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Com/220 Appendix F

    • 353 Words
    • 2 Pages

    |persuasive essay? |explain why it’s important to use legal drugs for what they’re intended. |…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Risky Situations

    • 2619 Words
    • 11 Pages

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 2619 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    psy appendix b

    • 391 Words
    • 2 Pages

    -The first issue of journal and personality was published in 1932, this was aimed to join German studies.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Business Requirment

    • 2599 Words
    • 11 Pages

    4-I Inc. was founded in 2002 by Israel Telleria as an independent security consulting firm in Miami, State of Florida, with a focus on database application security. Since then, we have grown to provide a wide range of offerings, including physical security assessments, security training, auditing and policy review. Operational Systems and Databases, Infrastructure and security We have done a significant amount of work for city, state, local and Federal government agencies throughout the country, in addition to private sector and corporate clients. We believe that our experience and expertise are well aligned with your needs.…

    • 2599 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    hotel security

    • 1281 Words
    • 6 Pages

    A successful hotel security manager needs to be professional, well-trained in topics ranging from life safety to liability, a good communicator, and open to addressing new and challenging needs. Understanding new technology is especially important. Security salespeople and security managers can work together to bring the best system and product to the hotel property in such areas as: 1. guest room key systems, 2. fire alarm systems, 3. radio systems, and 4. closed-circuit television cameras. Litigation also is a serious concern. In addition to protecting life and property, security managers must plan to prevent any act that threatens the well-being of guests and the assets of the company. Planning ahead is essential. Consequently, a risk analysis should be prepared for each property, listing the vulnerability of every aspect of the property, including employees, guests, and assets. A management plan should outline procedures to prevent and respond to possible situations identified in the analysis.…

    • 1281 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Week 2 Lab

    • 507 Words
    • 3 Pages

    1.) From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5, High/Medium/Low Nessus Risk Factor Definitions for Vulnerabilities)…

    • 507 Words
    • 3 Pages
    Good Essays