Preview

Security Assessment

Good Essays
Open Document
Open Document
824 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Assessment
Security Assessment
Amanda (Mandy) Jensen
CJS/250
6/13/2014
Dr. Gale Tolan

Security Assessment
Associate Level Material
Appendix B

Security Assessment

Directions:

Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.

This assessment is based on the Facts for Consideration on page _93___

THREAT

RISK

COUNTERMEASURE

Probability
Criticality
Total

Example:
Physical assault

9

4

13

Highly visible officer presence
Physical assault
9
7
16
Transport should be equipped with a thick metal cage surrounding area inmates are in. Inmates should be contained also with shackles on hands and feet.
Property damage and or personal harm
6
5
11
All inmates, shackled together or not, need to have shackles anchored to sturdy eyebolts welded into floor to maintain limited movement.
Escape during bathroom breaks
7
5
12
Armed guard escort to restroom from transport, armed escort to transport, with remaining guard still on transport. Inmates relieves themselves under armed surveillance, with door open at all times. No civilians allowed near inmates, or bathrooms during the inmate’s bathroom breaks and guards must inspect bathrooms thoroughly before and after leaving restrooms. Extra guards in escort cars should help in this process to maintain security.
Escape through windows or vents
8
5
13
All windows and vents should be secured outside of the cage surrounding the inmates, armed guard should be in transport at all

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    | Metal detectors at all entrances, have armed guards and unarmed guards, security cameras and CCTV installed.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 616 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cjs 250 Appendix G

    • 288 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Use the Web to research and evaluate security products from two competing vendors, such a...…

    • 428 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    prison were to keep the inmates groomed but at the same time it is in the constitution,…

    • 1025 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Koror Jail Rehabilitation

    • 1577 Words
    • 7 Pages

    difficult to implement in a system like ours, unless it was in a rural small town jail. The…

    • 1577 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    The patients’ security in general is being looked after by having locked exit doors, and a fence around the garden. This stops people from leaving/coming in.…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    D Poad Reflective Account

    • 415 Words
    • 2 Pages

    During my safety and security checks in D Pod, I noticed the inmate BLANK was acting and behaving differently than usual. Not only she was sitting in her bunk bed with head down, her cell was neatly organized, and all of her belongings were packed. From my observation it appeared as if she were as if she were going somewhere. I asked inmate BLANK how she was doing and why there was a sudden change in her room appearance. She did not…

    • 415 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There are also situations where inmates are not provided with proper care or living conditions. (Judy Owens Audio)” some of the conditions are inmates who ask for treatment have been responded to with fire extinguishers and/ or faced with pepper spray, just for asking for help. News Mississippi…

    • 561 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    All sensitive infomation relating to inmates should be locked in a secure place where only care staff can access it. Confidential infomation which comes to your attention should be shared only on a need to know basis and not with any other persons other than care staff and the inmate concerned, although an exception could be made in the case of an emergency where urgent care needs to be given requiring access to the…

    • 714 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I always make sure the doors, blinds, curtains, etc. Are closed to always ensure that the individual keeps their dignity and respect.…

    • 796 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Prison Service encompasses three central aims; holding prisoners securely, decrease risk of offending and lastly offer safe, well-ordered institutions in which prisoners are treated humanely, decently and lawfully (Cavadino and Dignan, 2007, p.193). When the state incarcerates, it must accept accountability for the basic care of those it detains. Although prisoners should not expect luxuries during their time of incarceration, they should not be deprived of the basic goods and comforts of life. Certification of access to enough goods should be available to help them develop as the citizens expected to be. Lord Justice Woolf (1991) claimed three necessities for the prison system to maintain steadiness: security, control and justice. In terms…

    • 247 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lesson 2 Dynamic Security

    • 388 Words
    • 4 Pages

    Custodial Care Services Dynamic Security This session will help you with; P1 Describe the physical, dynamic and procedural security considerations in a custodial environment D1 Evaluate the need for security and control in a custodial environment Objectives All students will be able to; State what is meant by the term ‘Dynamic Security’ Discuss the type of information that could be gained from Prison intelligence Some students will be able to; List the benefits of a good prison regime Recap on Physical Security What is the difference between an Open or Closed prison in terms of security? Closed is completely locked Open allows prisoners out for work/weekend home visits State the difference between a Category A prisoner and a Category D prisoner Category…

    • 388 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In our prison secure custody is assigned to anyone placed in jail that is risk in the general population. This stops them from getting harmed by other inmates, inmates in addition can appeal this for their own safety if they feel threatened. Sex offenders and high profile inmates that appear into jail are automatically placed in secure custody. Secure custody is a way of life in prison. The point is that custody, in a prison, goes on 24 hours a day. It never stops, and there's no abatement from assignment. There are protocols designed for action according to a case by case analysis. Prisoners placed in such care must be maintained with a minimum amount of break in our perimeter.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays