Preview

Methods to Secure Sensitive Items

Good Essays
Open Document
Open Document
767 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Methods to Secure Sensitive Items
Accountability of Sensitive Items

Of the many tasks of a soldier, of all ranks and positions, one of the most important is that of operational security, or “Opsec”. This takes many forms, from keeping top secret actions and information secured and out of the hands of potential enemies, all the way to checking and double-checking all security measures guarding these “sensitive items”. This paper will explain the reasonings and methods behind, specifically, the guarding, securing, and monitoring of sensitive items of various types, as well as the consequences if such actions are not taken. There are multiple steps one must take to keep everything out of the hands of individuals who might less than desirable intentions. The first being the careful recording of all items to attain a proper count, distinguishable markings such as serial codes etched onto them, and a record of where they are kept. This allows a person to quickly check, whenever necessary, to find if any objects are missing with only a quick count and look in the appropriate places, and if they are missing allow the individuals searching to easily identify any items matching the descriptions with a likewise quick check for matching identification codes. Additionally, along with recording identifying marks, it is suggested to take photos rather than simply relying on memory to describe the appearance of sensitive items such as firearms. If identifying markings are not available, then it would be wise to etch, clearly and distinctly, and use those instead. Security checks should be conducted periodically, making sure that the count is accurate, with random checks of the serial numbers with the purpose of ensuring that the items on hand are the ones recorded. Another method of keeping these materials secure is to keep them locked and a record of all who access, further limiting any potential suspects if anything were to come up missing. While all of those are great for the securing of physical

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Soldiers must be and act responsibly in every situation they may find themselves in, whether it’s in or out of uniform. Responsibility increases when soldiers believe that they have personal control over their mission performance, performing out of desire to do well instead of just following orders. There have been many studies that have suggested that when a Soldier feels that they have personal control over work performance the result is that the Soldier has a better task performance, better problem solving, and a higher persistence in accomplishing the task, more positive emotions and even better psychological and physical health. Responsibility and accountability are two of the main factors in being a successful Soldier in today’s U.S. Army. You must be a responsible soldier if you want to make it through deployment alive. Or even worse, if you fail to be responsible you could…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | |everyday living but also as a leader to ensure Soldiers do the right thing. | |…

    • 1363 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Better Essays

    sec 410

    • 1157 Words
    • 5 Pages

    It is important for all organizations to have physical security. Physical security protects the organization in every way. Every individual needs to be aware of the importance of physical security. Not only is important for the individual to be aware of the importance physical security has in an organization but to be able to understand how physical security works within the organization. In this paper the writer will be describing the core concepts of physical security. Additionally the writer would be writing about the security assessments. Last the writing would be writing about the basic physical controls.…

    • 1157 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    References: D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach.. Information Systems Research, 20(1), 79-98.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    sensitive item

    • 294 Words
    • 1 Page

    Operational security is a process that denied critical information to an adversary. If one were to obtain the information presented it could be used against friendly forces. Utilizing all assets to maintain and secure sensitive items and classified information promote proper operational security and soldier readiness. Not securing items of sensitive nature acquire the risk of loss by being intercepted by unauthorized persons. All personnel should maintain accountability of all sensitive material to allow full utilization by themselves and anyone involved with the mission and still maintain operational security. Operational security can be compromised through the loss of sensitive items due to loss of equipment used for operational planning, or items used for support missions. Depending on the sensitive item that is being classified it could fall under a different level of security as it is deemed by the U.S. Government. The levels included in the term classified (withheld from general circulation for reasons of national security) are RESTRICTED (public disclosure could have undesirable effects or do some harm), CONFIDENTIAL (unauthorized disclosure could damage national security e.g. compromise information that indicates the strength of armed forces or disclosure of technical information about weapons), SECRET (unauthorized disclosure could seriously damage national security) and TOP…

    • 294 Words
    • 1 Page
    Good Essays
  • Good Essays

    Keeping Your Gun Safe

    • 435 Words
    • 2 Pages

    Owning a gun is a big responsibility – and you don’t want your guns getting into the hands of someone who shouldn’t. The best way to keep your guns secure is to purchase a guns safe for your home or business – wherever you keep your firearms.…

    • 435 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Accountability in Army

    • 900 Words
    • 4 Pages

    Throughout a Soldier’s training and career the Soldier’s Creed is the core value set that soldiers’ are expected to learn and live by. These are the values that a soldier is held accountable to. A soldier can thrive and fail in these values, but one thing is for sure, they will be held accountable. Most of these values are easy to understand and all make logical sense that a soldier should possess these values. The one value that many soldier’s struggle with is the accountability in “I always maintain my arms, my equipment and myself.” When a soldier fails to maintain these values they are held accountable. Which leads to a few questions: What is accountability? How does accountability pertain to the United States Army? What does all this mean to the value stated in the Soldier’s Creed, “I always maintain my arms, my equipment, and myself.” How does all this apply to an individual soldier? And a personal note, on how accountability plays a role in my career as a United States Soldier.…

    • 900 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Weapon Security

    • 503 Words
    • 3 Pages

    What are some of the reasons why you should practice good weapons security in places that are familiar and unfamiliar in a deployed environment? Reason One: You never know what other people may be thinking or planning so as a soldier you should be ready at all times. Reason Two: If you work in a environment where you are around locals that could be potentially a threat to you, you should never be to comfortable around them. Reason Three: You should never leave your weapon unattended because it may be picked up by the wrong person.…

    • 503 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Sensitive Items

    • 1543 Words
    • 4 Pages

    Sensitive items are very important when it comes to any solider which is why it is imprtant to always keep track of them and know where they are at all times. You should never leave your sensitive items alone, or if you have to, have someone in your platoon or team guard them. Always get your stuff back when you are done so you can have accountability. Your sensitive items include alot of things including your weapon, night vision goggles, spare barrels, and anything you will need to correctly perform your job right. Spare barrels are very important to me because I am a SAW gunner and depending on what rate of fire I am shooting at, I would need to change out my barrels from either 10 minutes to every minute. You should always keep your spare barrel on you because you never know how much you are going to shoot. Another sensitive items is your NODS. The Army is known for attacking at night and having night vision goggles is an essential tool that we all use to have an advantage over the enemy at night. Most countries do not have the equipment or money to buy this nice of equipment like us so we have a huge advantage over them in wars and fights. Having this is very important when it comes to doing missions in the night because simply, we can see at night. While most people have a sight range of about 5 meters away at night and cant see very far, we can focus our NODS pretty far away and see just as far as we can during the day. Your weapon is another huge and quite obvious sensitive item. obviously as infantryman, our weapon is our lifeline and our key sensitive item that we need as a soldier to perform just about any mission that includes engaging the enemy. Without our weapon, we are nothing and have no way to fight but with combatives. Every soldier has their own weapon from an M4 to a SAW to a 240 or a 203 grenadier and all play different roles in the team and company. The Team Leader provides tactical leadership for the team at all times with a do as I do…

    • 1543 Words
    • 4 Pages
    Better Essays
  • Good Essays

    . Each and every soldier is responsible for their appearance, being on time, physical fitness and a good deal of other thing that form their responsibilities. It’s all these little things that help make up a good soldier. A single soldier can make a big impact on other soldiers around him. This impact can be for better or for worse depending on how the soldier presents himself. No one wants to see a bunch of raged bums in the army. Being in the right uniform, at the right place, at the right time shows a basic level of self…

    • 466 Words
    • 2 Pages
    Good Essays