Security Assessment

Only available on StudyMode
  • Download(s) : 260
  • Published : September 6, 2011
Open Document
Text Preview
Axia College Material: Robin Mravik
Appendix G

Security Assessment


Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.

Setting 1:

| Probability| Criticality| Total| |
Example:Information theft| 4| 7| 11| Employee screening, limited computer access, and computer monitoring | Identity Theft| 4| 7| 11| Employee screening, limited access to computers and important documents, employees much be computer monitored and have password requirements| Newborn Child Abduction Security| 3| 10| 13| Employee screening, security cameras, security guards, child protection security plan that includes 24/7 monitoring of all babies.| Earthquake or Fire| 5| 10| 15| Extensive evacuation plan, sprinkler system installation| Firearm or Bomb| 4| 9| 13| Metal detectors at all entrances, have armed guards and unarmed guards, security cameras and CCTV installed.| Internal Theft| 3| 6| 9| Security managers to keep an eye out the employees, have security cameras, metal detectors and have every employee checked before they leave the store, CCTV, employee screening for all employees.|

Setting 2:

| Probability| Criticality| Total| |
Drug Smuggling and Use | 6| 7| 13| Canine dogs, random security check, cameras, CCTV, security guards, reducing class sizes| Fire and Bomb| 4| 9| 13| Metal detectors at entrances,...
tracking img