Preview

CJS 250 APP G

Satisfactory Essays
Open Document
Open Document
280 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CJS 250 APP G
Associate Level Material-Maya Baker
Appendix G

Security Assessment

Directions

Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.

Setting 1:Hospital

THREAT

RISK

COUNTERMEASURE

Probability
Criticality
Total

***Example:
Information theft

4

7

11

Employee screening, limited computer access, and computer monitoring

Stealing drugs or drug abuse

4

6

10

Written and system monitor of medication, check ins and outs with patients, and cameras where medication may be stored.

Sexual harassment

5

8

13
Cameras in all areas, notification of physical or sexual threat; limit of physical contact.

Hostage/ kidnapping
3
9
12
Monitoring of patients. Locks on doors; screening of patients, family, etc; cameras in all entrances; employee training.

Bomb Threat
2
9
11
Employees take calls seriously; monitor all information; secure all computer access; training and procedures.

Assault

2

4

6
Manage of personnel; record check in slips; secure all persons; guards visibility.

Setting 2: Airport

THREAT

RISK

COUNTERMEASURE

Probability
Criticality
Total

Terrorist attacks
8
10
18
Securing all entities, security and cameras around building, employee notifications, monitor flights and personnel, and evacuation methods.

Theft

5

5

10 Secure all computer information, id all guests, secure all baggage and persons,

Bomb Threat

2

9

11 Secure all machinery and chemicals, monitor and record all computers and calls, and secure the

You May Also Find These Documents Helpful

  • Good Essays

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 616 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Health and safety - Ensure all fire exits are kept clear. Ensure all patient walk ways are clear.…

    • 700 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Storing medicines, care worker/assistant must have correct packaging for medicines depending on how long journey can be for example, if a short trip there are brown bags available from local chemists/pharmacy to store them in for short journeys. If journey may be longer there are also blister packs obtainable. They hold a 28 days’ worth of medicines. Special colours for different times of the day/night as different service users may need thought the day/outing i.e. Pink is for morning, yellow is for lunch, orange for evening, blue for night time medication. Care workers/assistants need to keep them in a cool environment and have a list of all medications just in case a service doesn’t not take them and identify which service user…

    • 1017 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The computerized databases in a pharmacy collect a host of patient information including the patient’s address, the patient’s name, the date it was filled, the place it was filled, the patient’s gender and age, the prescribing physician, what drug was prescribed, the dosage, and how many pills.…

    • 1067 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    read

    • 311 Words
    • 2 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    All illnesses and injuries are documented/recorded correctly, steps taken to stop infection spreading (if a child is sick in the unit making sure it is properly cleaned if a child has ring worm making sure that it is being treated). Reporting any hazards before they cause an accident.…

    • 332 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    After the attacks of September 11, 2001, the United States system went through a change in reforming government agencies to protect the American borders against any threats. The government established the Department of Homeland Security, which mission is to protect America borders against external or internal threats that could potential cause harm in our nation. Since the Department of Homeland Security continues improving the national security protection of this nation by establishing effective programs and activities…

    • 2663 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    In the years prior to 9/11 $200,000,000 on average was spent on airport security each year, which supplied 15,000 with job but, after 9/11 $500,000,000 was spent on airport security on average each year, which supplied 31,500 with jobs (Kim). The average time it took to get through airport security before 9/11 was 15 minutes now it’s 45 minutes (Kim). However, all of this money, time, and effort put into increasing airport security has been overkill and hasn’t thwarted any potential bombings, but instead has overshadowed the even more important subject of safety.…

    • 1378 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Law Enforcement Today

    • 775 Words
    • 4 Pages

    William V. Pelfrey, “The Cycle of Preparedness: Establishing a Framework to Prepare for Terrorist Threats,” Journal of Homeland Security and Emergency Management 2, no. 1 (2005): 9,…

    • 775 Words
    • 4 Pages
    Good Essays
  • Better Essays

    A key starting point for this issue is to evaluate the threat levels that airlines in particular and American citizens and interests in general are faced with. An accurate and succinct evaluation of the federal government’s level of preparedness after 9/11 suggest that there is a higher threat of another attack of the same nature than at any other time (Shane, 2007). The creation of the Department of Homeland Security and the passage by Congress of a number of legislations aimed at giving security agencies more power to access information regarding suspected terrorists are just enough indicators that there is a possibility of a repeat of the 9/11 incidents (Shane, 2007).…

    • 1266 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Non-clinical technology is available and valuable as a tool for us in health care. Electronic health records allow us to document care and store diagnostics for accessibility from local WOWs or outside locations and handheld devices. Systems allow providers to access information form home or office. Scheduling is done easily electronically; also may done by the patients themselves. E-scripts are sent directly to pharmacies upon patient’s discharge, to lower the incidence of prescription fraud and medication errors; prescriptions are also filled faster for the patients. There are various systems that a nurse or provider must become familiar within a facility that are non-clinical, Pixies for medications, Vocera for communications, electronic dictations devices, all are advancements to save time and increase efficiencies.…

    • 392 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Reading

    • 11453 Words
    • 40 Pages

    American Society for Industrial Security (ASIS) Certified Protection Professional (CPP) Contingency plan Contract 64 Countermeasures Criticality Loss event Predictable environment Proactive…

    • 11453 Words
    • 40 Pages
    Good Essays
  • Powerful Essays

    Access Control

    • 2183 Words
    • 9 Pages

    Physical security breaches can be detrimental to any company. Adequate access control is imperative to insure the protection of data, assets and employees. In a post 9/11 America, the need for higher physical security standards and more stringent access control systems remains a critical piece of corporate security plans. Access control systems not only keep out unauthorized individuals, but prevent unauthorized access to data and equipment, and help deter and prevent unauthorized disclosure of information. “In traditional physical security, locks, security alarms, access controls, and surveillance video define the primary hardware systems.” (Martin & Bakhto). This paper examines the significance of physical access controls and their purpose and place in the corporate security program.…

    • 2183 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Computer Security

    • 792 Words
    • 4 Pages

    The importance of this fact needs to be clearly highlighted so that adequate measures will be implemented, not only enhancing the company's daily business procedures and transactions, but also to ensure that the much needed security measures are implemented with an acceptable level of security competency when there’re so many threats to the computer out there.…

    • 792 Words
    • 4 Pages
    Good Essays