Preview

CJS 250 Week 3 Security Objective Components

Satisfactory Essays
Open Document
Open Document
936 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CJS 250 Week 3 Security Objective Components
Security Objective Components
Troy Smith
CJS/250
June 2, 2013
Tom Jones

If you were to close your eyes and imagine a perfect world were crime was not a problem then that world would exist without any forms of security. Unfortunately we do live in a world where crime does exist and there is a need for different forms of security components or measures to combat those criminal acts or other forms of threats. The article from the text described various instances were violent acts caused people to not feel safe and posed the idea of where can people go if they wanted to feel safe. The overall answer was that people felt that church is the place that everyone could go in order to feel safe because churches are considered a symbol of high moral standards but that is not the case anymore. Churches have since become places where many horrible outcomes have taken place such as shootings, bombings, arson and murders. A police chief said that the safest place in the world he always thought was a church and now that sanctuary has been broken (Clifford, 2004). The component of the overall security objective that deserves the most attention in the environments mentioned in the article is physical security. The reason why physical security would work for the environments described in the article is that under physical security components include security hardware such as alarms, closed captioned television (CCTV), locks and lighting. Having security officers, policy and procedure manuals in place for the entire security program helps to deter or even prevent threats. Locks and alarms can be used to protect the people and the property while CCTV can act as the eyes and two way intercoms can act as the ears of the system. Also under the physical security program, policy and procedure manuals grant the security professionals authority to perform the necessary security functions correctly (Clifford, 2004). The component that would be the less pertinent for this

You May Also Find These Documents Helpful

  • Better Essays

    Mkt 500 - Assignment #4

    • 2708 Words
    • 11 Pages

    * Automated / Controlled gate access to the facility so the facility is accessible 24/7.…

    • 2708 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    a) Physical Security - Is intended to detect and deter unauthorized personnel from gaining access.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    SE578 - Practices for Administration of Physical & Operations SecurityKeller Graduate School of ManagementPREPARED BY: PREPARED ON: APRIL 9, 2011…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your…

    • 717 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Army Regulation 190–51

    • 37089 Words
    • 149 Pages

    o Consolidates paragraphs 6 through 9, 11, 13, 15 through 17, and 19 of AR 190-18…

    • 37089 Words
    • 149 Pages
    Powerful Essays
  • Better Essays

    Business

    • 2429 Words
    • 10 Pages

    Physical security is the protection offered for property, these may be buildings or any other form of asset, against intruders (Arata, 2006). . The idea therefore, is to keep off unwanted persons or objects from ones premises. One’s premise is defined by a boundary which separates private property from the rest of the land. This boundary is referred to as the perimeter.…

    • 2429 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Est1 Task 1

    • 623 Words
    • 3 Pages

    The security rule has meaningful standards that are grouped into five categories; administrative safeguard, physical safeguard, technical standards, organizational standards, and policies, procedures, and documentation requirements. Administrative safeguards have several standards that help implement the security rule. The security operation purpose require organizations to evaluate their risks to security and implement policies and procedures that prohibit, detect, and acceptable security violations and to define appropriate approval for security violations. Another, workforce security has three implementation qualifications that are mandatory by the organizations. The organization has to contain policies and procedures to ensure that each members of the particular…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Security is divided in three major areas: Physical security includes access to the building, offices, and the rooms housing the organization’s servers and other critical computing devices. External threats to the organization’s computing network such as hackers and malicious software. Access and permission to authorized users of the system as well as to the information.…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    As an organization grows so must the security, and it has to be on the top of the list. When considering what type of security to choose, either proprietary or contact, they need to look at the value of the organization? This value within the organization will need some sort of protection to deter theft, vandalism, and destruction. The boardroom conversation could to from, “We have nice stuff” to “How are we going to protect it.” Leadership will need to decide how they will handle the issue of protecting their items that the business owns. In the process we will need to look at the pros and cons of both proprietary and contract security. Both of them have very big advantages associated with them but most of the time only one meets the needs of the organization. We have established that the organization has nice stuff, they need to protect it, we assume they have the month to support either option and they have a choice to make. This issues come down to management, and cost. One option provides for maximum control whereas the other does not allow for much control. The costs are different also. One option there is a set cost, but it could be high and other option the cost could depend upon the capabilities of the office and how many people are hired for the organization. We have defined the problem and lay out the possible options. We will explore the outcomes, their advantages, and their disadvantages. It comes down to what the right fit for the organization. Additionally we will look at these differences between proprietary versus contract security as it compares to consistency, effectiveness, and obligation (COHEN (1979). Choosing Contract or Proprietary Security).…

    • 1284 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    2. The data stored in locked drawers, rooms, or areas where access is controlled by a guard, cipher lock, or a card reader is a key area where cryptography is needed as access to these areas must be restricted to any unauthorized personnel. Any secured or guarded restricted area is required to have physical access control measures to allot for protection and to prevent any unauthorized access by anyone not holding the proper credentials to be in the secured area.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The component of the overall security objective that deserves the most attention in the church environment mentioned in the article would have to be physical security. Physical security which includes locks, lighting, alarms, closed-captioned television, policy and procedure manuals, and security officers would help to reduce the crimes being done within churches because it would tell the criminal to take extra precautions in the crimes they want to commit to where they may reconsider doing the crime at hand. If the criminal sees cameras or security guards in place they will not want to try their luck going into the church with a firearm or explosives because they could get caught easier. If…

    • 701 Words
    • 3 Pages
    Good Essays
  • Good Essays

    People have an instant sense of security when crossing the threshold of a church. Churches have become more aware of their security objectives because of the number of attacks on churches and religious sites. The main objective for any target environment is safety and protection, and it is the same for churches. The most important component needing attention for the environments in the article is physical security. Some churches have hired armed and unarmed, plainclothes law enforcement for additional protection (Security Solutions, 2011). Responsibility for the safety of staff, volunteers, and congregation has to fall to the church (Christian News Wire, 2010)…

    • 881 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    “Identify what you see as the main purpose of Security Management” and “Discuss what is meant by the statement that ‘Security measures must be commensurate with the threat’”.…

    • 1598 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Up to now, majority of organizations have their physical and logical access systems operating as independent structures, with each being run by a totally separate department. The information technology security system, which controls access to information technology infrastructure including mail servers, the internet, database applications and web servers was managed by the department of information technology. The physical security system, which incorporates door access into buildings, systems of life support such as CCTV and Fire, and the badging process of employees, was run by the department of facilities (Mehdizadeh, Y, 2003).…

    • 4782 Words
    • 16 Pages
    Good Essays