Preview

Material Security Case Study

Good Essays
Open Document
Open Document
570 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Material Security Case Study
1. What component of the overall security objective deserves the most attention in the environments mentioned in the article? What components would be less pertinent for these particular environments during a vulnerability assessment? Why?

I am fairly torn on what component of the overall security objective deserves the most attention when it comes to church safety, or any place of worship. The majorities of churches are small and are funded on public money. Thus, they cannot afford some of the “higher end” security measures, like a security agency or implementing metal detectors, which I believe would be scary for a place of worship to have to do.

I believe there are two important components to the overall security objective that deserve
…show more content…
I understand that the majority of places of worship are funded through public donations and congregation but if none of those who donate feel it is a safe place they can practice their religion, there is not likely to be anyone in attendance and the place of worship will fade anyways. I do not feel these places must have an “around-the-clock” professional security team watching surveillance cameras, as that can get very expensive but to ask for volunteers from the local community is not unheard of. If the place of worship had the ability to add more lighting around the outside of their building and perhaps a few surveillance cameras, whether they are monitored “around the clock” or not, I believe crimes such as arson or bombing would lessen. With enough lighting, the cameras can then cause the criminals features to be more discernable. With even somewhat clear images of the criminal, the place of worship can then ask for aid from the local community in capturing the one responsible. In this way, the crimes being wrought against the place of worship then sort of become a type of personnel security, involving the community in the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Argyle Security Inc. is a detention and commercial security provider based out of San Antonio, TX. Established in 2005 originally as Argyle Security Acquisition Corporation, Argyle Security Inc. operates through five different business units ISI, MCS, PDI, Com-Tec, and MCS Fire & Security business units. In April 2008, the private equity firm MML Capital made a $15 million investment into Argyle Security. The company has since successfully positioned itself to take advantage of increasing domestic incarceration rates and the need to house and secure an ever growing number of inmates.…

    • 756 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. When you assemble all of the “1” and “2” and “3” risk impact/risk factor values to the identified risk, threats, and vulnerabilities, how did you prioritize the “1”, “2”, and “3” risk elements? What would you say to the executive management in regards to your final recommended prioritization?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cjs 250 Appendix G

    • 288 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    The purpose of this risk assessment is to evaluate the adequacy of the Global Finance, Inc. security and network. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost effective safeguards to mitigate threats and associated exploitable vulnerabilities. Safeguards are security features and controls that, when added to or included…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    9. When considering access control security options to mitigate vulnerabilities within the infrastructure, it is ________.…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    To start off with I chose to go with our banking or financial industry. The banking industry is constantly getting attacked by various methods on a daily basis. I chose this industry because I happen to know someone who works in the security sector at Wells Fargo Bank, he was a good person to get information on what he sees on a daily or weekly basis. This paper is the opinion of myself and with gathered information from various resources.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Good Essays

    I think that some countermeasures that could be taken besides the security cameras would be doing things such as watching for bizarre behavior as well as a possible security guard for some of the more targeted churches. I think that because some of the terrorist acts that are committed such as bombs and arson, there are not many options to stop them that I know of besides the security cameras that I suggested earlier in the paper. The only other thing that I can think of is having a special bomb team trained and prepared for any bomb attempt or scare somewhere in a nearby location such as…

    • 669 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS 3110 lab 4 questions

    • 403 Words
    • 2 Pages

    4. When you assembled all of the “1” and “2” and “3” risk impact/risk factor values to the identified risks, threats, and vulnerabilities, how did you prioritize the “1”, “2”, and “3” risk elements? What would you say to the executive management in regards to your final recommended prioritization?…

    • 403 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 537 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fabletics Case Study

    • 478 Words
    • 2 Pages

    Fabletics is an athleisure online retail shop that sells men and women sportswear and accessories. The company offers membership subscription where members choose outfits based on their fashion preferences and one's lifestyle. Fabletics is a subsidiary of justFab rebranded to Techstyle Fashion group.…

    • 478 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cjs/250 Appendix G Week 6

    • 353 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Swot for Watch Industry

    • 474 Words
    • 2 Pages

    I have chosen to eliminate the words “Weaknesses” and “Threats” in the S.W.O.T. methodology and replace them with “What’s important” and “The future.”…

    • 474 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In the transportation industry such as airport, train, or ships there are many vulnerabilities that can be faced if security measures are not foreseen. These industries can be victims of sabotage, espionage, or lack of security process which would result in the industry loss of product. Sabotage such as terrorism will exist in transportation industries if the operations of the merchandise are not carried out to protocol. Espionage from competitor transportation industries can leak the company’s operations and be a risk for theft. Employee theft can be just as detrimental to the industry as outside theft. Some of the vulnerabilities and countermeasure will be mentioned in this review of different transportation industries.…

    • 922 Words
    • 4 Pages
    Good Essays