Preview

Vulnerable Areas of Industrial Security

Good Essays
Open Document
Open Document
922 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Vulnerable Areas of Industrial Security
Vulnerable Areas of Industrial Security Operations
Viviana Torres
SEC/320
November 25. 2012
Lasonya Uehlin

Vulnerable Areas of Industrial Security Operations
In the transportation industry such as airport, train, or ships there are many vulnerabilities that can be faced if security measures are not foreseen. These industries can be victims of sabotage, espionage, or lack of security process which would result in the industry loss of product. Sabotage such as terrorism will exist in transportation industries if the operations of the merchandise are not carried out to protocol. Espionage from competitor transportation industries can leak the company’s operations and be a risk for theft. Employee theft can be just as detrimental to the industry as outside theft. Some of the vulnerabilities and countermeasure will be mentioned in this review of different transportation industries.
Sabotage can be issues related to terrorism in the sense that terrorist want to harm for political reasons or for profit (PWC, 2011). Sabotage can also be from competitors or employees not even realizing they contributed to sabotaging the process of transportation. According to California Highway Patrol Commercial Industry Education Program (n.d.) “having a security plan in place will ensure your cargo reaches its destination safely, safe lives, avoid possible law suits, and prevent any accidental or intentional acts that could have serious consequences (page 4). To be aware of your surroundings will help prevent the threat of sabotage for transportation industries. Another way to avoid sabotage is to ensure workers are never alone. When employees are opening or closing the business there should always be more than one person with them to prevent an incident that would be harder to control if left alone (Hospitality 2008). Most industry losses occur due to lack of employee attention to their environment, which can lead to potential threats and espionage (Hospitality, 2008).

You May Also Find These Documents Helpful

  • Better Essays

    Gartenberg, M. (2005, January 13). How to develop an enterprise security policy. Retrieved from http://www.computerworld.com/article/2569303/security0/how-to-develop-an-enterprise-security-policy.html…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    In 2008 Boeing had made all sorts of headlines in the media, due to some new technological developments in their newly designed 787 Dreamliner. These headlines that splashed across websites were initially brought about due to a FAA “special conditions” report. This topic of this report first appeared in Flight International, and then a few days later it gathered momentum in a critical follow up from Wired Magazine. According to Wired (2008), the FAA states “Boeing’s new 787 may be vulnerable to hacker attack”.…

    • 1124 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Aircraft Solution’s Commercial Division, connects to the rest of the world via the Internet causing hardware vulnerabilities due to the absence of security and safety that should be implemented, leaving great concern for major security threats. The Commercial Division is only able to access important…

    • 745 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business Process Management system.…

    • 1345 Words
    • 6 Pages
    Better Essays
  • Good Essays

    To start off with I chose to go with our banking or financial industry. The banking industry is constantly getting attacked by various methods on a daily basis. I chose this industry because I happen to know someone who works in the security sector at Wells Fargo Bank, he was a good person to get information on what he sees on a daily or weekly basis. This paper is the opinion of myself and with gathered information from various resources.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining…

    • 870 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    [ 2 ]. Taylor, Alycia B., and Sarah Steedman. "The Evolution of Airline Security Since 9/11." Security Training. CPO, Dec. 2003. Web. 20 Feb. 2012. .…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Patting Down the TSA

    • 2182 Words
    • 9 Pages

    “Transportation is often likened to the body’s circulatory system” (Kulash 5). The circulation of blood is essential for the human life. In the same way the circulation of goods and people is critical to keep society running smoothly. If people and goods are not circulated smoothly, then society will start to slowly fall apart. Doctors remove blood clots and replace valves that have sprung leaks; transportation and logistics professional practice the same concept. They are used to keep the distribution system running by eliminating congestion and managing the flows of human traffic. Today there are new concerns about the transportation security (Kulash 5).…

    • 2182 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Chris herren unguarded

    • 2120 Words
    • 9 Pages

    Chris Herren is a star and an icon of achievement that America has had. This young man…

    • 2120 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    A large effect from 9/11 was an increase in the security aspects when it relates to aviation, when at the time America was fairly lackluster. There were many things you were able to do and get away with, that are completely unheard of nowadays. Then after this incident was a kick in the face for us here in America especially for us to make leaps in bounds when it comes to security. ”America’s involvement in the War on Terror — prompted…

    • 659 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Essay On Security Checks

    • 955 Words
    • 4 Pages

    Within the last several years, security checks, especially in the United States, have become more advanced along with rules and regulations of security being enforced. This is due to the increasing amount of threats, attacks, and use of illegal substances or items throughout the world. Authorities have increased security in the school system, national borders, trading ports, and airports. The increasing amount of security checks has a positive impact on society and these checks should be improved often to assure the safety of all people.…

    • 955 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Remote location: Employees who are working in remote location especially in suburb areas may be attacked by strangers or customers etc for example an employee at gas station may be attached by the customers or thieves etc.…

    • 1056 Words
    • 5 Pages
    Powerful Essays