SlideShare a Scribd company logo
1 of 6
Running head: FINAL PROJECT PROPOSAL 1
Project Proposal- Week 8 Final Project Proposal
John Intindolo
ISSC368: IT Security- Physical and Peripheral Defense
August 30th, 2015
Professor Carlo Tannoury
American Military University
FINAL PROJECT PROPOSAL 2
Project Proposal- Week 8 Final Project Proposal
Over the last eight weeks, as the new protection officer I have gone over the different
measures that are necessary in order for ESL Inc. to become a more secure environment. In this
final proposal I will summarize and go over then entire proposal. The first areas that I will
discuss will relate to increase communications and creating a more adequate security staff and
shifts. From there I will discuss the plan for physical security and access control policies, and
then lastly how to handle workplace crime and violence mitigation.
Communication is vital to the success of any plan. No matter what security measures are
put into place, without proper communication they will fail. Increased communication will begin
immediately through email updates to all employees regarding company policies and procedures
as well as any changes being made. Furthermore, a weekly meeting with all security personnel
will occur to address any comments or concerns on how to improve security. Additionally, there
will be monthly security awareness meetings for security personnel to keep up with the latest
threats and suspicious behavior to keep an eye out for.
Security personnel will be beefed up as well. During normal business hours of 8 AM to 6
PM, three security guards will work, where one will be posted at each guard shack. An intercom
system will be used at the front and rear gates during off peak hours that allows the front desk
security guard to buzz a person in. Three more security guards will be working the second shift
from 4 PM to 12 AM, followed by a third shift crew of three guards that work from 12 AM to 8
AM. During the overlap 4 PM to 6 PM, the second shift guards will walk the hallways. During
second and third shift there will be a guard at the front desk, and the other two guards will walk
the hallways.
FINAL PROJECT PROPOSAL 3
Physical security measures that will take place starts with securing the entire premises.
Gates will be installed at the front and rear of the building and fences will be surrounding the
entire building. A guard shack will be posted at the front and rear of the building where gates are
installed. Next will be a security plan that will identify the company’s assets. These assets can
range anywhere from buildings or vehicles to off equipment or cash. At this point is where all
threats to company assets are determined. This could be in the form of natural disaster, a person
from inside the company, or someone from outside of the organization. A risk assessment will
determine which countermeasures to use, by deciding what assets are at the biggest risk of an
attack. Each asset will be given a likelihood assessment (not likely, likely, highly likely, or
certain) and a value number of importance (1 is low, 2 is medium, 3 is high, 4 most important) to
the company.
Once the risk assessment is complete then countermeasures can be put into place. A layered
security approach is the best method to use, because if one line of defense fails then another will
keep an asset from being damaged or attacked. Gates and fences surrounding the entire building
will be the first line of defense. The second line of defense which is the exterior of the building
will have security cameras and intrusion detection devices placed around the building on all
doors, skylights, and windows. The third line of defense are interior controls. The controls
should include the following: Intrusion detection devices at all exit doors as well as important
rooms such as the data center and document storage room. Some access controls that should be
used for these rooms is a biometric keypad that requires not only an authorized card to be
swiped, but also the employees fingerprint in order for the door to unlock. This way only
authorized personnel will have access to confidential data. Furthermore, all pertinent documents
should be locked in storage cabinets that are located in a fire protected room. Extremely
FINAL PROJECT PROPOSAL 4
confidential documents will be located in a safe within a vault, and there will be a motion
detection system in that room as well. This room will also require the use of biometrics. A card
access system along with a retina scanner will be used for this door in order to better secure the
confidential company data.
Workplace violence can be a minor issue, but can also start at a low level and escalate to
something much more serious. Some lower level damage as a result of workplace violence is an
employee refusing to listen with their supervisor or arguing with coworkers. This could escalate
to something more serious such as verbal threats to coworkers or management, and could worsen
to the point of physical attacks and assaults (IFPO, 2010, pp. 287-288). In order to mitigate this
type of activity there will be a zero tolerance policy on this type of behavior that is explained and
signed off on by each employee. This will perhaps deter some from acting on their aggression for
fear of losing their job or worse. Having a prevention plan in place will also be a must and will
include the following: monthly meetings on workplace violence prevention, an open
communication policy to anonymously report any incidents or concerns, and explaining
company policies, procedures, and plan in monthly meetings or as needed.
Workplace crime is a common occurrence that unfortunately occurs due to dishonest
employees. The thing to keep in mind with this issue and the best way to look at it from a
security aspect is that the less opportunity that is given to employees to steal, the less it will
occur. So how can this type of dishonest behavior be prevented? One such way is deterrence.
The punishment for an employee getting caught stealing should be severe so that they themselves
learn their lesson, and also to keep someone else who had thoughts of stealing from acting on
their feelings (IFPO, 2010, p. 256). Another way to prevent items from being stolen is through
the use of access control methods that were explained in the last proposal. Knowing that there
FINAL PROJECT PROPOSAL 5
are security cameras, motion and intrusion detection devices in place will keep people from
acting on wanting to steal something for fear of being caught.
By following the steps outlined throughout this proposal ESL Inc. will have no fear of
losing the lucrative federal contract they were awarded, and they can rest assured that the
company’s assets are secure and well protected.
FINAL PROJECT PROPOSAL 6
References
IFPO (2010). The Professional Protection Officer: Practical Security Strategies and Emerging Trends.
Retrieved from http://www.eblib.com

More Related Content

What's hot

Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...BeyondTrust
 
External Attacks Against Pivileged Accounts
External Attacks Against Pivileged AccountsExternal Attacks Against Pivileged Accounts
External Attacks Against Pivileged AccountsLindsay Marsh
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Infographic analytics infographic_illustrations_121117-2
Infographic analytics infographic_illustrations_121117-2Infographic analytics infographic_illustrations_121117-2
Infographic analytics infographic_illustrations_121117-2Richard Smiraldi
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015Major Hayden
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya RansomwareSiemplify
 
Proven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your businessProven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your businessAnkitaKale12
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 
SITSecure Audits
SITSecure AuditsSITSecure Audits
SITSecure Auditsaristoslabs
 

What's hot (13)

Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
 
External Attacks Against Pivileged Accounts
External Attacks Against Pivileged AccountsExternal Attacks Against Pivileged Accounts
External Attacks Against Pivileged Accounts
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Infographic analytics infographic_illustrations_121117-2
Infographic analytics infographic_illustrations_121117-2Infographic analytics infographic_illustrations_121117-2
Infographic analytics infographic_illustrations_121117-2
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya Ransomware
 
Proven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your businessProven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your business
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
SITSecure Audits
SITSecure AuditsSITSecure Audits
SITSecure Audits
 

Viewers also liked

Om0017 advanced production and planning control
Om0017 advanced production and planning controlOm0017 advanced production and planning control
Om0017 advanced production and planning controlconsult4solutions
 
Презентация о фонде
Презентация о фондеПрезентация о фонде
Презентация о фондеYelnur Shalkibayev
 
Servicios Logísticos Gala Capilla, S.L.
Servicios Logísticos Gala Capilla, S.L.Servicios Logísticos Gala Capilla, S.L.
Servicios Logísticos Gala Capilla, S.L.Vicente Gala Capilla
 
trabajo jose rossana
trabajo jose rossanatrabajo jose rossana
trabajo jose rossanaLuiz Casanova
 
Роль школьной среды в формировании у учеников здорового образа жизни
Роль школьной среды в формировании у учеников здорового образа жизниРоль школьной среды в формировании у учеников здорового образа жизни
Роль школьной среды в формировании у учеников здорового образа жизниblackcat
 
Reading comprehensión power tools
Reading comprehensión power toolsReading comprehensión power tools
Reading comprehensión power toolsstevencas21
 
Evaluatie van Sportevenementen
Evaluatie van SportevenementenEvaluatie van Sportevenementen
Evaluatie van SportevenementenEgbert Oldenboom
 
Organizaciones tradicionales y actuales
Organizaciones tradicionales y actualesOrganizaciones tradicionales y actuales
Organizaciones tradicionales y actualesderly122
 
Mi0034 database management system
Mi0034 database management systemMi0034 database management system
Mi0034 database management systemconsult4solutions
 
Wireless Audio 360 Samsung
Wireless Audio 360 SamsungWireless Audio 360 Samsung
Wireless Audio 360 SamsungFFM_Training
 

Viewers also liked (14)

Om0017 advanced production and planning control
Om0017 advanced production and planning controlOm0017 advanced production and planning control
Om0017 advanced production and planning control
 
Презентация о фонде
Презентация о фондеПрезентация о фонде
Презентация о фонде
 
Servicios Logísticos Gala Capilla, S.L.
Servicios Logísticos Gala Capilla, S.L.Servicios Logísticos Gala Capilla, S.L.
Servicios Logísticos Gala Capilla, S.L.
 
Tarea nº 3 actividades ii
Tarea nº 3 actividades iiTarea nº 3 actividades ii
Tarea nº 3 actividades ii
 
trabajo jose rossana
trabajo jose rossanatrabajo jose rossana
trabajo jose rossana
 
Slide share
Slide shareSlide share
Slide share
 
Роль школьной среды в формировании у учеников здорового образа жизни
Роль школьной среды в формировании у учеников здорового образа жизниРоль школьной среды в формировании у учеников здорового образа жизни
Роль школьной среды в формировании у учеников здорового образа жизни
 
Reading comprehensión power tools
Reading comprehensión power toolsReading comprehensión power tools
Reading comprehensión power tools
 
Evaluatie van Sportevenementen
Evaluatie van SportevenementenEvaluatie van Sportevenementen
Evaluatie van Sportevenementen
 
Organizaciones tradicionales y actuales
Organizaciones tradicionales y actualesOrganizaciones tradicionales y actuales
Organizaciones tradicionales y actuales
 
Team1FinalPresentation
Team1FinalPresentationTeam1FinalPresentation
Team1FinalPresentation
 
Mi0034 database management system
Mi0034 database management systemMi0034 database management system
Mi0034 database management system
 
remon rezek c.v
remon rezek c.vremon rezek c.v
remon rezek c.v
 
Wireless Audio 360 Samsung
Wireless Audio 360 SamsungWireless Audio 360 Samsung
Wireless Audio 360 Samsung
 

Similar to ISSC368_Final_Project Proposal_Wk8_Intindolo

ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloJohn Intindolo
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
SafeguardsintheworkplaceAdam Richards
 
Five Mistakes of Incident Response
Five Mistakes of Incident ResponseFive Mistakes of Incident Response
Five Mistakes of Incident ResponseAnton Chuvakin
 
Work Environment Secure Work Envi.docx
Work Environment      Secure Work Envi.docxWork Environment      Secure Work Envi.docx
Work Environment Secure Work Envi.docxericbrooks84875
 
News letter June 11
News letter June 11News letter June 11
News letter June 11captsbtyagi
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...Quinnipiac University
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf503SaranyaS
 
66Chapter 3Security Surveys and the AuditLawrence .docx
66Chapter 3Security Surveys and the AuditLawrence .docx66Chapter 3Security Surveys and the AuditLawrence .docx
66Chapter 3Security Surveys and the AuditLawrence .docxblondellchancy
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docxmoggdede
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfMax Secure Ltd
 
Team-b ConsultantsSEC332May 5, 2014Terence hunt, mccm, .docx
Team-b ConsultantsSEC332May 5, 2014Terence hunt, mccm, .docxTeam-b ConsultantsSEC332May 5, 2014Terence hunt, mccm, .docx
Team-b ConsultantsSEC332May 5, 2014Terence hunt, mccm, .docxmattinsonjanel
 
Public Surveillance In The USA Essay
Public Surveillance In The USA EssayPublic Surveillance In The USA Essay
Public Surveillance In The USA EssayWinstina Kennedy
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfEnov8
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsCSantosConleyha
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsCAbbyWhyte974
 
Iscon Imaging, Inc. White Paper
Iscon Imaging, Inc. White PaperIscon Imaging, Inc. White Paper
Iscon Imaging, Inc. White PaperBill Gately
 
Iscon Imaging Personal Security Screening White Paper
Iscon Imaging Personal Security Screening White PaperIscon Imaging Personal Security Screening White Paper
Iscon Imaging Personal Security Screening White PaperBill Gately
 

Similar to ISSC368_Final_Project Proposal_Wk8_Intindolo (20)

ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_Intindolo
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
Safeguardsintheworkplace
 
Five Mistakes of Incident Response
Five Mistakes of Incident ResponseFive Mistakes of Incident Response
Five Mistakes of Incident Response
 
Work Environment Secure Work Envi.docx
Work Environment      Secure Work Envi.docxWork Environment      Secure Work Envi.docx
Work Environment Secure Work Envi.docx
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
66Chapter 3Security Surveys and the AuditLawrence .docx
66Chapter 3Security Surveys and the AuditLawrence .docx66Chapter 3Security Surveys and the AuditLawrence .docx
66Chapter 3Security Surveys and the AuditLawrence .docx
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
Team-b ConsultantsSEC332May 5, 2014Terence hunt, mccm, .docx
Team-b ConsultantsSEC332May 5, 2014Terence hunt, mccm, .docxTeam-b ConsultantsSEC332May 5, 2014Terence hunt, mccm, .docx
Team-b ConsultantsSEC332May 5, 2014Terence hunt, mccm, .docx
 
Public Surveillance In The USA Essay
Public Surveillance In The USA EssayPublic Surveillance In The USA Essay
Public Surveillance In The USA Essay
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
Iscon Imaging, Inc. White Paper
Iscon Imaging, Inc. White PaperIscon Imaging, Inc. White Paper
Iscon Imaging, Inc. White Paper
 
Iscon Imaging Personal Security Screening White Paper
Iscon Imaging Personal Security Screening White PaperIscon Imaging Personal Security Screening White Paper
Iscon Imaging Personal Security Screening White Paper
 

More from John Intindolo

Power_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloPower_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloJohn Intindolo
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloJohn Intindolo
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloJohn Intindolo
 
Research_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloResearch_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloJohn Intindolo
 
ISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloJohn Intindolo
 
Research_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloResearch_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloJohn Intindolo
 
Attack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloAttack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloJohn Intindolo
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloJohn Intindolo
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloJohn Intindolo
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloJohn Intindolo
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloJohn Intindolo
 
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloWk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloJohn Intindolo
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloJohn Intindolo
 
ISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloJohn Intindolo
 
Project_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_IntindoloProject_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_IntindoloJohn Intindolo
 

More from John Intindolo (16)

Power_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloPower_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_Intindolo
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_Intindolo
 
Research_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloResearch_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_Intindolo
 
ISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_Intindolo
 
Research_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloResearch_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_Intindolo
 
Attack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloAttack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_Intindolo
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_Intindolo
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_Intindolo
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_Intindolo
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
 
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloWk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
ISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloISSC490_Project_John_Intindolo
ISSC490_Project_John_Intindolo
 
Project_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_IntindoloProject_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_Intindolo
 

ISSC368_Final_Project Proposal_Wk8_Intindolo

  • 1. Running head: FINAL PROJECT PROPOSAL 1 Project Proposal- Week 8 Final Project Proposal John Intindolo ISSC368: IT Security- Physical and Peripheral Defense August 30th, 2015 Professor Carlo Tannoury American Military University
  • 2. FINAL PROJECT PROPOSAL 2 Project Proposal- Week 8 Final Project Proposal Over the last eight weeks, as the new protection officer I have gone over the different measures that are necessary in order for ESL Inc. to become a more secure environment. In this final proposal I will summarize and go over then entire proposal. The first areas that I will discuss will relate to increase communications and creating a more adequate security staff and shifts. From there I will discuss the plan for physical security and access control policies, and then lastly how to handle workplace crime and violence mitigation. Communication is vital to the success of any plan. No matter what security measures are put into place, without proper communication they will fail. Increased communication will begin immediately through email updates to all employees regarding company policies and procedures as well as any changes being made. Furthermore, a weekly meeting with all security personnel will occur to address any comments or concerns on how to improve security. Additionally, there will be monthly security awareness meetings for security personnel to keep up with the latest threats and suspicious behavior to keep an eye out for. Security personnel will be beefed up as well. During normal business hours of 8 AM to 6 PM, three security guards will work, where one will be posted at each guard shack. An intercom system will be used at the front and rear gates during off peak hours that allows the front desk security guard to buzz a person in. Three more security guards will be working the second shift from 4 PM to 12 AM, followed by a third shift crew of three guards that work from 12 AM to 8 AM. During the overlap 4 PM to 6 PM, the second shift guards will walk the hallways. During second and third shift there will be a guard at the front desk, and the other two guards will walk the hallways.
  • 3. FINAL PROJECT PROPOSAL 3 Physical security measures that will take place starts with securing the entire premises. Gates will be installed at the front and rear of the building and fences will be surrounding the entire building. A guard shack will be posted at the front and rear of the building where gates are installed. Next will be a security plan that will identify the company’s assets. These assets can range anywhere from buildings or vehicles to off equipment or cash. At this point is where all threats to company assets are determined. This could be in the form of natural disaster, a person from inside the company, or someone from outside of the organization. A risk assessment will determine which countermeasures to use, by deciding what assets are at the biggest risk of an attack. Each asset will be given a likelihood assessment (not likely, likely, highly likely, or certain) and a value number of importance (1 is low, 2 is medium, 3 is high, 4 most important) to the company. Once the risk assessment is complete then countermeasures can be put into place. A layered security approach is the best method to use, because if one line of defense fails then another will keep an asset from being damaged or attacked. Gates and fences surrounding the entire building will be the first line of defense. The second line of defense which is the exterior of the building will have security cameras and intrusion detection devices placed around the building on all doors, skylights, and windows. The third line of defense are interior controls. The controls should include the following: Intrusion detection devices at all exit doors as well as important rooms such as the data center and document storage room. Some access controls that should be used for these rooms is a biometric keypad that requires not only an authorized card to be swiped, but also the employees fingerprint in order for the door to unlock. This way only authorized personnel will have access to confidential data. Furthermore, all pertinent documents should be locked in storage cabinets that are located in a fire protected room. Extremely
  • 4. FINAL PROJECT PROPOSAL 4 confidential documents will be located in a safe within a vault, and there will be a motion detection system in that room as well. This room will also require the use of biometrics. A card access system along with a retina scanner will be used for this door in order to better secure the confidential company data. Workplace violence can be a minor issue, but can also start at a low level and escalate to something much more serious. Some lower level damage as a result of workplace violence is an employee refusing to listen with their supervisor or arguing with coworkers. This could escalate to something more serious such as verbal threats to coworkers or management, and could worsen to the point of physical attacks and assaults (IFPO, 2010, pp. 287-288). In order to mitigate this type of activity there will be a zero tolerance policy on this type of behavior that is explained and signed off on by each employee. This will perhaps deter some from acting on their aggression for fear of losing their job or worse. Having a prevention plan in place will also be a must and will include the following: monthly meetings on workplace violence prevention, an open communication policy to anonymously report any incidents or concerns, and explaining company policies, procedures, and plan in monthly meetings or as needed. Workplace crime is a common occurrence that unfortunately occurs due to dishonest employees. The thing to keep in mind with this issue and the best way to look at it from a security aspect is that the less opportunity that is given to employees to steal, the less it will occur. So how can this type of dishonest behavior be prevented? One such way is deterrence. The punishment for an employee getting caught stealing should be severe so that they themselves learn their lesson, and also to keep someone else who had thoughts of stealing from acting on their feelings (IFPO, 2010, p. 256). Another way to prevent items from being stolen is through the use of access control methods that were explained in the last proposal. Knowing that there
  • 5. FINAL PROJECT PROPOSAL 5 are security cameras, motion and intrusion detection devices in place will keep people from acting on wanting to steal something for fear of being caught. By following the steps outlined throughout this proposal ESL Inc. will have no fear of losing the lucrative federal contract they were awarded, and they can rest assured that the company’s assets are secure and well protected.
  • 6. FINAL PROJECT PROPOSAL 6 References IFPO (2010). The Professional Protection Officer: Practical Security Strategies and Emerging Trends. Retrieved from http://www.eblib.com