SlideShare a Scribd company logo
1 of 21
BCJ 4385, Workplace Security 1
Course Learning Outcomes for Unit VI
Upon completion of this unit, students should be able to:
1. Evaluate security problems within private and public
institutions and cultivate applicable
security measures.
2. Analyze contemporary security investigation tactics.
3. Examine intellectual property and security measures taken to
protect business intelligence and
proprietary information.
Reading Assignment
Chapter 9:
Investigations, Intelligence Operations, and Reporting
Chapter 10:
Institutional Security, Disaster Recovery, and Executive
Protection
Unit Lesson
General Overview
When people hear the term investigation the first thing that
comes to mind is what they saw on a dramatized
crime show or TV program. In actuality there are several types
of investigations. There are human resource
investigations that investigate issues related to employee
backgrounds, workplace violence, employment
discrimination, worker compensation, sexual harassment, sexual
abuse, substance abuse, and wrongful
termination. There are also personal injury and property damage
investigations, and criminal investigations
which include undercover investigations. Another aspect of
criminal investigations is business crime
investigations which involves investigations concerning crimes
committed against businesses by employees
(e.g., fraud and embezzlement), crimes committed against
businesses by outsiders (e.g., arson and robbery),
and crimes committed by individuals on behalf of businesses
(e.g., tax evasion and commercial bribery).
Information collected in investigations is derived from various
sources which “include physical evidence,
specialized databases, victims, witnesses, suspects, records,
informants, and the Internet” (Ortmeier, 2013, p.
212). Once information is gathered it is then analyzed. The
analysis of physical evidence is associated with
forensic science and criminalistics. Such analyses are
traditionally conducted in the laboratory. DNA testing is
one of several analysis techniques used by forensic scientists.
Other techniques include psychological
profiling, anthropological strategies, forensic accounting,
biology, chemistry, ballistics testing, and many more.
Every investigation is governed by a code of conduct. Both
private and public law enforcement and security
agencies are governed by investigative statutes which govern
overt and covert investigative techniques (e.g.,
the Omnibus Crime Control and Safe Streets Act of 1968 and
the Employee Polygraph Protection Act of
1988). While the fourth amendment to the Constitution only
restricts government conduct, private and
nongovernment employees may also have an expectation of
privacy if their employers knowingly or knowingly
create an expectation of privacy among their employees.
Intelligence operations are not limited to criminal
investigations. They also include business intelligence
operations, which is also known as competitive intelligence.
This form of intelligence is designed to assist
businesses in controlling losses that result from competition.
Business intelligence is a legitimate and ethical
activity. Both internal and external sources can be accessed to
obtain information about competing
organizations strategies such as sales promotions, employee
recruitment, pricing, distribution center
strategies, and advertising.
UNIT VI STUDY GUIDE
Security Investigations, Institutional Security,
Disaster Recovery, and Executive Protection
BCJ 4385, Workplace Security 2
UNIT x STUDY GUIDE
Title
Criminal intelligence is used to protect against actual criminal
activity and possible threats of criminal activity,
such as industrial espionage. An extension of criminal
intelligence is national intelligence which focuses on
collecting information about foreign entities viewed as potential
threats to the nation. Counterespionage
strategies prevent espionage using covert and overt strategies
which “involves application of appropriate
physical, personnel, and information security measures as well
as a thorough investigation of all actual intent
to security breaches” (Ortmeier, 2013, pp.220-221).
Documentation of incidents, interviews, accidents,
investigations or criminal activity is instrumental in
assisting security personnel in addressing security issues. Such
documentation is useful in the development
of reports (contact, incident, narrative, and organization –
specific) which are one of the most important
outcomes associated with investigations. To maximize the
usefulness of reports, reports must be well
organized, grammatically sound, clear and concise, free of
unnecessary jargon, and include crucial
information (e.g., how the report writer was involved in the
incident, details about what happened, information
about all the parties involved, statements from the involved
parties, descriptions of the scene where the
incident occurred, descriptions of evidence, damage or theft,
and any actions conducted by personnel on
the scene).
There are some distinctions and exceptions to general security
management principles, and loss prevention
philosophies and practices. For example, banking and financial
institutions are susceptible to threats and loss
of assets in physical and digital environments. Funds can now
be transferred electronically without any paper
trails. In addition, the types of financial institutions are as
diverse as the way funds move across these
entities. In 1968 the Bank Protection Act was passed by the
U.S. Congress to assist in reducing the
vulnerability of financial institutions. However, the act only
established minimal guidelines and is not effective
in controlling technological threats to financial assets.
High profile cases involving the murder of court personnel
walking to work and even the murder of court
personnel and law enforcement in the perceived security of their
homes by defendants in the cases they were
associated with exemplifies the need for courthouse and
courtroom security. To respond to these increase
threats many courthouses and courtrooms have increased
security measures such as metal detectors, state-
of-the-art surveillance systems, security glass, secured and
covered entrances and parking decks for court
personnel, and the use of sheriff deputies as courthouse and
courtroom security.
Educational institutions also require unique security
preparations. It was once believed that schools were safe
havens into which the threats from the outside world could not
penetrate. However, recent events in which
children at schools have become the victims of murder at the
hands of lone gunman and/or have died as a
result of natural disasters that have impacted schools critically
exemplify the need for special security
measures at educational institutions.
Violent crime, sexual assaults, homicides, thefts, gang and drug
activity, and many other threats to
institutional security exist across all levels of education.
However, the age of the students, structure of the
facilities, the number and characteristics of staff, and the access
of members of the community very across all
levels of education. Thus, different criteria must be considered
for elementary and secondary schools and
colleges and universities. Many states have created safe-school
zones. The federal government has created
informational material such as a guide entitled Threats
Assessments in Schools published by the U.S. Secret
Service. Agencies have also developed informational pages on
their websites concerning school safety.
Legislation like the Crime Awareness And Campus Security Act
of 1990, also known as the Clery Act, have
been established and require post-secondary institutions to
gather and post the current crime statistics so that
students, parents, faculty and staff all were on the status of
crime on their campuses. College and university
informational guides also include sections about safety security
measures available at their featured colleges
and universities.
Healthcare facilities also have unique security concerns.
Security must be maintained in order for healthcare
facilities to function. There are numerous international, federal,
state, and local requirements that mandate the
provision of a secure healthcare environment. Healthcare
security covers many facets such as facilities,
personnel, equipment and supplies, service provision, records,
and mobile healthcare units.
Hospitality security, entertainment security, disaster recovery,
and executive protection are other areas which
require specific security considerations. For example, the
hospitality industry has invested significant amounts
of money into making its establishments attractive to its guests.
However, in so doing many internal controls
were not established. We can all think of people we know who
have come home from a hotel with linen,
BCJ 4385, Workplace Security 3
UNIT x STUDY GUIDE
Title
dishes, and other items that were not intended for guests take
home in their suitcases. In addition to loss of
assets, the hospitality industry is also susceptible to accidents,
fires, and natural disasters. To respond to
these unique threats to security key control, alarm systems,
security cameras, and the employment of security
personnel are usually implemented.
The entertainment industry (sporting events, recreation areas
and their components, racetracks, movies and
music, ships and boats, casinos) also has its set of unique
threats to security that are associated with the size
of the venue, the openness of the venue facilities, and the
number of people that attend the events.
Disaster recovery is a specialty area in the field of security
management that focuses on managing
organization-related disasters (damages that result from natural
and environmental disasters) to ensure that
services are restored quickly and customers are not loss due to
dissatisfaction with the services provided
during disaster recovery efforts.
Lastly, protection of executives, citizens, and political leaders
is a continual challenge. Incidences of executive
kidnapping continue to increase abroad. Acts of terrorism
against citizens is on the rise in the United States,
and political leaders are more at risk of being injured or killed
by gunfire during public appearances and at
their private residences. Therefore, it is important that effective
executive protection programs include 1) risk
assessments that accurately identify threats, the likelihood of
the threat being realized, and assessment of the
damage that would result if the threat was realized; 2) advanced
procedures that implement security
arrangements before, during, and after the executive travels;
and 3) protective operations which involve the
accompanying of the executive by executive detection personnel
who are equipped and ready to use counter
surveillance and defensive tactics to protect the executive.
Reference
Ortmeier, P.J. (2013). Introduction to security: Operations and
management (4th ed.). Upper Saddle River,
NJ: Pearson.
Questions to Consider
1. What are the different types of investigation?
2. What are the different sources of information collected in
investigations?
3. What is the role of forensic science in the analysis of
evidence collected in investigations?
4. What statutes govern investigative conduct?
5. How does business intelligence different from criminal
intelligence?
6. How is business intelligence different from industrial
espionage?
7. What are the different types of reports that can be utilized in
a security investigation?
8. What are the key elements of report writing and why is report
writing important?
9. What unique threats to security do banks and financial
institutions face?
10. What unique security issues must be considered when
developing security measures for
educational institutions?
11. What statutes govern the maintenance of security in
healthcare environments?
12. What types of issues threaten safety and security in the
hospitality industry?
13. What factors complicate the maintenance of security in the
entertainment industry?
14. What is the role of disaster recovery and reducing the loss
of assets associated with organizations
that have been impacted by a disaster?
15. What are the key components of an effective executive
protection program?
Learning Activities (Non-Graded)
Non-graded Learning Activities are provided to aid students in
their course of study. You do not have to
submit them. If you have questions, contact your instructor for
further guidance and information.
1. Watch the local news at the same time every day for a week.
Make note of the various types of
investigations that are mentioned. Keep track of how many
investigations fall into each category, who
conducted the investigations, what information was gathered in
the investigations, and the outcome of
BCJ 4385, Workplace Security 4
UNIT x STUDY GUIDE
Title
the investigations. Review your findings to access the most
frequent types of security-related
investigations that are conducted in your community.
2. Search the Internet for any current events that talk about
industrial espionage. Review the events to
identify what business intelligence and/or counter espionage
strategies were utilized. Prepare a mock
report of your findings and include suggestions for preventing
future espionage attacks on the
organization.
3. Use the search engine of a national or local newspaper source
to chronologize the threats to security
that have occurred in banking and financial institutions,
courthouses and courtrooms, and educational
institutions. Assess the key components of maintaining security
that were compromised and/or
absent. Outline strategies that you think would reduce and/or
eliminate such threats in the future.
4. Conduct a historical analysis of homicides that have occurred
in courtrooms and courthouses or
educational institutions in the United States. Make note of any
trends that become evident as you
conducted your analysis. Explore whether identify threats
appear to be diminishing, staying the same
or increasing. Outline the existing strategies being used and
make note of any strategies that in your
opinion should be implemented.
5. The next time you attend and entertainment activity take note
of the various security measures that
are utilized. Assess whether the measures discussed in the text
were utilized and, in your opinion,
whether there were measures that were or were not utilized that
seemed more appropriate for the
venue than what was discussed in the text.
6. Imagine that you were the chief executive protection agent
for one of the U.S. Supreme Court justices
and that you have recently been informed that the justice will be
attending an international court
convention in London, UK and then will be going on vacation in
South Africa. You have been given a
72-hour notice of these plans and have been ordered to provide
a briefing of the executive protection
program that you will implement to the Attorney General of the
United States no later than 12 hours
prior to your departure. Clearly outline the executive protection
program that you implement.
Name
XXXXXXXXX
XXXXXXXXXXX
Home Phone: XXXXXXX
Email Address
SUMMARY OF QUALIFICATIONS:
Skilled at building partnerships with government, private
officials and employees at all levels of leadership to support
organizational goals. Knowledge of federal and private
personnel security procedures. Oversaw administrative
functions to include reviews of police blotters, reports and other
correspondence involving security; ability to type 55 WPM.
Possesses active Department of Defense Secret and public Trust
Clearance; MD State Hand Gun Permit; and MD State Security
Guard Clearance Card.
Experience
December, 2015 Defense Contract Management Agency
Location
To Present Management Assistant
· Compiles and maintains records and workflow charts of
Functional Group Leader planning activities and maintains cross
reference documents of unique task i.e., Mission Review Team
(MRT) Findings
· Prepares and submits timely Request for Personnel Actions
(RPAs) for Awards and other actions, and routes for approval in
the DCPDS system as requested by the Director and Deputy
Director.
· Assists with tracking Performance Indicators and updating the
IBM, Cognos, and Metrics Studio comments.
· Assists with management, use and maintaining the electronic
data integrity systems (MOCAS, IWMS, and E-Tools)
· Verifies employee’s DAI timecards are submitted on time and
conducts audits randomly to insure accuracy.
April, 2012 Department of the Navy
Location
To December 2015 Security Assistant
· Provides direct support to senior management on access
control policies, administrative issues and assignments.
· Acts as a Single Source Coordinator for the RAPIDGate
Credential Issuance Program through Navy Commercial Access
Control System (NCACS).
· Completed and appointed as a Trainer/Certifier for National
Crime Index Center (NCIC) system through the Department of
Justice (DOJ) to support physical security and investigative
functions of Navy District Washington (NDW).
· Completed and appointed as a Trainer/Certifier for
Washington Area Law Enforcement System (WALES) through
DC Metro Police Department to support physical security and
investigative functions of Navy District Washington.
· Updates various databases, compiles information and
completes appropriate reports referencing files and applicable
instruction.
· Serves as the principal program support assistant; performing
various administrative and clerical duties in support of the Joint
Base Anacostia Bolling (JBAB) security mission.
· Creates and edits incoming/outgoing correspondence to
include letters, reports, spreadsheets or presentations.
· Reviews and analyzes incoming correspondence to determine
proper action, assignment, and significance of correspondence,
and special distribution.
· Generates criminal history summary reports on behave or the
Security Director for final adjudication.
· Performs tasks to include preparing, issuing, tracking and the
destruction of security/restricted access badges for the
installation.
· Verified eligibility screened and issued over 100K base passes
to visitors and government contractors.
· Updated file management system, moving paper entry
authority request to a more efficient digital system.
· Revamped and maintained Visitor Control Center Signature
and Credential Program managing over 400 base personnel files.
· Processed over 2,988 vehicle registrations and assisted in the
facilitation of over 21k special events and distinguished visitors
· Processed criminal background checks through Washington
Area Law Enforcement System (WALES II) and NCIC before
granting access to foreign nationals, contractors and vendors.
· Processed forms for background investigation requirements
via Security Forces Information Management Information
System (SFMIS) and Navy Consolidated Law enforcement
Operations Center (CLEOC).
· Maintains, controlled forms, logs and Personally Identifiable
Information (PII).
· Tracks and inputs over 400k of the organizations workload
data into the Navy’s Command Naval Installation Command
(CNIC) regional database.
· Responds to customer inquiries regarding installation access
and security policy/regulations.
· Performs protocol assistance duties as required and shared by
JBAB Security Office.
· Coordinates and responds to requests for advice/assistance in
all matters/activities related to protocol procedures.
· Plans or coordinates various ceremonies, receptions, visits,
tours, and other events to be attended by ranking civilian and
military officials, with all appropriate support services
organizations.
· Monitors clerical support duties to ensure efficient office
operations in support of the Commanders/Executive office
· Maintains files as appropriate including all correspondence
and telephone log of significant calls. Coordinates office staff
activities to ensure maximum efficiency; ability to type 55
WPM.
· Hand-selected as the Naval Operation Center Command Post
Support Staff during Baltimore’s largest tourism event;
streamlined communications between Homeland Security,
Secret Service, Baltimore City Police, Naval Criminal
Investigative Service, and the National Park Service—
safeguarded over 1.5 million visitors
August, 2014 MVM (Social Security Headquarters)
Location
To Present Security Control Center Operator
· Acts as primary dispatcher for all medical, law enforcement,
and security incidents occurring on Social Security
Administration (SSA) Head Quarters property and outlined
buildings.
· Completed Social Security Administration Physical Security
Information System Management (PSIM) training. Monitored
and managed over 2300 alarm points through the Lenel (alarm
monitoring) System dispatched units and generated incident
reports in accordance with established procedures.
· Successfully managed priorities of emergency situations
within the dispatched units in accordance with established
procedures.
· Provides direct physical security support through the use of
over 300 digital and analog closed circuit television (CCTV)
devices.
· Coordinates inter agency response to incidents and emergency
situations in accordance with established procedures.
March, 2011 Paragon Systems (Social Security
Headquarters) Location
To August 2014 Security Control Center Operator
· Acted as primary dispatcher for all medical, law enforcement,
and security incidents occurring on SSA Head Quarter property
and outlined building.
· Successfully managed priorities of emergency situations
within the dispatched units in accordance with established
procedures.
· Monitored and managed over 2300 alarm points on the Lenel
(alarm monitoring) System dispatched units and generated
incident reports in accordance with established procedures.
· Established a comprehensive alarm checklist detailing
procedures for daily operation of the Lenel Alarm Monitoring
System.
March, 2009 United States Air Force
Location
to May, 2009 Operations Support Staff/Administrative
Manager
· Prepared and reviewed police blotters, reports, regulations,
standard operating procedures, and other correspondence,
advising senior management on security activities and
overseeing administrative functions to enhance operations and
ensure compliance with established regulations and procedures.
· Compiled, stored, and retrieved management data, using a
variety of computer programs such as Microsoft, Power Point,
Access, SFIMS, and NCIC.
· Acted as primary dispatch agent for all base security incidents.
Assist Flight Sergeant with command and control of
security/law enforcement patrols to a Full Spectrum Threat
Response (FSTR), protection level resources, alarm activations,
burglaries and anti-hijackings.
· Expertly managed $2.5M Advantor Alarm System for Shaw
AFB; monitored over 900 alarm points at 80 facilities
· Successfully managed and created database reports of police
performance and training data.
· Compiled, stored, and retrieved management data, using a
variety of computer programs such as Microsoft 2007, Power
Point, NCIC, and Access.
February, 2006 United States Air Force
Location
to March, 2009 Shift Supervisor/Control Center
Operator
· Directed oversight aided accurate completion of over 100
Random Anti Terrorism Measures, 300 selective traffic
enforcements, and 95 high value facility checks to ensure safety
of personnel and resources.
· Supervised and managed 44 employees, scheduled work hours,
resolved conflicts, and wrote annual performance reports.
· Successfully managed priorities of emergency situations
within the dispatched units in accordance with established
procedures.
· Completed Antiterrorism Force Protection Level II Course
curriculum provides completion certification in accordance with
baseline standards outlined in DOD 2000.16 Antiterrorism
Standards.
· Established qualification and performed duties as an
antiterrorism officer, advise leadership on the management of
AT/FP programs/maters, and administer, track and reported
Level I and pre-deployment AT/FP training.
· Received liaison training with both internal agencies and
tenants, and local civilian and host nation authorities to ensure
full integration and comprehensive AT/FP planning and
training.
· Supervised the completion of Restricted Area/high risk
Faculty checks.
· Conducted surveys of restricted areas and generated reports of
undocumented vulnerabilities.
· Prepared and reviewed police blotters, reports, regulations,
standard operating procedures, and other correspondence,
advised senior management on security activities while
overseeing administrative functions to enhance operations and
ensure compliance with established regulations and procedures.
· Knowledge of basic DoD and Air Force personnel security and
SCI program, JPAS, principles, policies and procedures and its
applicability to personnel security standards.
· Completed Advantor Suite Operator/Administrators Alarm
Management 4.1 course.
· Completed South Carolina Law Enforcement Division (SLED)
DUI/DWI training course utilizing the BAC/DMT DataMaster.
· Conducted convoy security operations for high value
personnel and critical supplies along main and alternate supply
routes in Iraq.
· Led an 8 member heavy weapons deployment team to Camp
Bucca, Iraq; largest internment facility, in support of Operation
IRAQI FREEDOM.
· Selected as team leader for the 13 member deployment group
during Headquarters Air Combat Command Operations
Readiness Inspection; performance led to overall "Excellent"
rating
September, 2004 United States Air Force
Location
to January, 2006 Shift Supervisor/Control Center Operator
· Directly responsible for command and control of all security
and law enforcement shift activities. Implemented security
plans policies and procedures which insured the protection of
2,800 annual transit aircraft and 3,200 assigned personnel.
· Managed and lead U.S Air Force Security Forces and 15
Portuguese civilian employees. Acted as on scene liaison
between United States and Host Nation Police during all
incidents.
· Held full accountability and exercised command and control
over emergency situations.
· Primary dispatch agency for all base security and Law
Enforcement incidents. Assisted the Installation Commander
with command and control of security and law enforcement
patrols to a Full Spectrum Threat Response (FSTR), protection
level resources, alarm activations burglaries and anit-
hijackings.
· Relayed information and messages to and from emergency
sites, to law enforcement agencies, and to other individuals
requiring notification.
· Monitors incident site actions and makes notifications to
commanders/first sergeants and all other key wing personnel.
Prepares all Security Forces reports, blotters and other required
correspondence
August, 2002 United States Air Force
Location
to July, 2004 Lead Patrolmen
· Detects and reports the presence of unauthorized personnel
and activities and implements security reporting and alerting
system.
· Enforced standards of conduct, discipline, and adherence to
laws and directives.
· Operates speed measuring, drug alcohol, and breathe test
devices; apprehends and detains suspects.
· Secured crime and accidents scenes; collects, seizes, and
preserves evidence.
· Conducts interviews of witnesses and suspects; obtains
statements and testifies in official judicial proceedings.
February, 2001 United States Air Force
Location
to July, 2001 Law Enforcement Patrolmen
· Structured public safety at all times by maintaining order,
responding to emergencies, protecting people and property,
enforcing motor vehicle and criminal laws, and promoting good
community relations.
· Evaluated complaint and emergency-request information to
determine response requirements.
· Issued citations and warnings to violators of motor vehicles.
Professional Development
· Security Forces/Police Technical School Training Lackland
AFB TX
· Microsoft Office Suite Training ability to type 55 Words Per
Minute
· Tactical Automated Security System Operator/Administrators
course 1999/2006
· US Customs Certification Training
· DUI training, CMI/INTOXILYZER 5000EN Breathalyzer
Instrument Operators course
· Supervisor Safety Training, certified through the Air Force
· Department Of Defense Firefighters Certification Hazardous
Materials Awareness course
· Texas A&M University System Terrorism Awareness
(recognized by the Department of Justice)
· Emergency Response to Terrorism Self-Study course
(presented by the National Fire Academy)
· Law Enforcement and Human Resource/Management training,
(Army Institute for Professional Development)
· Completed Advantor Operators course 4.0/2004 and 2006
Administrators course 4.1/2006
· Department of Defense Anti Terrorism Level II course
(certified Instructor)
· Decision Making and Problem Solving (FEMA Emergency
Management Institute) 2011
· Leadership and Influence (FEMA Emergency Management
Institute) 2011
· Emergency Planning (FEMA Emergency Management
Institute) 2011
· Effective Communication (FEMA Emergency Management
Institute) 2011
· Introduction to DoD Personnel Security Adjudications (Center
for Development of Security Excellence) 2013
· Introduction to DoD Personnel Security(Center for
Development of Security Excellence) 2013
Education
· Grantham University Associates Degree (Business
Management)
· Grantham University (BS Candidate Multi-Disciplinary
Studies)
· University of Maryland (BA Candidate Criminal Justice)
· Potomac Senior High School, Woodbridge, VA (June 98)

More Related Content

Similar to BCJ 4385, Workplace Security 1 Course Learning Outcom.docx

BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docxBCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docxJASS44
 
CIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions BrochureCIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions BrochureJeff Ezell
 
BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx
BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docxBCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx
BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docxJASS44
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptFranciscoJoaoVitug
 
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEMINSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEMijsc
 
Insider Threat Prevention in the US Banking System
Insider Threat Prevention in the US Banking SystemInsider Threat Prevention in the US Banking System
Insider Threat Prevention in the US Banking Systemijsc
 
Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Ann Johnson
 
Achivers_Article title.pptx
Achivers_Article title.pptxAchivers_Article title.pptx
Achivers_Article title.pptxMahtabHashmi2
 
News letter June 11
News letter June 11News letter June 11
News letter June 11captsbtyagi
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...Igor Britchenko
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
Excellent career opportunities exist in security services. Opportu.docx
Excellent career opportunities exist in security services. Opportu.docxExcellent career opportunities exist in security services. Opportu.docx
Excellent career opportunities exist in security services. Opportu.docxcravennichole326
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxfestockton
 
Public Surveillance In The USA Essay
Public Surveillance In The USA EssayPublic Surveillance In The USA Essay
Public Surveillance In The USA EssayWinstina Kennedy
 
Identity Theft Essay. Chattahoochee Technical College
Identity Theft Essay. Chattahoochee Technical CollegeIdentity Theft Essay. Chattahoochee Technical College
Identity Theft Essay. Chattahoochee Technical CollegeBlanca Richardson
 

Similar to BCJ 4385, Workplace Security 1 Course Learning Outcom.docx (20)

Lecture 1 9 sam 100-
Lecture 1   9 sam 100-Lecture 1   9 sam 100-
Lecture 1 9 sam 100-
 
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docxBCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
 
CIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions BrochureCIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions Brochure
 
BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx
BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docxBCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx
BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
 
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEMINSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
 
Insider Threat Prevention in the US Banking System
Insider Threat Prevention in the US Banking SystemInsider Threat Prevention in the US Banking System
Insider Threat Prevention in the US Banking System
 
Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...
 
Achivers_Article title.pptx
Achivers_Article title.pptxAchivers_Article title.pptx
Achivers_Article title.pptx
 
Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Excellent career opportunities exist in security services. Opportu.docx
Excellent career opportunities exist in security services. Opportu.docxExcellent career opportunities exist in security services. Opportu.docx
Excellent career opportunities exist in security services. Opportu.docx
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
 
Public Surveillance In The USA Essay
Public Surveillance In The USA EssayPublic Surveillance In The USA Essay
Public Surveillance In The USA Essay
 
Data Breach Response Checklist
Data Breach Response ChecklistData Breach Response Checklist
Data Breach Response Checklist
 
Data Breach Response Checklist
Data Breach Response ChecklistData Breach Response Checklist
Data Breach Response Checklist
 
Identity Theft Essay. Chattahoochee Technical College
Identity Theft Essay. Chattahoochee Technical CollegeIdentity Theft Essay. Chattahoochee Technical College
Identity Theft Essay. Chattahoochee Technical College
 

More from aryan532920

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxaryan532920
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxaryan532920
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxaryan532920
 
According to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxAccording to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxaryan532920
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxaryan532920
 
According to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxAccording to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxaryan532920
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxaryan532920
 
According to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxAccording to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxaryan532920
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxaryan532920
 
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxAccording to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxaryan532920
 
According to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxAccording to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxaryan532920
 
According to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxAccording to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxaryan532920
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxaryan532920
 
According to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxAccording to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxaryan532920
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxaryan532920
 
According to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxAccording to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxaryan532920
 
According to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxAccording to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxaryan532920
 
According to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxAccording to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxaryan532920
 
According to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxAccording to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxaryan532920
 
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxAccording to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxaryan532920
 

More from aryan532920 (20)

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docx
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docx
 
According to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxAccording to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docx
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
 
According to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxAccording to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docx
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
 
According to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxAccording to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docx
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docx
 
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxAccording to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
 
According to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxAccording to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docx
 
According to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxAccording to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docx
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
 
According to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxAccording to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docx
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
 
According to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxAccording to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docx
 
According to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxAccording to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docx
 
According to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxAccording to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docx
 
According to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxAccording to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docx
 
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxAccording to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

BCJ 4385, Workplace Security 1 Course Learning Outcom.docx

  • 1. BCJ 4385, Workplace Security 1 Course Learning Outcomes for Unit VI Upon completion of this unit, students should be able to: 1. Evaluate security problems within private and public institutions and cultivate applicable security measures. 2. Analyze contemporary security investigation tactics. 3. Examine intellectual property and security measures taken to protect business intelligence and proprietary information. Reading Assignment Chapter 9: Investigations, Intelligence Operations, and Reporting Chapter 10: Institutional Security, Disaster Recovery, and Executive Protection
  • 2. Unit Lesson General Overview When people hear the term investigation the first thing that comes to mind is what they saw on a dramatized crime show or TV program. In actuality there are several types of investigations. There are human resource investigations that investigate issues related to employee backgrounds, workplace violence, employment discrimination, worker compensation, sexual harassment, sexual abuse, substance abuse, and wrongful termination. There are also personal injury and property damage investigations, and criminal investigations which include undercover investigations. Another aspect of criminal investigations is business crime investigations which involves investigations concerning crimes committed against businesses by employees (e.g., fraud and embezzlement), crimes committed against businesses by outsiders (e.g., arson and robbery), and crimes committed by individuals on behalf of businesses (e.g., tax evasion and commercial bribery). Information collected in investigations is derived from various sources which “include physical evidence, specialized databases, victims, witnesses, suspects, records, informants, and the Internet” (Ortmeier, 2013, p. 212). Once information is gathered it is then analyzed. The analysis of physical evidence is associated with forensic science and criminalistics. Such analyses are traditionally conducted in the laboratory. DNA testing is one of several analysis techniques used by forensic scientists. Other techniques include psychological profiling, anthropological strategies, forensic accounting, biology, chemistry, ballistics testing, and many more. Every investigation is governed by a code of conduct. Both
  • 3. private and public law enforcement and security agencies are governed by investigative statutes which govern overt and covert investigative techniques (e.g., the Omnibus Crime Control and Safe Streets Act of 1968 and the Employee Polygraph Protection Act of 1988). While the fourth amendment to the Constitution only restricts government conduct, private and nongovernment employees may also have an expectation of privacy if their employers knowingly or knowingly create an expectation of privacy among their employees. Intelligence operations are not limited to criminal investigations. They also include business intelligence operations, which is also known as competitive intelligence. This form of intelligence is designed to assist businesses in controlling losses that result from competition. Business intelligence is a legitimate and ethical activity. Both internal and external sources can be accessed to obtain information about competing organizations strategies such as sales promotions, employee recruitment, pricing, distribution center strategies, and advertising. UNIT VI STUDY GUIDE Security Investigations, Institutional Security, Disaster Recovery, and Executive Protection BCJ 4385, Workplace Security 2 UNIT x STUDY GUIDE
  • 4. Title Criminal intelligence is used to protect against actual criminal activity and possible threats of criminal activity, such as industrial espionage. An extension of criminal intelligence is national intelligence which focuses on collecting information about foreign entities viewed as potential threats to the nation. Counterespionage strategies prevent espionage using covert and overt strategies which “involves application of appropriate physical, personnel, and information security measures as well as a thorough investigation of all actual intent to security breaches” (Ortmeier, 2013, pp.220-221). Documentation of incidents, interviews, accidents, investigations or criminal activity is instrumental in assisting security personnel in addressing security issues. Such documentation is useful in the development of reports (contact, incident, narrative, and organization – specific) which are one of the most important outcomes associated with investigations. To maximize the usefulness of reports, reports must be well organized, grammatically sound, clear and concise, free of unnecessary jargon, and include crucial information (e.g., how the report writer was involved in the incident, details about what happened, information about all the parties involved, statements from the involved parties, descriptions of the scene where the incident occurred, descriptions of evidence, damage or theft, and any actions conducted by personnel on the scene). There are some distinctions and exceptions to general security management principles, and loss prevention
  • 5. philosophies and practices. For example, banking and financial institutions are susceptible to threats and loss of assets in physical and digital environments. Funds can now be transferred electronically without any paper trails. In addition, the types of financial institutions are as diverse as the way funds move across these entities. In 1968 the Bank Protection Act was passed by the U.S. Congress to assist in reducing the vulnerability of financial institutions. However, the act only established minimal guidelines and is not effective in controlling technological threats to financial assets. High profile cases involving the murder of court personnel walking to work and even the murder of court personnel and law enforcement in the perceived security of their homes by defendants in the cases they were associated with exemplifies the need for courthouse and courtroom security. To respond to these increase threats many courthouses and courtrooms have increased security measures such as metal detectors, state- of-the-art surveillance systems, security glass, secured and covered entrances and parking decks for court personnel, and the use of sheriff deputies as courthouse and courtroom security. Educational institutions also require unique security preparations. It was once believed that schools were safe havens into which the threats from the outside world could not penetrate. However, recent events in which children at schools have become the victims of murder at the hands of lone gunman and/or have died as a result of natural disasters that have impacted schools critically exemplify the need for special security measures at educational institutions. Violent crime, sexual assaults, homicides, thefts, gang and drug
  • 6. activity, and many other threats to institutional security exist across all levels of education. However, the age of the students, structure of the facilities, the number and characteristics of staff, and the access of members of the community very across all levels of education. Thus, different criteria must be considered for elementary and secondary schools and colleges and universities. Many states have created safe-school zones. The federal government has created informational material such as a guide entitled Threats Assessments in Schools published by the U.S. Secret Service. Agencies have also developed informational pages on their websites concerning school safety. Legislation like the Crime Awareness And Campus Security Act of 1990, also known as the Clery Act, have been established and require post-secondary institutions to gather and post the current crime statistics so that students, parents, faculty and staff all were on the status of crime on their campuses. College and university informational guides also include sections about safety security measures available at their featured colleges and universities. Healthcare facilities also have unique security concerns. Security must be maintained in order for healthcare facilities to function. There are numerous international, federal, state, and local requirements that mandate the provision of a secure healthcare environment. Healthcare security covers many facets such as facilities, personnel, equipment and supplies, service provision, records, and mobile healthcare units. Hospitality security, entertainment security, disaster recovery, and executive protection are other areas which require specific security considerations. For example, the hospitality industry has invested significant amounts
  • 7. of money into making its establishments attractive to its guests. However, in so doing many internal controls were not established. We can all think of people we know who have come home from a hotel with linen, BCJ 4385, Workplace Security 3 UNIT x STUDY GUIDE Title dishes, and other items that were not intended for guests take home in their suitcases. In addition to loss of assets, the hospitality industry is also susceptible to accidents, fires, and natural disasters. To respond to these unique threats to security key control, alarm systems, security cameras, and the employment of security personnel are usually implemented. The entertainment industry (sporting events, recreation areas and their components, racetracks, movies and music, ships and boats, casinos) also has its set of unique threats to security that are associated with the size of the venue, the openness of the venue facilities, and the number of people that attend the events. Disaster recovery is a specialty area in the field of security management that focuses on managing organization-related disasters (damages that result from natural and environmental disasters) to ensure that services are restored quickly and customers are not loss due to
  • 8. dissatisfaction with the services provided during disaster recovery efforts. Lastly, protection of executives, citizens, and political leaders is a continual challenge. Incidences of executive kidnapping continue to increase abroad. Acts of terrorism against citizens is on the rise in the United States, and political leaders are more at risk of being injured or killed by gunfire during public appearances and at their private residences. Therefore, it is important that effective executive protection programs include 1) risk assessments that accurately identify threats, the likelihood of the threat being realized, and assessment of the damage that would result if the threat was realized; 2) advanced procedures that implement security arrangements before, during, and after the executive travels; and 3) protective operations which involve the accompanying of the executive by executive detection personnel who are equipped and ready to use counter surveillance and defensive tactics to protect the executive. Reference Ortmeier, P.J. (2013). Introduction to security: Operations and management (4th ed.). Upper Saddle River, NJ: Pearson. Questions to Consider 1. What are the different types of investigation? 2. What are the different sources of information collected in investigations?
  • 9. 3. What is the role of forensic science in the analysis of evidence collected in investigations? 4. What statutes govern investigative conduct? 5. How does business intelligence different from criminal intelligence? 6. How is business intelligence different from industrial espionage? 7. What are the different types of reports that can be utilized in a security investigation? 8. What are the key elements of report writing and why is report writing important? 9. What unique threats to security do banks and financial institutions face? 10. What unique security issues must be considered when developing security measures for educational institutions? 11. What statutes govern the maintenance of security in healthcare environments? 12. What types of issues threaten safety and security in the hospitality industry? 13. What factors complicate the maintenance of security in the entertainment industry? 14. What is the role of disaster recovery and reducing the loss of assets associated with organizations that have been impacted by a disaster? 15. What are the key components of an effective executive protection program? Learning Activities (Non-Graded) Non-graded Learning Activities are provided to aid students in their course of study. You do not have to
  • 10. submit them. If you have questions, contact your instructor for further guidance and information. 1. Watch the local news at the same time every day for a week. Make note of the various types of investigations that are mentioned. Keep track of how many investigations fall into each category, who conducted the investigations, what information was gathered in the investigations, and the outcome of BCJ 4385, Workplace Security 4 UNIT x STUDY GUIDE Title the investigations. Review your findings to access the most frequent types of security-related investigations that are conducted in your community. 2. Search the Internet for any current events that talk about industrial espionage. Review the events to identify what business intelligence and/or counter espionage strategies were utilized. Prepare a mock report of your findings and include suggestions for preventing future espionage attacks on the organization. 3. Use the search engine of a national or local newspaper source to chronologize the threats to security
  • 11. that have occurred in banking and financial institutions, courthouses and courtrooms, and educational institutions. Assess the key components of maintaining security that were compromised and/or absent. Outline strategies that you think would reduce and/or eliminate such threats in the future. 4. Conduct a historical analysis of homicides that have occurred in courtrooms and courthouses or educational institutions in the United States. Make note of any trends that become evident as you conducted your analysis. Explore whether identify threats appear to be diminishing, staying the same or increasing. Outline the existing strategies being used and make note of any strategies that in your opinion should be implemented. 5. The next time you attend and entertainment activity take note of the various security measures that are utilized. Assess whether the measures discussed in the text were utilized and, in your opinion, whether there were measures that were or were not utilized that seemed more appropriate for the venue than what was discussed in the text. 6. Imagine that you were the chief executive protection agent for one of the U.S. Supreme Court justices and that you have recently been informed that the justice will be attending an international court convention in London, UK and then will be going on vacation in South Africa. You have been given a 72-hour notice of these plans and have been ordered to provide a briefing of the executive protection program that you will implement to the Attorney General of the United States no later than 12 hours prior to your departure. Clearly outline the executive protection
  • 12. program that you implement. Name XXXXXXXXX XXXXXXXXXXX Home Phone: XXXXXXX Email Address SUMMARY OF QUALIFICATIONS: Skilled at building partnerships with government, private officials and employees at all levels of leadership to support organizational goals. Knowledge of federal and private personnel security procedures. Oversaw administrative functions to include reviews of police blotters, reports and other correspondence involving security; ability to type 55 WPM. Possesses active Department of Defense Secret and public Trust Clearance; MD State Hand Gun Permit; and MD State Security Guard Clearance Card. Experience December, 2015 Defense Contract Management Agency Location To Present Management Assistant · Compiles and maintains records and workflow charts of Functional Group Leader planning activities and maintains cross reference documents of unique task i.e., Mission Review Team (MRT) Findings · Prepares and submits timely Request for Personnel Actions (RPAs) for Awards and other actions, and routes for approval in the DCPDS system as requested by the Director and Deputy
  • 13. Director. · Assists with tracking Performance Indicators and updating the IBM, Cognos, and Metrics Studio comments. · Assists with management, use and maintaining the electronic data integrity systems (MOCAS, IWMS, and E-Tools) · Verifies employee’s DAI timecards are submitted on time and conducts audits randomly to insure accuracy. April, 2012 Department of the Navy Location To December 2015 Security Assistant · Provides direct support to senior management on access control policies, administrative issues and assignments. · Acts as a Single Source Coordinator for the RAPIDGate Credential Issuance Program through Navy Commercial Access Control System (NCACS). · Completed and appointed as a Trainer/Certifier for National Crime Index Center (NCIC) system through the Department of Justice (DOJ) to support physical security and investigative functions of Navy District Washington (NDW). · Completed and appointed as a Trainer/Certifier for Washington Area Law Enforcement System (WALES) through DC Metro Police Department to support physical security and investigative functions of Navy District Washington. · Updates various databases, compiles information and completes appropriate reports referencing files and applicable instruction. · Serves as the principal program support assistant; performing various administrative and clerical duties in support of the Joint Base Anacostia Bolling (JBAB) security mission. · Creates and edits incoming/outgoing correspondence to include letters, reports, spreadsheets or presentations. · Reviews and analyzes incoming correspondence to determine proper action, assignment, and significance of correspondence, and special distribution.
  • 14. · Generates criminal history summary reports on behave or the Security Director for final adjudication. · Performs tasks to include preparing, issuing, tracking and the destruction of security/restricted access badges for the installation. · Verified eligibility screened and issued over 100K base passes to visitors and government contractors. · Updated file management system, moving paper entry authority request to a more efficient digital system. · Revamped and maintained Visitor Control Center Signature and Credential Program managing over 400 base personnel files. · Processed over 2,988 vehicle registrations and assisted in the facilitation of over 21k special events and distinguished visitors · Processed criminal background checks through Washington Area Law Enforcement System (WALES II) and NCIC before granting access to foreign nationals, contractors and vendors. · Processed forms for background investigation requirements via Security Forces Information Management Information System (SFMIS) and Navy Consolidated Law enforcement Operations Center (CLEOC). · Maintains, controlled forms, logs and Personally Identifiable Information (PII). · Tracks and inputs over 400k of the organizations workload data into the Navy’s Command Naval Installation Command (CNIC) regional database. · Responds to customer inquiries regarding installation access and security policy/regulations. · Performs protocol assistance duties as required and shared by JBAB Security Office. · Coordinates and responds to requests for advice/assistance in all matters/activities related to protocol procedures. · Plans or coordinates various ceremonies, receptions, visits, tours, and other events to be attended by ranking civilian and military officials, with all appropriate support services organizations. · Monitors clerical support duties to ensure efficient office
  • 15. operations in support of the Commanders/Executive office · Maintains files as appropriate including all correspondence and telephone log of significant calls. Coordinates office staff activities to ensure maximum efficiency; ability to type 55 WPM. · Hand-selected as the Naval Operation Center Command Post Support Staff during Baltimore’s largest tourism event; streamlined communications between Homeland Security, Secret Service, Baltimore City Police, Naval Criminal Investigative Service, and the National Park Service— safeguarded over 1.5 million visitors August, 2014 MVM (Social Security Headquarters) Location To Present Security Control Center Operator · Acts as primary dispatcher for all medical, law enforcement, and security incidents occurring on Social Security Administration (SSA) Head Quarters property and outlined buildings. · Completed Social Security Administration Physical Security Information System Management (PSIM) training. Monitored and managed over 2300 alarm points through the Lenel (alarm monitoring) System dispatched units and generated incident reports in accordance with established procedures. · Successfully managed priorities of emergency situations within the dispatched units in accordance with established procedures. · Provides direct physical security support through the use of over 300 digital and analog closed circuit television (CCTV) devices. · Coordinates inter agency response to incidents and emergency situations in accordance with established procedures. March, 2011 Paragon Systems (Social Security Headquarters) Location
  • 16. To August 2014 Security Control Center Operator · Acted as primary dispatcher for all medical, law enforcement, and security incidents occurring on SSA Head Quarter property and outlined building. · Successfully managed priorities of emergency situations within the dispatched units in accordance with established procedures. · Monitored and managed over 2300 alarm points on the Lenel (alarm monitoring) System dispatched units and generated incident reports in accordance with established procedures. · Established a comprehensive alarm checklist detailing procedures for daily operation of the Lenel Alarm Monitoring System. March, 2009 United States Air Force Location to May, 2009 Operations Support Staff/Administrative Manager · Prepared and reviewed police blotters, reports, regulations, standard operating procedures, and other correspondence, advising senior management on security activities and overseeing administrative functions to enhance operations and ensure compliance with established regulations and procedures. · Compiled, stored, and retrieved management data, using a variety of computer programs such as Microsoft, Power Point, Access, SFIMS, and NCIC. · Acted as primary dispatch agent for all base security incidents. Assist Flight Sergeant with command and control of security/law enforcement patrols to a Full Spectrum Threat Response (FSTR), protection level resources, alarm activations, burglaries and anti-hijackings. · Expertly managed $2.5M Advantor Alarm System for Shaw AFB; monitored over 900 alarm points at 80 facilities · Successfully managed and created database reports of police
  • 17. performance and training data. · Compiled, stored, and retrieved management data, using a variety of computer programs such as Microsoft 2007, Power Point, NCIC, and Access. February, 2006 United States Air Force Location to March, 2009 Shift Supervisor/Control Center Operator · Directed oversight aided accurate completion of over 100 Random Anti Terrorism Measures, 300 selective traffic enforcements, and 95 high value facility checks to ensure safety of personnel and resources. · Supervised and managed 44 employees, scheduled work hours, resolved conflicts, and wrote annual performance reports. · Successfully managed priorities of emergency situations within the dispatched units in accordance with established procedures. · Completed Antiterrorism Force Protection Level II Course curriculum provides completion certification in accordance with baseline standards outlined in DOD 2000.16 Antiterrorism Standards. · Established qualification and performed duties as an antiterrorism officer, advise leadership on the management of AT/FP programs/maters, and administer, track and reported Level I and pre-deployment AT/FP training. · Received liaison training with both internal agencies and tenants, and local civilian and host nation authorities to ensure full integration and comprehensive AT/FP planning and training. · Supervised the completion of Restricted Area/high risk Faculty checks. · Conducted surveys of restricted areas and generated reports of undocumented vulnerabilities. · Prepared and reviewed police blotters, reports, regulations,
  • 18. standard operating procedures, and other correspondence, advised senior management on security activities while overseeing administrative functions to enhance operations and ensure compliance with established regulations and procedures. · Knowledge of basic DoD and Air Force personnel security and SCI program, JPAS, principles, policies and procedures and its applicability to personnel security standards. · Completed Advantor Suite Operator/Administrators Alarm Management 4.1 course. · Completed South Carolina Law Enforcement Division (SLED) DUI/DWI training course utilizing the BAC/DMT DataMaster. · Conducted convoy security operations for high value personnel and critical supplies along main and alternate supply routes in Iraq. · Led an 8 member heavy weapons deployment team to Camp Bucca, Iraq; largest internment facility, in support of Operation IRAQI FREEDOM. · Selected as team leader for the 13 member deployment group during Headquarters Air Combat Command Operations Readiness Inspection; performance led to overall "Excellent" rating September, 2004 United States Air Force Location to January, 2006 Shift Supervisor/Control Center Operator · Directly responsible for command and control of all security and law enforcement shift activities. Implemented security plans policies and procedures which insured the protection of 2,800 annual transit aircraft and 3,200 assigned personnel. · Managed and lead U.S Air Force Security Forces and 15 Portuguese civilian employees. Acted as on scene liaison between United States and Host Nation Police during all incidents. · Held full accountability and exercised command and control over emergency situations.
  • 19. · Primary dispatch agency for all base security and Law Enforcement incidents. Assisted the Installation Commander with command and control of security and law enforcement patrols to a Full Spectrum Threat Response (FSTR), protection level resources, alarm activations burglaries and anit- hijackings. · Relayed information and messages to and from emergency sites, to law enforcement agencies, and to other individuals requiring notification. · Monitors incident site actions and makes notifications to commanders/first sergeants and all other key wing personnel. Prepares all Security Forces reports, blotters and other required correspondence August, 2002 United States Air Force Location to July, 2004 Lead Patrolmen · Detects and reports the presence of unauthorized personnel and activities and implements security reporting and alerting system. · Enforced standards of conduct, discipline, and adherence to laws and directives. · Operates speed measuring, drug alcohol, and breathe test devices; apprehends and detains suspects. · Secured crime and accidents scenes; collects, seizes, and preserves evidence. · Conducts interviews of witnesses and suspects; obtains statements and testifies in official judicial proceedings. February, 2001 United States Air Force Location to July, 2001 Law Enforcement Patrolmen · Structured public safety at all times by maintaining order, responding to emergencies, protecting people and property,
  • 20. enforcing motor vehicle and criminal laws, and promoting good community relations. · Evaluated complaint and emergency-request information to determine response requirements. · Issued citations and warnings to violators of motor vehicles. Professional Development · Security Forces/Police Technical School Training Lackland AFB TX · Microsoft Office Suite Training ability to type 55 Words Per Minute · Tactical Automated Security System Operator/Administrators course 1999/2006 · US Customs Certification Training · DUI training, CMI/INTOXILYZER 5000EN Breathalyzer Instrument Operators course · Supervisor Safety Training, certified through the Air Force · Department Of Defense Firefighters Certification Hazardous Materials Awareness course · Texas A&M University System Terrorism Awareness (recognized by the Department of Justice) · Emergency Response to Terrorism Self-Study course (presented by the National Fire Academy) · Law Enforcement and Human Resource/Management training, (Army Institute for Professional Development)
  • 21. · Completed Advantor Operators course 4.0/2004 and 2006 Administrators course 4.1/2006 · Department of Defense Anti Terrorism Level II course (certified Instructor) · Decision Making and Problem Solving (FEMA Emergency Management Institute) 2011 · Leadership and Influence (FEMA Emergency Management Institute) 2011 · Emergency Planning (FEMA Emergency Management Institute) 2011 · Effective Communication (FEMA Emergency Management Institute) 2011 · Introduction to DoD Personnel Security Adjudications (Center for Development of Security Excellence) 2013 · Introduction to DoD Personnel Security(Center for Development of Security Excellence) 2013 Education · Grantham University Associates Degree (Business Management) · Grantham University (BS Candidate Multi-Disciplinary Studies) · University of Maryland (BA Candidate Criminal Justice) · Potomac Senior High School, Woodbridge, VA (June 98)