SlideShare a Scribd company logo
1 of 10
Work Environment
Secure Work Environment Proposal
Name
SEC420
Date
Professor
Secure Work Environment Proposal
The Ace Corporation will be opening a new plant that
contains sensitive material. When an organization opens a new
location one important consideration involves the security
measures that will be employed. The new site opening will
require security to come up with a comprehensive security plan
that will be effective in securing the new location. Without a
security plan that addresses all potential security gaps the new
plant cannot be successful in protecting the sensitive material it
contains and will not be able to secure the private information
of customers and employees.
The new location will require a security plan that covers
access control procedures for the new facility and personnel
security recommendations for key personnel. The security plan
will take into account inventory control considerations and
establish effective perimeter and facility security. Lastly the
security plan will involve a threat and risk analysis. In order for
the Ace Corporation to be successful in securing the facility as
well as information systems the security plan will need to
identify all threats, analyze and prioritize those threats, and
lastly create a security plans to reduce the likelihood of security
threats.
Access Control Procedures
The new facility will need to have access control procedures
in place at the facility to prevent security breaches. The process
of user authentication, granting, and limiting access to facility,
application and system resources to only authorized individuals,
programs, processes, or systems (SoN, 2006). While all
employees need to have access to the facility there will be
secure areas in the facility that will only need to be accessed by
authorized personnel. All employees have access through the
front door of the facility but must pass through a security
checkpoint within the entryway of the new Ace corporation
plant.
The entryway checkpoint will ensure only authorized
personnel enter the facility and that any guest that visit the
plant will sign in upon arrival and receive an escort. Secure
areas in the facility will require authorized personnel to have
the necessary codes to give them entrance. Employees need to
be informed on what areas are off limits to unauthorized
personnel. Through having an existing access control plan to
protect sensitive areas the less the likelihood that unauthorized
personnel will gain entrance and cause a security breach.
Security cameras will also be present at secured access points to
alert security to any potential security breaches.
Personnel Security Recommendations
In order for the new location to be amply secured their will
need to be ample security staff. The security personnel will be
led by the Chief Security Officer who is responsible for hiring
and firing security staff, disciplining, and managing staff as
well as assigning roles and responsibilities of security staff that
is hired. The facility contains a large plant, storage building,
sensitive areas of the building, and security checkpoints. The
Chief Security Officer will need to ensure all security positions
are properly staffed.
Perimeter and facility security
Security personnel will be placed at security checkpoint at
the entrance of the parking lot to stop any unwanted visitors.
Security will also be placed in the entrance of the plant in order
to ensure no unwanted people enter building and that visitors
check in. Next security staff will be responsible for patrolling
the plant when the building closes for the evening and security
staff will monitor the video surveillance station located in the
security headquarters. The security building will be secured
with keyless entry locks and security guards will secure the area
through their continued patrols.
Inventory Control Considerations
The inventory at the Ace Corporation is highly sensitive and
extremely costly. Any loss can be detrimental to the plant and
can create a major safety hazard for members of the public. In
order to ensure the inventory is properly protected the first
protection will be the security fence placed around the facility
and its parking lot. Overseeing the storage of supplies and parts
becomes more complicated when several buildings are spread
out geographically (Murphy, 2008). In the case of the Ace
corporations new location a twelve foot fence will secure the
outer perimeter.
The storage building containing the companies sensitive
supplies will be secured will keyless entry lock that only
authorized personnel can enter a security cameras will be placed
at the entrance of the storage building. Security personnel will
patrol the inner perimeter of the plant to ensure there are no
security breaches that can result in loss. Next the inventory will
need to be properly maintained by a plant manger through
inventory checks and management. The manager is responsible
for identifying the loss if it does not involve an obvious
security breach.
Threat and Vulnerability Analysis
The Threat and Vulnerability Analysis will assist the
security staff in identifying real security threats and areas of
vulnerability that will require more effective security measures.
The threat analysis provides a clear understanding of what
threats the new Ace Corporation facility will face. For example
the threat assessment will provide information on what types of
security threats would be present to attempt to steal sensitive
data stored at the facility or to gain illegal entry into the
information systems of the building. By understanding the
threats the security staff will be better equipped to deflect the
security risk through more effective security measures.
To examine this risk, a security vulnerability analysis would
evaluate an organization to identify, validate and prioritize
vulnerabilities that could produce a security incident (Ahren,
2010). This includes identifying the potential threats that exist.
These threats include offenders that attempt to gain entry into
the information systems of the facility as well as physical
security breaches that result in sensitive and expensive material
being stolen or damaged. The risk assessment alerts to level of
risk from different areas of the facility. Once the risks are
identified they can be evaluated for importance and then
prioritize to ensure the most pressing security challenge is
addressed first.
Conclusion
The Ace Corporation new plant opening requires a
comprehensive security plan to ensure the sensitive material
stored there is not accessed, damaged, or stolen as well as the
information systems of the plant are amply secured. The Chief
Security Officer will conduct a risk and threat assessment to
identify potential security gaps and put the appropriate security
measures in place. Through an effective security plan the
company can avoid unnecessary loss and the sensitive material
can be properly protected.
References
Ahren, S. (2010). A Security Vulnerability Analysis Helps
Identify Real Threats. Retrieved
March 18, 2013 from
http://www.facilitiesnet.com/security/article/A-Security-
Vulnerability
Murphy F. (2008). Inventory Management: Storage
Considerations. Retrieved March 18, 2013
from
http://www.facilitiesnet.com/equipmentrentaltools/article/Invent
ory-Management-Stor
School of Nursing. (2006). Facility access Controls Procedures.
Retrieved March 18, 2013 from
http://nurseweb.ucsf.edu/public/secure/facility_access_controls.
pdf
Bus Radio
SEC430 Bus Radio Theft Investigation
Name
Class
Date
Professor
Bus Radio Theft Investigation
In this scenario the crime occurred and was investigated
over a four year period and involved the theft of two way radios
from buses from the Kelsey Unified School District. The thefts
occurred within one to four weeks of being installed and the
thefts are occurring at night at the bus compound. The
investigation of the theft of the two way radios begins at the
crime scene. The crime scene is an essential aspect of any crime
investigation and contains vital information that will provide
clues to the detectives in order to determine who committed the
crime. Once the crime is reported the crime scene will be
secured by responding officers until the investigation can begin.
When conducting the investigation of the bus compound
investigators will interview witnesses and explore the buses and
bus compound in order to gather evidence. The interviews were
conducted with Sully Smiley the security guard, Barnett Bennett
a long time employee, Sally Foley the transportation secretary,
and Sally’s husband. Sully Smiley is the security guard
responsible for securing the bus compound. Police gathered
information about the alibi’s of the witnesses and questioned
their knowledge of the event. In order to develop potential leads
the police need to interview witnesses.
Once the interview has been conducted the police will need
to verify the alibi of all of the witnesses and conduct criminal
background checks. If any of the witnesses have a history of
theft they would become a person of interest in the
investigation. When interviewing the witnesses the police need
to observe their body language as well as the statements the
witnesses are making. When the investigator understands and
practices effective interviewing techniques, the results of each
interview can dramatically increase, in both the quantity and the
quality of information obtained (Goerman, 2010). Investigators
will need to accurately record everything the witness reports by
listening to everything the witness says.
Next in the investigation process is the gathering of
evidence. In this case footprints were located on the steps on
one bus and a coke can on the steps of another buses. Police
also located a fingerprint on the steering wheel of one of the
buses. This physical evidence can provide vital clues that point
at the guilt offenders or provide clear evidence of their guilt.
When gathering the evidence the proper uniform, evidence
collection techniques will need to be applied to ensure the
evidence does not become damaged or lost.
In the evidence collection process first investigators need to
document the evidence with sketches and photographs and then
carefully collecting the evidence using the best known forensic
practices. The fingerprints and shoe prints will need to be
carefully lifted before being placed in a clean and dry evidence
bag and the coke carefully placed in an evidence bag for
forensic analysis and to lift any potential fingerprints. Once the
evidence is bagged it needs to be carefully labeled with name,
date, time, and location of the evidence. Documentation is
essential to protecting the chain of evidence in order to ensure
the evidence can be used in court (Tidball, 2011).
Through the information obtained based on the physical
evidence and the answers to the interview questions the
investigators can develop an idea of how and when the crime
occurred. For example the security guard conducts his rounds at
11:45pm and again at 6am. Because the two way radios were not
missing on the security guards patrol at 11:45pm but where
missing at 6am the crime occurred between 12-6am. The police
will need to learn where the witnesses and any persons of
interest where during these times.
Another important clue gleaned from Travis Stevenson was
the robberies occurred within weeks of the two way radios being
installed implying someone from the bus compound is
responsible for the thefts or assisting someone else in the thefts.
This information is critical to investigators for developing
person of interests of criminal suspects. The alibis of all of the
workers and the security guard will need to be verified. Sally’s
alibi has been verified by her husband and she does not have a
key to the bus yard. This information could eliminate Sally and
her husband from the suspect list.
The investigators would need to question the security guard
about any suspicious activity he may have noticed on the nights
the two way radios were stolen as well as question the witnesses
to see if they had discussed the installation of the new two way
radios with anyone outside of work. Next investigators will
need to develop the physical evidence in order to determine if it
points to a specific suspect. Physical evidence can be invaluable
to the criminal investigation and provide definitive evidence of
a suspect’s guilt. The fingerprints can directly point to a suspect
and the footprints can tie a suspect to the crime. The coke can
that was located may contain DNA evidence or may have
fingerprints on the exterior.
Documentation is essential in every aspect of the
investigation. When creating a file investigators will need to
include the interviews conducted with witnesses, copies of their
statements, photographs of the crime scene as well as all notes
taken by the investigator. The file should include any forensic
reports and the criminal background checks conducted on the
witnesses. Much like when documenting steps taken to collect
forensic evidence documentation provides the court with a clear
picture of the events and provides documentation of the steps
taken by the investigators.
In any crime the investigation is essential to discovering
who was responsible. Investigators develop evidence through
witness testimony and gathering physical evidence at the crime
scene. Through their investigatory skills evidence is developed
that points to a specific suspect. If there is enough evidence to
show probable cause that a crime was committed the suspect
will be arrested and tried in a court of law. If evidence is
collected illegally or is not properly documented the result can
be the evidence is excluded from the court process resulting in a
guilty offender going free. The investigation is essential to
developing enough evidence to prove the guilt of the offender
and ensuring evidence is not excluded from the court process.
References
Goerman, R. (2010). How to Interview the Witness. Retrieved
November 5, 2012 from
http://robertgoerman.tripod.com/id21.html
Tidball, C. (2011). The importance of Chain of Custody and
Preservation of Evidence. Retrieved
November 5, 2012 from
http://findingmillions.wordpress.com/2011/02/22/the-
importance-of-chain-of-custody

More Related Content

Similar to Work Environment Secure Work Envi.docx

Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
Samuel Loomis
 
WEB APPLICATION FOR RISK ASSESSMENT WITH SECURITY FEATURES
WEB APPLICATION FOR RISK ASSESSMENT WITH SECURITY FEATURESWEB APPLICATION FOR RISK ASSESSMENT WITH SECURITY FEATURES
WEB APPLICATION FOR RISK ASSESSMENT WITH SECURITY FEATURES
AM Publications
 
RequirementQuestionExamine (see below) your classmates propos.docx
RequirementQuestionExamine (see below) your classmates propos.docxRequirementQuestionExamine (see below) your classmates propos.docx
RequirementQuestionExamine (see below) your classmates propos.docx
audeleypearl
 

Similar to Work Environment Secure Work Envi.docx (20)

Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
 
Strengthening Transportation Logistic Facility Security.pdf
Strengthening Transportation Logistic Facility Security.pdfStrengthening Transportation Logistic Facility Security.pdf
Strengthening Transportation Logistic Facility Security.pdf
 
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...
 
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
 
WEB APPLICATION FOR RISK ASSESSMENT WITH SECURITY FEATURES
WEB APPLICATION FOR RISK ASSESSMENT WITH SECURITY FEATURESWEB APPLICATION FOR RISK ASSESSMENT WITH SECURITY FEATURES
WEB APPLICATION FOR RISK ASSESSMENT WITH SECURITY FEATURES
 
SECURITY PLANNING DESIGN (SESSION 3).ppt
SECURITY PLANNING  DESIGN (SESSION 3).pptSECURITY PLANNING  DESIGN (SESSION 3).ppt
SECURITY PLANNING DESIGN (SESSION 3).ppt
 
SDET UNIT 5.pptx
SDET UNIT 5.pptxSDET UNIT 5.pptx
SDET UNIT 5.pptx
 
Exploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity TestingExploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity Testing
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
 
RequirementQuestionExamine (see below) your classmates propos.docx
RequirementQuestionExamine (see below) your classmates propos.docxRequirementQuestionExamine (see below) your classmates propos.docx
RequirementQuestionExamine (see below) your classmates propos.docx
 
Cybersecurity Services Provider with hex64.docx
Cybersecurity Services Provider with hex64.docxCybersecurity Services Provider with hex64.docx
Cybersecurity Services Provider with hex64.docx
 
Risk based approach
Risk based approach Risk based approach
Risk based approach
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Construction Site Security.pdf
Construction Site Security.pdfConstruction Site Security.pdf
Construction Site Security.pdf
 
Retail Security Systems - www.indoteq.net
Retail Security Systems - www.indoteq.netRetail Security Systems - www.indoteq.net
Retail Security Systems - www.indoteq.net
 
Lecture on Safety Management.pptx
Lecture on Safety Management.pptxLecture on Safety Management.pptx
Lecture on Safety Management.pptx
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
 

More from ericbrooks84875

Fundamentals of Risk and InsuranceEmmEtt J. Vaughan • .docx
Fundamentals of Risk and InsuranceEmmEtt J. Vaughan   •   .docxFundamentals of Risk and InsuranceEmmEtt J. Vaughan   •   .docx
Fundamentals of Risk and InsuranceEmmEtt J. Vaughan • .docx
ericbrooks84875
 
Fungi reproduce ___________________________ by fragmentation, buddin.docx
Fungi reproduce ___________________________ by fragmentation, buddin.docxFungi reproduce ___________________________ by fragmentation, buddin.docx
Fungi reproduce ___________________________ by fragmentation, buddin.docx
ericbrooks84875
 
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docx
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docxFull-Circle LearningMyLab™ Learning Full Circle for Mar.docx
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docx
ericbrooks84875
 
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docx
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docxFunctional Behavior Assessment ExampleStudent NameInes SalazarD.docx
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docx
ericbrooks84875
 
Functional Requirements Document TemplateVersionDescription .docx
Functional Requirements Document TemplateVersionDescription .docxFunctional Requirements Document TemplateVersionDescription .docx
Functional Requirements Document TemplateVersionDescription .docx
ericbrooks84875
 
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docxFS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
ericbrooks84875
 

More from ericbrooks84875 (20)

Fundamentals of Risk and InsuranceEmmEtt J. Vaughan • .docx
Fundamentals of Risk and InsuranceEmmEtt J. Vaughan   •   .docxFundamentals of Risk and InsuranceEmmEtt J. Vaughan   •   .docx
Fundamentals of Risk and InsuranceEmmEtt J. Vaughan • .docx
 
Fungi reproduce ___________________________ by fragmentation, buddin.docx
Fungi reproduce ___________________________ by fragmentation, buddin.docxFungi reproduce ___________________________ by fragmentation, buddin.docx
Fungi reproduce ___________________________ by fragmentation, buddin.docx
 
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docx
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docxFull-Circle LearningMyLab™ Learning Full Circle for Mar.docx
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docx
 
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docx
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docxFunctional Behavior Assessment ExampleStudent NameInes SalazarD.docx
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docx
 
Functional Requirements Document TemplateVersionDescription .docx
Functional Requirements Document TemplateVersionDescription .docxFunctional Requirements Document TemplateVersionDescription .docx
Functional Requirements Document TemplateVersionDescription .docx
 
Fully answer any ONE of the following essay questions1.  Is the.docx
Fully answer any ONE of the following essay questions1.  Is the.docxFully answer any ONE of the following essay questions1.  Is the.docx
Fully answer any ONE of the following essay questions1.  Is the.docx
 
Fully answer any ONE of the following essay questions1.  Is t.docx
Fully answer any ONE of the following essay questions1.  Is t.docxFully answer any ONE of the following essay questions1.  Is t.docx
Fully answer any ONE of the following essay questions1.  Is t.docx
 
From the weeks chapter reading, we learn from the authors that,.docx
From the weeks chapter reading, we learn from the authors that,.docxFrom the weeks chapter reading, we learn from the authors that,.docx
From the weeks chapter reading, we learn from the authors that,.docx
 
FTER watching the videos and reviewing the other materials in this.docx
FTER watching the videos and reviewing the other materials in this.docxFTER watching the videos and reviewing the other materials in this.docx
FTER watching the videos and reviewing the other materials in this.docx
 
fter completing the reading this week, we reflect on a few key conce.docx
fter completing the reading this week, we reflect on a few key conce.docxfter completing the reading this week, we reflect on a few key conce.docx
fter completing the reading this week, we reflect on a few key conce.docx
 
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docxFS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
 
Fromm’s concept of the syndrome of decay included three personality .docx
Fromm’s concept of the syndrome of decay included three personality .docxFromm’s concept of the syndrome of decay included three personality .docx
Fromm’s concept of the syndrome of decay included three personality .docx
 
From your readings in Chapter 4, choose one of the organizational sy.docx
From your readings in Chapter 4, choose one of the organizational sy.docxFrom your readings in Chapter 4, choose one of the organizational sy.docx
From your readings in Chapter 4, choose one of the organizational sy.docx
 
From your daily briefs, Kaiser Health News Morning Briefing or P.docx
From your daily briefs, Kaiser Health News Morning Briefing or P.docxFrom your daily briefs, Kaiser Health News Morning Briefing or P.docx
From your daily briefs, Kaiser Health News Morning Briefing or P.docx
 
From the perspective of the public safety field youre in, aspire to.docx
From the perspective of the public safety field youre in, aspire to.docxFrom the perspective of the public safety field youre in, aspire to.docx
From the perspective of the public safety field youre in, aspire to.docx
 
From the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docx
From the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docxFrom the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docx
From the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docx
 
From the end of Chapter 14, complete Discussion Question 3 What are.docx
From the end of Chapter 14, complete Discussion Question 3 What are.docxFrom the end of Chapter 14, complete Discussion Question 3 What are.docx
From the end of Chapter 14, complete Discussion Question 3 What are.docx
 
From the e-Activity, take a position on this statement People that .docx
From the e-Activity, take a position on this statement People that .docxFrom the e-Activity, take a position on this statement People that .docx
From the e-Activity, take a position on this statement People that .docx
 
From Chapter Seven How does horizontal growth differ from v.docx
From Chapter Seven How does horizontal growth differ from v.docxFrom Chapter Seven How does horizontal growth differ from v.docx
From Chapter Seven How does horizontal growth differ from v.docx
 
From the e-Activity, determine the fundamental differences between t.docx
From the e-Activity, determine the fundamental differences between t.docxFrom the e-Activity, determine the fundamental differences between t.docx
From the e-Activity, determine the fundamental differences between t.docx
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

Work Environment Secure Work Envi.docx

  • 1. Work Environment Secure Work Environment Proposal Name SEC420 Date Professor Secure Work Environment Proposal The Ace Corporation will be opening a new plant that contains sensitive material. When an organization opens a new location one important consideration involves the security measures that will be employed. The new site opening will require security to come up with a comprehensive security plan that will be effective in securing the new location. Without a
  • 2. security plan that addresses all potential security gaps the new plant cannot be successful in protecting the sensitive material it contains and will not be able to secure the private information of customers and employees. The new location will require a security plan that covers access control procedures for the new facility and personnel security recommendations for key personnel. The security plan will take into account inventory control considerations and establish effective perimeter and facility security. Lastly the security plan will involve a threat and risk analysis. In order for the Ace Corporation to be successful in securing the facility as well as information systems the security plan will need to identify all threats, analyze and prioritize those threats, and lastly create a security plans to reduce the likelihood of security threats. Access Control Procedures The new facility will need to have access control procedures in place at the facility to prevent security breaches. The process of user authentication, granting, and limiting access to facility, application and system resources to only authorized individuals, programs, processes, or systems (SoN, 2006). While all employees need to have access to the facility there will be secure areas in the facility that will only need to be accessed by authorized personnel. All employees have access through the front door of the facility but must pass through a security checkpoint within the entryway of the new Ace corporation plant. The entryway checkpoint will ensure only authorized personnel enter the facility and that any guest that visit the plant will sign in upon arrival and receive an escort. Secure areas in the facility will require authorized personnel to have the necessary codes to give them entrance. Employees need to be informed on what areas are off limits to unauthorized personnel. Through having an existing access control plan to protect sensitive areas the less the likelihood that unauthorized personnel will gain entrance and cause a security breach.
  • 3. Security cameras will also be present at secured access points to alert security to any potential security breaches. Personnel Security Recommendations In order for the new location to be amply secured their will need to be ample security staff. The security personnel will be led by the Chief Security Officer who is responsible for hiring and firing security staff, disciplining, and managing staff as well as assigning roles and responsibilities of security staff that is hired. The facility contains a large plant, storage building, sensitive areas of the building, and security checkpoints. The Chief Security Officer will need to ensure all security positions are properly staffed. Perimeter and facility security Security personnel will be placed at security checkpoint at the entrance of the parking lot to stop any unwanted visitors. Security will also be placed in the entrance of the plant in order to ensure no unwanted people enter building and that visitors check in. Next security staff will be responsible for patrolling the plant when the building closes for the evening and security staff will monitor the video surveillance station located in the security headquarters. The security building will be secured with keyless entry locks and security guards will secure the area through their continued patrols. Inventory Control Considerations The inventory at the Ace Corporation is highly sensitive and extremely costly. Any loss can be detrimental to the plant and can create a major safety hazard for members of the public. In order to ensure the inventory is properly protected the first protection will be the security fence placed around the facility and its parking lot. Overseeing the storage of supplies and parts becomes more complicated when several buildings are spread out geographically (Murphy, 2008). In the case of the Ace corporations new location a twelve foot fence will secure the outer perimeter. The storage building containing the companies sensitive supplies will be secured will keyless entry lock that only
  • 4. authorized personnel can enter a security cameras will be placed at the entrance of the storage building. Security personnel will patrol the inner perimeter of the plant to ensure there are no security breaches that can result in loss. Next the inventory will need to be properly maintained by a plant manger through inventory checks and management. The manager is responsible for identifying the loss if it does not involve an obvious security breach. Threat and Vulnerability Analysis The Threat and Vulnerability Analysis will assist the security staff in identifying real security threats and areas of vulnerability that will require more effective security measures. The threat analysis provides a clear understanding of what threats the new Ace Corporation facility will face. For example the threat assessment will provide information on what types of security threats would be present to attempt to steal sensitive data stored at the facility or to gain illegal entry into the information systems of the building. By understanding the threats the security staff will be better equipped to deflect the security risk through more effective security measures. To examine this risk, a security vulnerability analysis would evaluate an organization to identify, validate and prioritize vulnerabilities that could produce a security incident (Ahren, 2010). This includes identifying the potential threats that exist. These threats include offenders that attempt to gain entry into the information systems of the facility as well as physical security breaches that result in sensitive and expensive material being stolen or damaged. The risk assessment alerts to level of risk from different areas of the facility. Once the risks are identified they can be evaluated for importance and then prioritize to ensure the most pressing security challenge is addressed first. Conclusion The Ace Corporation new plant opening requires a comprehensive security plan to ensure the sensitive material stored there is not accessed, damaged, or stolen as well as the
  • 5. information systems of the plant are amply secured. The Chief Security Officer will conduct a risk and threat assessment to identify potential security gaps and put the appropriate security measures in place. Through an effective security plan the company can avoid unnecessary loss and the sensitive material can be properly protected. References Ahren, S. (2010). A Security Vulnerability Analysis Helps Identify Real Threats. Retrieved March 18, 2013 from http://www.facilitiesnet.com/security/article/A-Security- Vulnerability Murphy F. (2008). Inventory Management: Storage Considerations. Retrieved March 18, 2013 from http://www.facilitiesnet.com/equipmentrentaltools/article/Invent ory-Management-Stor School of Nursing. (2006). Facility access Controls Procedures. Retrieved March 18, 2013 from http://nurseweb.ucsf.edu/public/secure/facility_access_controls. pdf Bus Radio
  • 6. SEC430 Bus Radio Theft Investigation Name Class Date Professor Bus Radio Theft Investigation In this scenario the crime occurred and was investigated over a four year period and involved the theft of two way radios from buses from the Kelsey Unified School District. The thefts occurred within one to four weeks of being installed and the thefts are occurring at night at the bus compound. The investigation of the theft of the two way radios begins at the crime scene. The crime scene is an essential aspect of any crime investigation and contains vital information that will provide clues to the detectives in order to determine who committed the crime. Once the crime is reported the crime scene will be secured by responding officers until the investigation can begin. When conducting the investigation of the bus compound investigators will interview witnesses and explore the buses and bus compound in order to gather evidence. The interviews were
  • 7. conducted with Sully Smiley the security guard, Barnett Bennett a long time employee, Sally Foley the transportation secretary, and Sally’s husband. Sully Smiley is the security guard responsible for securing the bus compound. Police gathered information about the alibi’s of the witnesses and questioned their knowledge of the event. In order to develop potential leads the police need to interview witnesses. Once the interview has been conducted the police will need to verify the alibi of all of the witnesses and conduct criminal background checks. If any of the witnesses have a history of theft they would become a person of interest in the investigation. When interviewing the witnesses the police need to observe their body language as well as the statements the witnesses are making. When the investigator understands and practices effective interviewing techniques, the results of each interview can dramatically increase, in both the quantity and the quality of information obtained (Goerman, 2010). Investigators will need to accurately record everything the witness reports by listening to everything the witness says. Next in the investigation process is the gathering of evidence. In this case footprints were located on the steps on one bus and a coke can on the steps of another buses. Police also located a fingerprint on the steering wheel of one of the buses. This physical evidence can provide vital clues that point at the guilt offenders or provide clear evidence of their guilt. When gathering the evidence the proper uniform, evidence collection techniques will need to be applied to ensure the evidence does not become damaged or lost. In the evidence collection process first investigators need to document the evidence with sketches and photographs and then carefully collecting the evidence using the best known forensic practices. The fingerprints and shoe prints will need to be carefully lifted before being placed in a clean and dry evidence bag and the coke carefully placed in an evidence bag for forensic analysis and to lift any potential fingerprints. Once the evidence is bagged it needs to be carefully labeled with name,
  • 8. date, time, and location of the evidence. Documentation is essential to protecting the chain of evidence in order to ensure the evidence can be used in court (Tidball, 2011). Through the information obtained based on the physical evidence and the answers to the interview questions the investigators can develop an idea of how and when the crime occurred. For example the security guard conducts his rounds at 11:45pm and again at 6am. Because the two way radios were not missing on the security guards patrol at 11:45pm but where missing at 6am the crime occurred between 12-6am. The police will need to learn where the witnesses and any persons of interest where during these times. Another important clue gleaned from Travis Stevenson was the robberies occurred within weeks of the two way radios being installed implying someone from the bus compound is responsible for the thefts or assisting someone else in the thefts. This information is critical to investigators for developing person of interests of criminal suspects. The alibis of all of the workers and the security guard will need to be verified. Sally’s alibi has been verified by her husband and she does not have a key to the bus yard. This information could eliminate Sally and her husband from the suspect list. The investigators would need to question the security guard about any suspicious activity he may have noticed on the nights the two way radios were stolen as well as question the witnesses to see if they had discussed the installation of the new two way radios with anyone outside of work. Next investigators will need to develop the physical evidence in order to determine if it points to a specific suspect. Physical evidence can be invaluable to the criminal investigation and provide definitive evidence of a suspect’s guilt. The fingerprints can directly point to a suspect and the footprints can tie a suspect to the crime. The coke can that was located may contain DNA evidence or may have fingerprints on the exterior. Documentation is essential in every aspect of the investigation. When creating a file investigators will need to
  • 9. include the interviews conducted with witnesses, copies of their statements, photographs of the crime scene as well as all notes taken by the investigator. The file should include any forensic reports and the criminal background checks conducted on the witnesses. Much like when documenting steps taken to collect forensic evidence documentation provides the court with a clear picture of the events and provides documentation of the steps taken by the investigators. In any crime the investigation is essential to discovering who was responsible. Investigators develop evidence through witness testimony and gathering physical evidence at the crime scene. Through their investigatory skills evidence is developed that points to a specific suspect. If there is enough evidence to show probable cause that a crime was committed the suspect will be arrested and tried in a court of law. If evidence is collected illegally or is not properly documented the result can be the evidence is excluded from the court process resulting in a guilty offender going free. The investigation is essential to developing enough evidence to prove the guilt of the offender and ensuring evidence is not excluded from the court process. References Goerman, R. (2010). How to Interview the Witness. Retrieved November 5, 2012 from http://robertgoerman.tripod.com/id21.html Tidball, C. (2011). The importance of Chain of Custody and
  • 10. Preservation of Evidence. Retrieved November 5, 2012 from http://findingmillions.wordpress.com/2011/02/22/the- importance-of-chain-of-custody