Work Environment
Secure Work Environment Proposal
Name
SEC420
Date
Professor
Secure Work Environment Proposal
The Ace Corporation will be opening a new plant that contains sensitive material. When an organization opens a new location one important consideration involves the security measures that will be employed. The new site opening will require security to come up with a comprehensive security plan that will be effective in securing the new location. Without a security plan that addresses all potential security gaps the new plant cannot be successful in protecting the sensitive material it contains and will not be able to secure the private information of customers and employees.
The new location will require a security plan that covers access control procedures for the new facility and personnel security recommendations for key personnel. The security plan will take into account inventory control considerations and establish effective perimeter and facility security. Lastly the security plan will involve a threat and risk analysis. In order for the Ace Corporation to be successful in securing the facility as well as information systems the security plan will need to identify all threats, analyze and prioritize those threats, and lastly create a security plans to reduce the likelihood of security threats.
Access Control Procedures
The new facility will need to have access control procedures in place at the facility to prevent security breaches. The process of user authentication, granting, and limiting access to facility, application and system resources to only authorized individuals, programs, processes, or systems (SoN, 2006). While all employees need to have access to the facility there will be secure areas in the facility that will only need to be accessed by authorized personnel. All employees have access through the front door of the facility but must pass through a security checkpoint within the entryway of the new Ace corporation plant.
The entryway checkpoint will ensure only authorized personnel enter the facility and that any guest that visit the plant will sign in upon arrival and receive an escort. Secure areas in the facility will require authorized personnel to have the necessary codes to give them entrance. Employees need to be informed on what areas are off limits to unauthorized personnel. Through having an existing access control plan to protect sensitive areas the less the likelihood that unauthorized personnel will gain entrance and cause a security breach. Security cameras will also be present at secured access points to alert security to any potential security breaches.
Personnel Security Recommendations
In order for the new location to be amply secured their will need to be ample security staff. The security personnel will be led by the Chief Security Officer who is responsible for hiring and firing security staff, disciplining, and managing staff as well as as.
1. Work Environment
Secure Work Environment Proposal
Name
SEC420
Date
Professor
Secure Work Environment Proposal
The Ace Corporation will be opening a new plant that
contains sensitive material. When an organization opens a new
location one important consideration involves the security
measures that will be employed. The new site opening will
require security to come up with a comprehensive security plan
that will be effective in securing the new location. Without a
2. security plan that addresses all potential security gaps the new
plant cannot be successful in protecting the sensitive material it
contains and will not be able to secure the private information
of customers and employees.
The new location will require a security plan that covers
access control procedures for the new facility and personnel
security recommendations for key personnel. The security plan
will take into account inventory control considerations and
establish effective perimeter and facility security. Lastly the
security plan will involve a threat and risk analysis. In order for
the Ace Corporation to be successful in securing the facility as
well as information systems the security plan will need to
identify all threats, analyze and prioritize those threats, and
lastly create a security plans to reduce the likelihood of security
threats.
Access Control Procedures
The new facility will need to have access control procedures
in place at the facility to prevent security breaches. The process
of user authentication, granting, and limiting access to facility,
application and system resources to only authorized individuals,
programs, processes, or systems (SoN, 2006). While all
employees need to have access to the facility there will be
secure areas in the facility that will only need to be accessed by
authorized personnel. All employees have access through the
front door of the facility but must pass through a security
checkpoint within the entryway of the new Ace corporation
plant.
The entryway checkpoint will ensure only authorized
personnel enter the facility and that any guest that visit the
plant will sign in upon arrival and receive an escort. Secure
areas in the facility will require authorized personnel to have
the necessary codes to give them entrance. Employees need to
be informed on what areas are off limits to unauthorized
personnel. Through having an existing access control plan to
protect sensitive areas the less the likelihood that unauthorized
personnel will gain entrance and cause a security breach.
3. Security cameras will also be present at secured access points to
alert security to any potential security breaches.
Personnel Security Recommendations
In order for the new location to be amply secured their will
need to be ample security staff. The security personnel will be
led by the Chief Security Officer who is responsible for hiring
and firing security staff, disciplining, and managing staff as
well as assigning roles and responsibilities of security staff that
is hired. The facility contains a large plant, storage building,
sensitive areas of the building, and security checkpoints. The
Chief Security Officer will need to ensure all security positions
are properly staffed.
Perimeter and facility security
Security personnel will be placed at security checkpoint at
the entrance of the parking lot to stop any unwanted visitors.
Security will also be placed in the entrance of the plant in order
to ensure no unwanted people enter building and that visitors
check in. Next security staff will be responsible for patrolling
the plant when the building closes for the evening and security
staff will monitor the video surveillance station located in the
security headquarters. The security building will be secured
with keyless entry locks and security guards will secure the area
through their continued patrols.
Inventory Control Considerations
The inventory at the Ace Corporation is highly sensitive and
extremely costly. Any loss can be detrimental to the plant and
can create a major safety hazard for members of the public. In
order to ensure the inventory is properly protected the first
protection will be the security fence placed around the facility
and its parking lot. Overseeing the storage of supplies and parts
becomes more complicated when several buildings are spread
out geographically (Murphy, 2008). In the case of the Ace
corporations new location a twelve foot fence will secure the
outer perimeter.
The storage building containing the companies sensitive
supplies will be secured will keyless entry lock that only
4. authorized personnel can enter a security cameras will be placed
at the entrance of the storage building. Security personnel will
patrol the inner perimeter of the plant to ensure there are no
security breaches that can result in loss. Next the inventory will
need to be properly maintained by a plant manger through
inventory checks and management. The manager is responsible
for identifying the loss if it does not involve an obvious
security breach.
Threat and Vulnerability Analysis
The Threat and Vulnerability Analysis will assist the
security staff in identifying real security threats and areas of
vulnerability that will require more effective security measures.
The threat analysis provides a clear understanding of what
threats the new Ace Corporation facility will face. For example
the threat assessment will provide information on what types of
security threats would be present to attempt to steal sensitive
data stored at the facility or to gain illegal entry into the
information systems of the building. By understanding the
threats the security staff will be better equipped to deflect the
security risk through more effective security measures.
To examine this risk, a security vulnerability analysis would
evaluate an organization to identify, validate and prioritize
vulnerabilities that could produce a security incident (Ahren,
2010). This includes identifying the potential threats that exist.
These threats include offenders that attempt to gain entry into
the information systems of the facility as well as physical
security breaches that result in sensitive and expensive material
being stolen or damaged. The risk assessment alerts to level of
risk from different areas of the facility. Once the risks are
identified they can be evaluated for importance and then
prioritize to ensure the most pressing security challenge is
addressed first.
Conclusion
The Ace Corporation new plant opening requires a
comprehensive security plan to ensure the sensitive material
stored there is not accessed, damaged, or stolen as well as the
5. information systems of the plant are amply secured. The Chief
Security Officer will conduct a risk and threat assessment to
identify potential security gaps and put the appropriate security
measures in place. Through an effective security plan the
company can avoid unnecessary loss and the sensitive material
can be properly protected.
References
Ahren, S. (2010). A Security Vulnerability Analysis Helps
Identify Real Threats. Retrieved
March 18, 2013 from
http://www.facilitiesnet.com/security/article/A-Security-
Vulnerability
Murphy F. (2008). Inventory Management: Storage
Considerations. Retrieved March 18, 2013
from
http://www.facilitiesnet.com/equipmentrentaltools/article/Invent
ory-Management-Stor
School of Nursing. (2006). Facility access Controls Procedures.
Retrieved March 18, 2013 from
http://nurseweb.ucsf.edu/public/secure/facility_access_controls.
pdf
Bus Radio
6. SEC430 Bus Radio Theft Investigation
Name
Class
Date
Professor
Bus Radio Theft Investigation
In this scenario the crime occurred and was investigated
over a four year period and involved the theft of two way radios
from buses from the Kelsey Unified School District. The thefts
occurred within one to four weeks of being installed and the
thefts are occurring at night at the bus compound. The
investigation of the theft of the two way radios begins at the
crime scene. The crime scene is an essential aspect of any crime
investigation and contains vital information that will provide
clues to the detectives in order to determine who committed the
crime. Once the crime is reported the crime scene will be
secured by responding officers until the investigation can begin.
When conducting the investigation of the bus compound
investigators will interview witnesses and explore the buses and
bus compound in order to gather evidence. The interviews were
7. conducted with Sully Smiley the security guard, Barnett Bennett
a long time employee, Sally Foley the transportation secretary,
and Sally’s husband. Sully Smiley is the security guard
responsible for securing the bus compound. Police gathered
information about the alibi’s of the witnesses and questioned
their knowledge of the event. In order to develop potential leads
the police need to interview witnesses.
Once the interview has been conducted the police will need
to verify the alibi of all of the witnesses and conduct criminal
background checks. If any of the witnesses have a history of
theft they would become a person of interest in the
investigation. When interviewing the witnesses the police need
to observe their body language as well as the statements the
witnesses are making. When the investigator understands and
practices effective interviewing techniques, the results of each
interview can dramatically increase, in both the quantity and the
quality of information obtained (Goerman, 2010). Investigators
will need to accurately record everything the witness reports by
listening to everything the witness says.
Next in the investigation process is the gathering of
evidence. In this case footprints were located on the steps on
one bus and a coke can on the steps of another buses. Police
also located a fingerprint on the steering wheel of one of the
buses. This physical evidence can provide vital clues that point
at the guilt offenders or provide clear evidence of their guilt.
When gathering the evidence the proper uniform, evidence
collection techniques will need to be applied to ensure the
evidence does not become damaged or lost.
In the evidence collection process first investigators need to
document the evidence with sketches and photographs and then
carefully collecting the evidence using the best known forensic
practices. The fingerprints and shoe prints will need to be
carefully lifted before being placed in a clean and dry evidence
bag and the coke carefully placed in an evidence bag for
forensic analysis and to lift any potential fingerprints. Once the
evidence is bagged it needs to be carefully labeled with name,
8. date, time, and location of the evidence. Documentation is
essential to protecting the chain of evidence in order to ensure
the evidence can be used in court (Tidball, 2011).
Through the information obtained based on the physical
evidence and the answers to the interview questions the
investigators can develop an idea of how and when the crime
occurred. For example the security guard conducts his rounds at
11:45pm and again at 6am. Because the two way radios were not
missing on the security guards patrol at 11:45pm but where
missing at 6am the crime occurred between 12-6am. The police
will need to learn where the witnesses and any persons of
interest where during these times.
Another important clue gleaned from Travis Stevenson was
the robberies occurred within weeks of the two way radios being
installed implying someone from the bus compound is
responsible for the thefts or assisting someone else in the thefts.
This information is critical to investigators for developing
person of interests of criminal suspects. The alibis of all of the
workers and the security guard will need to be verified. Sally’s
alibi has been verified by her husband and she does not have a
key to the bus yard. This information could eliminate Sally and
her husband from the suspect list.
The investigators would need to question the security guard
about any suspicious activity he may have noticed on the nights
the two way radios were stolen as well as question the witnesses
to see if they had discussed the installation of the new two way
radios with anyone outside of work. Next investigators will
need to develop the physical evidence in order to determine if it
points to a specific suspect. Physical evidence can be invaluable
to the criminal investigation and provide definitive evidence of
a suspect’s guilt. The fingerprints can directly point to a suspect
and the footprints can tie a suspect to the crime. The coke can
that was located may contain DNA evidence or may have
fingerprints on the exterior.
Documentation is essential in every aspect of the
investigation. When creating a file investigators will need to
9. include the interviews conducted with witnesses, copies of their
statements, photographs of the crime scene as well as all notes
taken by the investigator. The file should include any forensic
reports and the criminal background checks conducted on the
witnesses. Much like when documenting steps taken to collect
forensic evidence documentation provides the court with a clear
picture of the events and provides documentation of the steps
taken by the investigators.
In any crime the investigation is essential to discovering
who was responsible. Investigators develop evidence through
witness testimony and gathering physical evidence at the crime
scene. Through their investigatory skills evidence is developed
that points to a specific suspect. If there is enough evidence to
show probable cause that a crime was committed the suspect
will be arrested and tried in a court of law. If evidence is
collected illegally or is not properly documented the result can
be the evidence is excluded from the court process resulting in a
guilty offender going free. The investigation is essential to
developing enough evidence to prove the guilt of the offender
and ensuring evidence is not excluded from the court process.
References
Goerman, R. (2010). How to Interview the Witness. Retrieved
November 5, 2012 from
http://robertgoerman.tripod.com/id21.html
Tidball, C. (2011). The importance of Chain of Custody and
10. Preservation of Evidence. Retrieved
November 5, 2012 from
http://findingmillions.wordpress.com/2011/02/22/the-
importance-of-chain-of-custody