Describing security -vulnerability assessment

Assignment Help Basic Computer Science
Reference no: EM132932238

describing security needs and analyzing how you would meet those security needs for a type of organization. You will assume that an organization is renovating and/or redesigning the space for this organization, and it is your job to choose and implement the security measures.

I have chosen four types of organizations. You choose one type. I have included an example of the size and location of the physical building, the number of employees, and assets on hand, but you will also need to fill in detail about features, other staff, or other materials present.

Small community bank branch-a stand-alone building, one floor, about 2,500 sq. ft., located in a residential neighborhood. The bank is on a corner lot, so it is bordered by a major street, a quiet street, a parking lot, and other businesses. The bank employs 8 full-time employees, including a branch manager, customer service specialists (financial planning, loans), and tellers. The bank lobby for the public has teller windows, while the interior has cash drawers for the tellers and small offices with computers and other office equipment. The bank holds around $40,000 in currency and other valuables. The bank also has a drive-up teller window and a drive-up ATM on the south side of the building.

Small private college-a cluster of three buildings and a large parking lot located at the edge of town. The neighbors for campus include a residential area, a few stores, and agricultural fields. Each building has 3 floors, about 5,000-7,000 sq. ft. in size, and they have 2-3 public entrances each, in addition to at least one private entrance. They include stairways, public restrooms, elevators, classrooms, and private offices. One of the buildings houses extensive computer systems/network (imagine the latest technology). This building also houses a small library and study rooms with laptop check-out services. This very small college specializes in accounting, business, computer applications, and networking degrees. The college enrolls about 300-400 students per semester and employs 25 full-time faculty. There are also a few administrators and dozens of staff.

Jewelry Store-an attached building, 1100 sq. ft., where both sides of the building share walls with neighboring stores. The building is one story with access to a flat roof. The interior of the store includes a public showroom with cases for showing the inventory, a touch monitor for customers to browse special-order merchandise, a cash register, and a desk and seating area for advising customers on credit processing. The back has offices, storage areas, and a door to the back alley. At any time, the store might carry $20,000 dollars' worth of inventory and $500-$1,000 cash. The back-office space includes jewelry servicing tools.

Factory manufacturing computer chips-this is the hardest building for someone to describe who lacks expertise in the manufacturing process, but it would probably be very large, needing separate areas for manufacturing, research and development, product quality testing, and offices for management, finances, human resources, and payroll. Imagine hundreds of employees, a large variety of equipment and computer systems, and outside, either no neighbors or far-away neighbors, but there is an on-ramp for a major highway close by. The building would need one or more parking lots or parking garage and design your own fencing and gate systems.

Part 1:

· Explain what a vulnerability assessment is.

· Identify which organization you chose and conduct a vulnerability assessment for this organization.

o In the assessment, identify what is valuable and why it is valuable.

 The valuable items might be objects, information, people, etc.

o Consider these valuable items as the targets. Identify what threat agents pose a threat to each target.

 Include internal threats (employees, students)

 and external threats (people from the outside like customers, students, and vendors, as well as con artists, burglars, violent offenders, etc.)

· Conduct an assessment of the neighborhood/surrounding area. Consider the public's perception and interaction with this organization's space. Apply the principles of CPTED physical security.

Part 2:

Describe and design the security exterior and interior needs and access system. Follow the order of the list below-use paragraphs and not a bulleted list. You must explain in detail your choices of materials, technology, and security personnel employed (as appropriate). You must also justify all your choices, explaining how they are the best choice to effectively guard against the anticipated threats. Make sure the cost of the security system doesn't outstrip the value of the assets.

Include your choices and justifications for each area below. Each choice must be specific to the organization you chose. Each area includes examples of how needs might be different depending on the organization. Some of these choices will need more detailed choices and explanations than others depending on your choice of the organization but include detailed explanations as often as possible.

- Basic color design of exterior and interior, landscaping (be brief and specific to CPTED)

- Fencing (most appropriate for manufacturing plant and may not be possible for jewelry store)

- Glass-limit to the exterior windows and doors (different glass might be needed for a bank vs. a college, for example; include locks and other window security as needed)

- Doors-external to enter building and within building, like offices or sections (strength needs; locks)

- Access Control Systems-like identification badges, what type of badge, how it secures access, why used; also describe levels of secure areas; biometrics if applicable, where would this be used and for what levels of security (pay extra attention to this area with a choice of the factory)

- Alarm Systems-sensors, include type and location; video or other surveillance and recording; how alarm systems are monitored (pay extra attention to this area with a choice of a jewelry store or bank; for college, different campus buildings/areas of buildings might need different levels of security)

- Security Lighting (what needs to be visible at night?)

Reference no: EM132932238

Questions Cloud

Which benefits paid from personal health insurance are : Which Benefits paid from personal health insurance are? taxed based on the individual's annual gross adjusted income./exempt from income tax
How much will he have to invest today : Mark Harris is considering an investment that pays 7.50 percent, compounded annually. How much will he have to invest today
Which group health plans must : With regard to dependent coverage, group health plans must? offer coverage for dependents at the same rate that the parents pay.
What the Vaughn net income : Cash dividends paid on common stock was $107500. Based only on the information given above, what the Vaughn's net income for 2021
Describing security -vulnerability assessment : Describing security needs and analyzing how you would meet those security needs for a type of organization. Explain what a vulnerability assessment is.
How much profit can make if buy or sell one aud : 1 USD = 108.00 -108.10 JPY. Bank B quotes me 1 AUD = 75.2500 -75.3500 JPY. How much profit can make if buy or sell 1 AUD with Bank B and Bank A?
How much will the CD be worth at the end of five years : Matthew Young is investing $8,000 in a bank CD that pays a 7 percent annual interest. How much will the CD be worth at the end of five years
What is the portfolio return : You own a two-asset portfolio, with 64% in Stock A and the remainder in Stock B. Stock A has a return of 12.58%. What is the portfolio return
Which is not true regarding interest rate futures contracts : Which is NOT true regarding interest rate futures and forward contracts? A bank quotes me the following foreign exchange and interest rates.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What might be the adaptive value of sea turtle migration

What might be the adaptive value of sea turtle migration? Consider how this adaptive value has changed if, as a result of human activities, migration

  Aligning security with business objectives

The security policy of an organization is not an one-for-all solution; it varies with the organization. As you begin your exploration of information.

  Business intelligence to gain dominance

Which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry.

  Male or female and where the offender was convicted

A researcher collects data on victim gender male or female and where the offender was convicted.

  Discuss what external factors contribute

Discuss what external factors contribute to how we make decisions about IT security and what measures need to be taken to stay updated on these external factors

  Designing team and team identity

Discuss team identity. Why do you feel attached to certain groups and teams but not to others?

  What other ways can roberto protect the law firm network

What other ways can Roberto protect the law firm's network resources from outside attack? Which protective measures do you consider too restrictive? Why?

  Conceive ourselves in relation to nature

Describe some effects that cybertechnology has had so far for our sense of self. Questions to think about as you write: In the age of information how are we beginning to conceive ourselves in relation to nature?

  Most common types of attacks and threats

Responding to these questions in a page long. Why is it important to understand most common types of attacks and threats?

  The most common file types imported into excel

Which of the following is one of the most common file types imported into excel

  Settle price will you get a margin call

Your initial margin was $4,200. Your maintenance margin is $2,500 (meaning that your broker leaves you alone until your account balance falls to $2,500).

  Policy and modeling in complex world

Policy and Modeling in a Complex World

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd