Premium Essay

Cjs/250 Appendix G

In: Other Topics

Submitted By cleo421
Words 339
Pages 2
Associate Level Material
Appendix G

Security Assessment

Directions

Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.

Setting 1: airport security

| | | |
|THREAT |RISK |COUNTERMEASURE |
| |Probability |Criticality |Total | |
|Example: | | | | |
|Information theft |4 |7 |11 |Employee screening, limited computer |
| | | | |access, and computer monitoring |
|Bomb threat |6 |10 |16 |Security cameras, metal detectors, |
| | | | |and security searching bags. |
|Unattended baggage |8 |10 |18 |Security guards, secure…...

Similar Documents

Premium Essay

Appendix B Cjs 250

...Associate Level Material Appendix D The Three Models of Physical Security Directions: Read and study the description of an office building’s physical layout and its current security features in Part I. Then, answer the questions in Part II. Part I: Office Building Description A six foot fence secures the outer perimeter. Video surveillance is active on the north fence and inactive on the south. A manned guard station permits entrance into the outer perimeter from the west; an unmanned and unlocked gate permits entrance from the east. No Trespassing signs are posted at intervals upon the perimeter fence; Employees only is posted on the gate. Visitors must obtain a pass at the guard station. The outer perimeter contains the parking lot and office building. The perimeter has two light posts that, when functioning, illuminate the entire parking lot. Currently, the light post on the south side is not functioning. The office building exterior has three outer doors and one window. The first door is marked with an Employees Only sign and requires a badge for access. The second door is the main entrance for visitors and is manned by a guard, who requires a visitor’s pass for admittance. The third door is an emergency exit only and is clearly marked. Any attempt to gain access through the first door without a badge, the second door without a pass, or the third door at all, results in alarm activation and guard response. The window is locked from within; any attempt...

Words: 666 - Pages: 3

Free Essay

Appendix G

...Associate Program Material Appendix G Sequential and Selection Process Control Structure In the following example, the second line of the table specifies that tax due on a salary of $2,000.00 is $225.00 plus 16% of excess salary over $1,500.00 (that is, 16% of $500.00). Therefore, the total tax is $225.00 + $80.00, or $305.00. | |Salary Range in Dollars |Base Tax in Dollars |Percentage of Excess | |1 |0.00-1,499.99 |0.00 |15 % | |2 |1,500.00-2,999.99 |225.00 |16 % | |3 |3,000.00-4,999.99 |465.00 |18 % | |4 |5,000.00-7,999.99 |825.00 |20 % | |5 |8,000.00-14,999.99 |1425.00 |25 % | Ok number 3 if the excess is over $3,000.00 then that would be 16% of $236.00; therefore the total tax would be $236.00 +36.00 which would be $272.00 Number 4 if the excess is 5,000 then that would be 18% of $232.5; therefore the total tax would be $232.5 + 32.5, or $265.00. Number 5 if the excess is over 8,000 then that would be 25% of $570.00......

Words: 309 - Pages: 2

Premium Essay

Appendix G

...Appendix G Shirley Short ETH/125 10/21/2012 June Rizzo Throughout history, women have had fewer rights than men. At one time, women were not allowed to vote, women were not allowed to serve in the military, and women were expected to stay at home, clean, cook, and take care of the children, while the men were working and providing financial support for the family. Women also at one time were expected to dress and act a certain way, and were only to speak if spoken to; they had to obey their husbands. Women’s international center (2012) states that “wifehood and motherhood were regarded as women’s most significant professions” (paragraph 1). Today, women have gained complete equal rights. The women’s movements were successful and are to be thanked for that victory. Unlike years ago, women now are able to do whatever a man can do, if capable, they are allowed to vote, they can be the bread winners in the family, they can join the military, all around, they have the same rights as a man. Women still do face challenges, such as sexual assault, but there are now laws to protect them and make sure that justice is served. In society and in the media, masculinity and femininity are projected as an image. Women are expected to be thin, wear makeup...

Words: 430 - Pages: 2

Premium Essay

Cjs 250 Appendix G

...Associate Level Material Appendix G Security Assessment Directions Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat. Setting 1: School THREAT RISK COUNTERMEASURE Probability Criticality Total Example: Information theft 4 7 11 Employee screening, limited computer access, and computer monitoring Child Abduction 5 10 15 Doors locked from outside, security cameras throughout building inside and outside Earthquake/Fire 5 10 15 Extensive evacuation plan, install sprinkler system Firearm or Bomb 4 10 14 Metal detectors at all entrances, armed and unarmed guards, security cameras Drug sells/usage 3 7 10 Conduct random checks, have drug sniffing dogs do a check Internal theft 3 6 9 Security cameras Setting 2: Hospital THREAT RISK COUNTERMEASURE Probability Criticality Total Assault on a staff member 6 6 12 Security should be present on each floor Theft of narcotics 8 8 16 Keep a very strict log of...

Words: 288 - Pages: 2

Free Essay

Cjs 250 Appendix B

...Associate Level Material Appendix B Security Assessment Directions: Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat. This assessment is based on the Facts for Consideration on page _93___ | | | | |THREAT |RISK |COUNTERMEASURE | | |Probability |Criticality |Total | | |Example: | | | | | |Physical assault |9 |4 |13 |Highly visible officer presence | |Missing prisoners |4 |10 |14 |Check prisoners and count......

Words: 466 - Pages: 2

Premium Essay

Cjs/250 Week 1

...Lisa Bryant CJS/250 Check Point Week One: Historical Laws and Security Jenelle Velarde May 7, 2014 When it comes to historical laws and security, I have found that we tend to have the same kind of laws that they did back in time. However they also maybe revised to meet today’s society. We will be talking about six different historical laws which are The Code of Hammurabi, Draco’s Law, and Law of the Twelve Tables, Justinian Code, Magna Carta, and Statute of Westminster. The Law Code of Hammurabi (1750 B.C.) created by King Hammurabi, which was discovered in 1901. Also the quote “an eye for an eye” symbolizes the Hammurabi code. Which consist with the crimes that we have that gets disobeyed such as: slavery, marriage, theft, debts and commerce. Second law that I would like to tell a little about would be Draco’s law. Draco’s Law (621 B.C.) was named by the Greek citizen who they chosen to write the laws for Athens. Which consist of the death penalty, when someone has stolen anything from someone or murder someone Draco’s Law was given. Law of the twelve tables (450 B.C.) includes ten laws, then two more added later on. Law of the twelve tables came from ten men that were from Roman was given the power to write the laws. Which help form public and private laws foundation? Along helping to organize the prosecution where the victims could seek justice on whatever the person on trial done to them. However the law didn’t allow interclass marriages,......

Words: 530 - Pages: 3

Free Essay

Cjs Appendix G

...Associate Level Material Appendix G Security Assessment Directions Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat. Setting 1: School Security | | | | |THREAT |RISK |COUNTERMEASURE | | |Probability |Criticality |Total | | |Example: | | | | | |Information theft |4 |7 |11 |Employee screening, limited computer | | | | | |access, and computer monitoring ...

Words: 326 - Pages: 2

Free Essay

Cjs 250 Full Course - Introduction to Security

...CJS 250 Full Course - Introduction to Security http://www.learnyourcourse.com/cjs-250/83-cjs-250-full-course.html CJS 250 Full Course - WEEK 1 CJS 250 Week 1 CheckPoint - Historical Laws and Security CJS 250 Week 1 Assignment - Allan Pinkerton CJS 250 Full Course - WEEK 2 CJS 250 Week 2 DQ: - 1 - Security gaps analysis for real-life locations CJS 250 Week 2 DQ: - 2 - Consider the definition of security given on pp. 71-72 of the text. Can any target environment ever be 100% stable or 100% predictable? Why or why not? Why does the author stress that security efforts for any target environment will be a “never-ending process” and that security objectives will change over time? How can complacency pose a problem for security professionals? CJS 250 Week 2 Appendix B - Threat and Risk Assessment CJS 250 Full Course - WEEK 3 CJS 250 Week 3 CheckPoint [Appendix C] - Risk Management CJS 250 Week 3 Assignment - Security Objective Components CJS 250 Full Course - WEEK 4 CJS 250 Week 4 DQ: - 1 - While it may be ideal for security planners to utilize or install the latest technology, it may not always be practical. How do you think a security professional can balance the limitations, such as budget or space, of a particular environment with the need for keeping abreast of the latest industry technology and trends? How much knowledge of technology do you think security professionals should have? How broad or detailed should that knowledge be? CJS 250 Week 4 DQ: -...

Words: 679 - Pages: 3

Free Essay

Cjs/250 Final

...CJS/250 FINAL THE SECURITY PLAN DANIEL BATTLE 7/31/2011 7/31/2011 This store is a small convenience store called 24 Hours. 24 Hours is located 5 miles away from the local police station in Akron Ohio. This store is also located in a neighborhood with an extremely high crime rate. 24 Hours is open 24 hours a day with three separate shifts working from 6am-3pm, 3pm-11pm, and 11pm-6am. Because of the stores location they have a strict security layout and follow out orders to execute this plan on a daily basis. This plan consist of having a brinks truck come to them every 10 hours to pick up their cash income and it is to be dropped off at the bank, and to have all the employees on every shift to drop the money in a timed safe set for when the brinks truck comes to pick up the money. To have a set schedule and certain procedures followed as when to stock the merchandise only when there is no one in the store. The security features in this store include, has (CCTV) closed captioned television installed and lighting around the store including the parking lot witch is small. This store also has bars on all three windows including the pickup window three cctv cameras on the outside of the store four on the inside two alarms on both doors three round in corner security mirrors, five brightly lit lights around the store or posted on the outside perimeter of the store four light posts around the parking lot and four light posts on the inner diameter of the parking lot with a...

Words: 1458 - Pages: 6

Free Essay

Cjs 250 Appendix F

...Associate Level Material Appendix F Security Manager Interview Directions Contact a security manager and conduct the interview listed in Part I (space has been provided for extra questions, should you ask any). Once the interview has been completed, answer the questions in Part II. Part I: Interview Questionnaire 1. Can you briefly describe your current position, its duties, and responsibilities? Her duties include running her department smoothly, oversee her employees, making sure everyone is up to date with security procedures, hire and discharge employees, set up training and seminars, protect the public, evaluate personnel, and make sure that all systems are working properly. 2. What is your hiring procedure like for personnel? They must go through a psychological evaluation, and a screening process. They will be asked how they would handle different procedures and given a brief description of what type of environment they will be working in. Drug screening is part of the interview also. They will have to have a background check. During the interview Samantha really likes to get to know the individual because after all, this person will be representing this company. 3. Is there any type of pre-employment screening? Yes, explained above. 4. What qualifications do you require of applicants? Must be 18 years old with no criminal convictions, high school diploma or GED, must be able to pass drug screen and background check, credit check and good......

Words: 433 - Pages: 2

Premium Essay

Appendix G

...Associate Level Material Appendix G Ethical Actions Worksheet Write a 100- to 150-word response to each of the following questions: • Was there anything in either the University Of Phoenix Student Code Of Conduct or the Student Code of Academic Integrity that surprised you? If so, what was it? Why were you surprised? If not, why not? I wasn’t surprised at all. In the text that I read all of it has a great point with what it is saying. I agree with the text in both, University of Phoenix Student Code of Conduct and Student Code of Academic Integrity. What stood out the most to me was the little saying that said Ethics plus Choice equal Character. Everything that was written in both Students code of conduct is what you need to make right choices when it comes to schooling if you want to pass. It is good to read and to remind students who like to take short cuts and like to cheat on their work that it is not okay to do so, Even if they don’t get caught in the process it will still hurt them in the end because they haven’t learned anything. They just let others do the work for them. • What did you learn about the behaviors considered important for an ethical learner or student in the University of Phoenix learning community? I learned that you have to have a positive attitude and positive outlook on everything in school in order to achieve excellence. Behavior plays a role in everything that you do in your professional and personal life. If......

Words: 500 - Pages: 2

Premium Essay

Appendix G

...Associate Level Material Appendix G Ethical Actions Worksheet Write a 100- to 150-word response to each of the following questions: • Was there anything in either the University Of Phoenix Student Code Of Conduct or the Student Code of Academic Integrity that surprised you? If so, what was it? Why were you surprised? If not, why not? I was surprised about one and that was self-plagiarism, double dipping, or dovetailing. – Submission of work that has been prepared for a different course without fair citation of the original work and prior approval of faculty. Students who submit assignments that were previously submitted in another course are subject to the same consequences they would face if they plagiarized these assignments. The use of one’s previous work in an assignment requires prior approval from the current faculty member and citation of the previous work. The reason I was surprised was because it is your own work. It is what you have already learned. And this is saying you cannot use what you have already learned in one class for another class. I could see the self-plagiarism if you just copied it. But while taking the quiz it said you couldn’t tweak it or use it even if it fits the question in another class. That I am confused about. • What did you learn about the behaviors considered important for an ethical learner or student in the University of Phoenix learning community? What I have learn about the behaviors that are considered important...

Words: 474 - Pages: 2

Premium Essay

Appendix G

...Associate Level Material Appendix G Ethical Actions Worksheet Write a 100- to 150-word response to each of the following questions: • Was there anything in either the University of Phoenix Student Code of Conduct or the Student Code of Academic Integrity that surprised you? If so, what was it? Why were you surprised? If not, why not? There was nothing that really surprised me about the University of Phoenix Student Code of Conduct or the Student Code of Academic Integrity. These are simple rules that everyone should follow on a day to day basis. Anywhere someone goes there are always going to be rules and regulations to follow. If students are not able to conduct themselves in a respectful and honest manner, then the University of Phoenix is not the place for them. If students are able to follow the simple rules that are set forth by the University of Phoenix then they make their time at the University of Phoenix much easier. However, if faculty and staff where to do the opposite, then of course they only make it harder for themselves. Decisions that we make as students and faculty members can have a big effect on us in the future. • What did you learn about the behaviors considered important for an ethical learner or student in the University of Phoenix learning community? I learned that to be an ethical learner requires a person to be honest. We should behave in an appropriate manner and make proper choices...

Words: 512 - Pages: 3

Premium Essay

Appendix G

...University of Phoenix Material Appendix E Part I Define the following terms: |Term |Definition | |Racial formation |The process where individuals are divided and categorized by mutable rules into different racial | | |categories. | |Segregation |The act of separating individuals from a main body or group. | |De jure segregation |It is a real segregation or isolation of individuals from a main group which is imposed by law. | |Pluralism |It is defined as a condition, where different groups culturally, ethnically or religiously are | | |present and are tolerated in a given society. | |Assimilation |Is to adapt or confirm one’s self to a new different environment. | Part II Answer the following questions in 150 to 350 words each: Throughout most of U.S. history in most locations, what race has been the majority? What is the common ancestral background of most members of this group? Throughout American history the white race has been the majority because it included the Hispanic Americans as...

Words: 808 - Pages: 4

Premium Essay

Appendix G

...Associate Level Material Appendix G Ethical Actions Worksheet Write a 100- to 150-word response to each of the following questions: • Was there anything in either the University of Phoenix Student Code of Conduct or the Student Code of Academic Integrity that surprised you? If so, what was it? The Student Code of Conduct seems like it is mostly for an on campus life. People might break more rules if they were actually on a campus. Whereas I am an online student. You can still break the rules by not complying with telling the truth on you applications for federal funding on loans. As in falsifying third party information. Also if you were to not follow the Code of Academic Integrity you would also be breaking a rule of conduct. Also I did not realize that you can actually self-plagiarize yourself. But I see how some people might be able to try that. Although even in an online environment you still have to keep a professional code of ethics, • What did you learn about the behaviors considered important for an ethical learner or student in the University of Phoenix learning community? Being an ethical learner means being honest and true to yourself. Lying and cheating only ends up hurting the person doing the lying and cheating. You are here to learn and if you cheat you only end up cheating yourself. It not only hurts you in the long run and will follow you into whatever profession that you decide to take on in your life. Every students work......

Words: 450 - Pages: 2