Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Hi, I have an assignment and I'm still stumped, I need some examples to get it started and get a general idea of it. I

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed

Hi, I have an assignment and I'm still stumped, I need some examples to get it started and get a general idea of it.

I have attached the assignments below please try to give perfect ideas and example about the task.

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed
Building-Facility Basic Information! Seourity Survey Questionnaire J Risk Assessment Template Purpose and Requirements The requirements of your Maj or Project (Part A Assignment) involves three general steps. 0 First to identify a suitable locaonffacility that is willing to allow you to conduct a security evaluationfassessment, formally obtain permission to conduct the survey, and then to acquire the appropriate background information that will enable you to complete the remainder of your Major Course Project Part A and B. 0 Step two (create a quality security survey). The general, yet critical information you collected on the facilityr'company, should enable you identify and create an effective security focused questionnaire (survey) that will allow you to identify and evaluate the facility's existing security measures! status. (Note) You will only need to develop the questions that you are going to use in the survey, you will obtain and include the answers/responses in your Maj or Course Project (Part B). 0 Step three (identify a quality Risk Assessment). Your security survey and any accompanying information will then be used to complete step three Identifying a Risk Assessment Template which will be used to evaluate the existing security status and associated risk to assets at the facility. The administration of the actual assessment, scoring, and identification of the existing risk levels will be completed in your Maj or Course Project (Part B). Note two examples of Risk Assessments are Provided in your course material / CARVER and (R=W. Your security survey should include an extensive list of security questions (see example located in Blackboard) designed to enable you to complete a quality risk assessment to evaluate the current level of risk for multiple security threats to your company assets. This information and your completed assessment tool will be included when completing Part B of the Maj or Course Project. (NOTE) An example of a Security Survey Questionnaire can be found in your documents section of blackboard. Students will also be required to identify and develop a Risk Assessment Tool/Matrix that will be effective in evaluating the risk level to the overall facilityfcompany and to four signicant security threats in your Maj or ICourse Project (Part B). Two examples of risk assessments are also provided in your course. There is also a significant amount of information available on Riskahreat Assessments found in your course material and additional information can be found as needed in online sources addressing the topic. Note that the term Risk and Threats may often be used interchangeably when conducting research on Risk Assessments. Use the information available to guide your selection of a suitable risk assessment methodology for your chosen facility. You will determine the actual levels of Risk in your Maj or Course Project (Part B). Additional Guidelines Before proceeding the student should obtain permission from the facility's security point of contact to conduct the physical assessment needed for completing Part B. If you have a work location that you could use, that could be a great option. If not, you may know someone who owns or works at a potential location that could be used for the assignment. If these options do not exist, attempt to identify a business location that would be receptive to the assessment. If you are having difficulties, consider a public building/facility that you would have access to. Places of worship are often receptive to assistance with their existing security measures, particularly if you are a member of that congregation. Instructions Students should not use a homefresidence and should attempt to select a reasonably signicant building or facility. One that falls within one of the 16 critical in'astructure sectors would be ideal. For more information on these sectors, visit: hpwwwdhs.govlcritical-infrastructure-sectors. The building or facility must be located in an area in which the student can make one (and possibly two) site visits in order to conduct the security survey. This does necessarily mean that it must be located in your hometown but should be in a location that you would be able to gain access to. Students should make contact with the building/facility's security point of contact. Keep in mind that some facilities may be relatively small and the owner, president or even a worker may serve in this role. While the initial point of introduction may be on the phone, the student is encouraged to approach the point of contact face-to-face. When approaching the point of contact, students should explain the assignment that is being conducted (as part of a course project) and ask permission to conduct the survey. You are encouraged to offer them a copy of your finalized assessment and recommendations, if they are interested. To assist with the appropriate language for this initial meeting, refer to Attachment 1 below entitled "Sample Introduction Points." Your instructor/facilitator reserves the right to contact the point of contact listed on the deliverable to ensure permission has been granted. However, some locations do not want identifying information included in the report. We understand some locations reluctance to provide information and you are welcome to use a fictitious company name, address, etc. If you are using a fictitious number, note it on your submission. Major Course Project (Part A) Continued Following approval from the point of contact, the student should obtain sufficient information to describe the building, key assets and the facility's purpose or function as well as any key information that is available to the assessor which would be beneficial to the assessment. Ensure that the site knows that this information will not be shared anyone other than your Professor/Facilitator and it will be used for grading purposes only. The report should include information such as: a description of the site's size, zoning, boundaries, and landscaping; a description of the building, including any overpasses or subterranean passageways; the building's square footage, principal activities and usage, operating hours, and building population; nature of the surrounding area and occupancies; including the community in general. Information such as population, crime rates and other details are beneficial. Consider including information on general proximity to freeways, major roads, and public transportation terminals and stations. Include the location and/or estimated response times for law enforcement, fire fighters, EMS and other key emergency responders. Advise if there are any security personnel present or security technologies, obvious protective barriers, etc. Take note of any shortcomings andany security related issues or threats (particularly within the past five years) or other relevant concerns that will be needed when completing your (Major Project Part B). The inclusion of any available maps, floor plans, or site photographs should be noted and provided in your final submission (Part B) as well

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Information Systems For Business An Experiential Approach

Authors: France Belanger, Craig Van Slyke, Robert E. Crossler

2nd Edition

1943153019, 978-1943153015

More Books

Students also viewed these General Management questions