Expert answer:Paper Update and Revision

Solved by verified expert:Revise the attached individual project. Include in the final reiteration of this project
a basic threat assessment that will identify 2 significant threats to
Company Alpha and how your new security plan will address these threats.
Threats are impeding dangers or harmful acts such as theft,
shoplifting, medical emergency, disorderly group or crowd, workplace
violence, and so on.
studypool_security_management_u5_ip.docx

Unformatted Attachment Preview

Running head: SECURITY PLAN
1
Security Plan
Student Name
5th November 2017
Running head: SECURITY PLAN
2
Purpose
The following is the security plan for the company Alpha, a retail establishment that focuses on
the sale of consumer goods e.g. foodstuff, electronics, equipment and more. This document
describes the standard operating procedures that relate to physical, operational and cyber security
for the organization’s infrastructure, goods, and human resource. The plan draws from
contemporary security research and recommended practices. All company security personnel are
expected to familiarize themselves with the contents of this document, especially where it may
directly concern them.
Security system
The security system is the combination of physical, procedural and human resources that ensure
the security and safety of an institution or organizations assets (Fay, 2011).
The security system described in this document is chiefly concerned with securing the company’s
goods, facilities and employees from unauthorized access, theft or any other forms of harm. The
company owns a total of 10 facilities consisting of retail stores and warehouses. Each of these is
operated by company employees ranging from technicians to cashiers. Combined the stores and
warehouses house stock worth $100, 000, 000. In addition to this, the individual facilities are
connected to the company network and as such, contain critical cyber assets such as servers and
proprietary software.
Several security measures have been put in place to help in the fulfillment of the plans security
mission. These are:
Running head: SECURITY PLAN
3
1. Physical Security
1.1 Fencing & Gates
All company facilities and buildings have surrounding fences. The plan includes standardized 8foot fencing, with either mesh wire or using a stone wall for warehousing facilities. The
perimeter walls include two access points each for easy access in the case of large amounts of
traffic. The access points are opened and closed using standard heavy duty padlocks and are
manned, having a minimum of two security guards each. They are also equipped with CCTV
cameras.
1.2 Exterior Lighting
In order to guarantee proper lighting of key locations, lights have been placed strategically in all
the company locations. Some key locations are gates/access points, perimeter walls and building
entry points. A number of these incorporate motion detection technologies and will only come on
when some motion is detected. They serve as deterrents as well as a visual aid for security
personnel and CCTV cameras.
2. Technical security
2.1. CCTV
Each of the 10 company premises has been fitted with 30 CCTV cameras each operating and
being monitored 24/7. The cameras have Pan/Tilt/Zoom capabilities and are all connected to the
onsite security office. CCTV is useful in spotting unusual behavior as well as in the identification
of perpetrators (Fay, 2011). Surveillance data is shared with local law enforcement and the
regional dispatch center. The (Utility) has deployed over 100 CCTV cameras throughout the
Running head: SECURITY PLAN
4
county. The CCTV systems are all connected to the company headquarters via commercial fiber
optic cable where all surveillance data is recorded.
2.2 Electronic Access Control
The company incorporates a comprehensive Electronic Access Control system in all its
buildings. Key card technology is used to secure doors, gates and other access points. This
computerized system allows the security departments to track and control personnel access to
any facilities especially storage rooms, warehouses and server rooms and other critical cyber
assets. Employees are given identification badges which they are required to carry to work.
2.3. Intrusion alarms
Intrusion alarms are used for less frequented locations and incorporate motion detection
technology as well as other types of sensors e.g. glass break and window contact. Silent alerts are
also sent to security offices and local law enforcement in the case of intrusions. The alarms are
only activated when the rooms are empty or expected to be empty.
3. Operational Security
3.1 Security Guards
The company has contracted a private security company which provides security guards. The
guards perform patrols and occasional spot checks. A number of guards will be situated at the
various entry points.
3.2. Law Enforcement Support
Running head: SECURITY PLAN
5
The company leverages its strong relationships with local law enforcement agencies which help
in accomplishing is security mission e.g. through joint security exercises. Local law enforcement
agencies respond alerts made either through the intrusion alarms or explicitly by company
employees.
3.3. Policies
1. Key-cards
This policy concerns the issuing of key-cards within the organization. It covers the issuing,
usage, loaning, and duplication of key-cards. Key-cards are issued by the system administrators.
Issuing Authority – The following is the list of people that can authorize the issuing of key-cards
to employees.
i.
General managers.
ii.
Department heads.
Access control – Access keys can only access the areas specified by the system administrator.
Loaning and duplication – Employees are forbidden from duplicating or loaning of their assigned
key-cards.
Lost or stolen key-cards – Individuals who have lost their keys are expected to report the matter
to their department heads or the system administrator.
2. Cyber security
Running head: SECURITY PLAN
6
Employee terminals – Employees will be provided with a username and password to allow them
to access the organization’s computers and network. All terminals will be locked and can only be
used when the necessary credentials have been input.
Security operations will operate 24 hours a day for each day of the week.
Security Personnel
Each of the 10 facilities will be staffed with 60 moderately armed security personnel, with 20 on
duty at any given time: 2 guards per access points for each of the 2 access points in every
facility/location, 15 security personnel for the facilities’ buildings and for patrols.
The security guards will work 8-hour shifts but will be allowed short breaks in between e.g,
where two guards are present, one can leave his/her post for a few minutes, while the other
covers. However, each guard is allowed a limited number of breaks.
The first shift starts at 8 a.m. and ends at 4 p.m. The second shift starts at 4 p.m. and ends at 12
midnight. The final shift commences at 12 midnight and continues to 8 a.m.
1. Hiring and selection process.
To ease the burden of finding suitable personnel, the company will make use of a private security
company. However, each security personnel is expected to have had sufficient basic training in
security or other related fields. Suitable personnel will then get additional training from within
the company.
2. Training
Running head: SECURITY PLAN
The security guards will need to complete 24 hours of on-the-job training in order to be fully
fledged security guards. The selected individuals shall study the following topics:
a. Role of a security guard.
b. Legal powers and limitations.
c. Emergency situations.
d. Communications & public relations
e. Access control.
f. Ethics and conduct.
g. Report writing.
h. Overview of the incident command system.
i. Terrorism-related topics.
j. Review and examination.
The training shall be done by certified training professionals. However new guards shall be
mentored by senior security guards, who will be allowed to leave their stations for the duration
of the training.
Aside from this, security guards may get further training e.g. concerning the use of new
equipment or change of standard operating procedures.
7
Running head: SECURITY PLAN
8
References
Fay, J. (2011). Contemporary security management. Burlington, MA: Butterworth-Heinemann.

Purchase answer to see full
attachment

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP