Term Paper on "Organizational Security Plan"

Term Paper 3 pages (1490 words) Sources: 1+

[EXCERPT] . . . .

External Building Security should, in fact, be thought of as but one layer that secures the site, or the equipment, or even the system if looking at this from a computer-based model. Once the perimeter is secure, then threats diminish to the external building or product, preventing large scale or egregious access (Landoll, et al., 2005).

Internal Building Security

Once again, access control is an important part of any business, and anytime a business is under construction, it will be more vulnerable to threats and attacks. Certain areas in a building are a larger target and higher risk because of the information or assets within hat building. For internal security, technology experts recommend gates, lighting, cameras, detectors, sensors and other devices that can check individuals thoroughly and ensure they are authorized to be in the building, or in certain areas. Updating access codes and passwords and ensuring that the right access is given to the right people also helps minimize the vulnerabilities towards any organization. (Landoll).

Access Control and Protective Systems

According to experts, access control is the key and most salient feature of any security system. Access control keeps unwanted individuals from entering locations and from employees or personnel from leaving with any valuable information. There are so many vulnerabilities within the modern organization, that complete and robust, regularly discipline is required. The more people that have access to certain areas, the larger the threat -- the more people, as in a construction project), the more vulnerable the entire organization is. Technology allows for senso
Continue scrolling to

download full paper
rs, for fences and gates, but also for wireless access points and surveillance that is compact and far less expensive. Cameras do not take the place of security, but do allow the physical nature of personnel to be extended. Sensors are also a growing trend at access points. Many building have products that employees use during a day, but sensors used to keep track of the location of the tools and then to ensure they are stored properly, save thousands. Sensors can also be used at different access points to ensure nothing is removed from the building. Access control should also bleed over into computer access, and levels should be adequately password protected to keep individuals away from sensitive data. In addition, either an offsite or cloud backup should be used that is firewalled and secure so that there is no chance of losing 100% of the company's data. In general, the more technology is used, the tighter the security can become, and the more redundant systems become possible (Fennelly, 2012).

Estimated Budget

A security budget is entirely dependent upon the scope and complexity of the building or organization. Therefore, when extrapolating a budget, the usual manner is to look at the capitalization cost of the construction project, inventory and equipment. For our example, we will simplify the figure to $1,000,000.00. In this case, our basic security budget should run from $150K to $200K, or 15-20% depending on the stage. In that, initial fences and perimeters should be built in, there needs to be a budget for security, at least during off hours, and preferably some personnel during construction hours. If there are areas of high vulnerability, 30-40% of the budget, or $60-80,000 should go to monitoring equipment, cameras and basic sensors. In a $1M project, it is not likely that there will be much equipment that needs individual sensor protection, however, for just a few thousand dollars, equipment may be tagged with sensors much like those at department stores, which will buzz if taken through outward access gates. In a $1M project, the most pertinent security concerns would be focused on the initial security set up, authorization passes and protocols, camera and computer surveillance, and enough physical surveillance and protection to deter outsiders (Sans, 2012) .

References

Arta, M. (2006). Perimeter Security. New York: McGraw Hill.

Crockford, N. (1986). An Introduction to Risk Management. Cambridge, UK: Woodhead-Faulkner.

Fennelly, L. (2012). Handbook of Loss Prevention and Crime Prevention. Waltham, MA: Butterworth, 5th ed.

Frenkel, M., Hommel, U., & Rudolf, M. (Eds.). (2005). Risk Management - Challenge and Opportunity. New York: Springer.

International Organization for Standardization. (2009, January). Risk Management - Principles and Guidelines. Retrieved from iso.org: http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=43170

Wan, S. (2009). Service impact analysis using business continuity planning processes. Campus Wide Information Systems, 26(1), 20-42.

Landoll, D. (2005). The Security Risk Assessment Handbook. Boca Raton, FL: Taylor and Francis.

Sans. (2012). Perimeter… READ MORE

Quoted Instructions for "Organizational Security Plan" Assignment:

Organizational Security Plan

Write a 800- to 1,050-word paper that summarizes and integrates the following major concepts of physical security when creating an overall organizational security plan:

*****¢ Basic physical controls

*****¢ Perimeter protection

*****¢ External building security

*****¢ Internal building security

*****¢ Access control and protective systems

*****¢ An estimated budget associated with your recommendations

Format your paper consistent with APA guidelines. *****

How to Reference "Organizational Security Plan" Term Paper in a Bibliography

Organizational Security Plan.” A1-TermPaper.com, 2014, https://www.a1-termpaper.com/topics/essay/organizational-security-plan/2378519. Accessed 3 Jul 2024.

Organizational Security Plan (2014). Retrieved from https://www.a1-termpaper.com/topics/essay/organizational-security-plan/2378519
A1-TermPaper.com. (2014). Organizational Security Plan. [online] Available at: https://www.a1-termpaper.com/topics/essay/organizational-security-plan/2378519 [Accessed 3 Jul, 2024].
”Organizational Security Plan” 2014. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/organizational-security-plan/2378519.
”Organizational Security Plan” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/organizational-security-plan/2378519.
[1] ”Organizational Security Plan”, A1-TermPaper.com, 2014. [Online]. Available: https://www.a1-termpaper.com/topics/essay/organizational-security-plan/2378519. [Accessed: 3-Jul-2024].
1. Organizational Security Plan [Internet]. A1-TermPaper.com. 2014 [cited 3 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/organizational-security-plan/2378519
1. Organizational Security Plan. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/organizational-security-plan/2378519. Published 2014. Accessed July 3, 2024.

Related Term Papers:

Security Plan Case Study

Paper Icon

Security Plan

The Maryland public safety education and training center deals with firearms training, public safety and education, and drug abuse resistance. The center is located on a 700 acre… read more

Case Study 9 pages (2681 words) Sources: 6 Topic: Computers / IT / Internet


Enterprise Technical Infrastructure Security Plan Research Paper

Paper Icon

Enterprise Technical Infrastructure Security Plan

for ABBA Corporation

Information Technology Security: Implementation

The wrong it security plan can cause an enterprise millions of dollars of damages if breached by a… read more

Research Paper 6 pages (2249 words) Sources: 6 Topic: Computers / IT / Internet


Enterprise Security Plan Proposal Research Proposal

Paper Icon

Enterprise Security Plan Proposal

The objective of this study is to develop an enterprise security plan proposal which covers the ten domains of Information Security Common Body of Knowledge and… read more

Research Proposal 4 pages (1088 words) Sources: 4 Topic: Healthcare / Health / Obamacare


Security Policy Term Paper

Paper Icon

Security Policy

IT Security Policy

The following security policy defines how strategic it resources and technologies are aligned to supporting organizational objectives and goals. Implicit in this security policy is… read more

Term Paper 4 pages (1080 words) Sources: 4 Topic: Computers / IT / Internet


Organizational Technology Plan for Dell Term Paper

Paper Icon

Organizational Technology Plan for Dell, Inc.

In an increasingly globalized marketplace, identifying and seizing opportunities to capture additional market share becomes vital to a company's success. One company that has… read more

Term Paper 11 pages (3563 words) Sources: 8 Style: APA Topic: Business / Corporations / E-commerce


Wed, Jul 3, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!