Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

Paper 5: Specialized Risk Assessment Methodologies (2 pages, 3 references)

This week we further study vulnerability and risk assessments. We especially focus on risk
reduction strategies, evaluating impacts, and risk management decisions.

The following list represents some specialized risk assessment methodologies.

 American Petroleum Institutes Security Vulnerability Assessment methodology for the


Petroleum and Petrochemical Industries
 The National Institute of Justice: A Method to Assess the Vulnerability of U.S. Chemical
Facilities
 Sandia National Laboratories Security Risk Assessment Methodology for Water Utilities,
Chemical Facilities, Communities, Transmission, Prisons and Dams.
 The American Society for Industrial Security – International’s General Security Risk
assessment Guideline
 The Federal Emergency Management Agency’s Reference Manual to Mitigate Potential
Terrorist Attacks Against Buildings
 The Center for Chemical Process Safety’s Guidelines for Analyzing and Managing the
Security Vulnerabilities of Fixed Chemical Sites
 The National Institute of Standards and Technology’s Risk Management Guide for
Information Technology Systems
 Microsoft’s Security Risk Management Guide
 Threat Analysis Group’s Risk Assessment Methodology
 The National Fire Protection Association’s Guide for Premises Security
 Sandia National Laboratories Risk Assessment Method – Property Analysis and Ranking
Tool
 The Illuminating Engineering Society of North America’s Guideline for Security
Lighting for people, Property and Public Spaces
 The United States Military’s CARVER Methodology (Criticality, Accessibility,
Recoverability, Vulnerability, Effect, Recognizability)
 The Untied State Air Force, DSHARP Methodology (Demographics, Symbology,
Historical, Accessibility, Recuperability, Population)

Select any two of these methodologies and compare and contrast their methodologies by
analyzing their value for the specific industry with which the methodology applies and the
common elements of each methodology that could be used as the top three best practices.

Organize your post by using the below table as a model. Credit is given for complete and
detailed answers.

COMPARISONS
METHODOLOGY METHODOLOGY
AND
#1 #2
CONTRASTS
1. Name of
Methodology
2. Applicable
Industries or
Enterprises
3. Major
Components of
Methodology
4. Evaluation of
Components
5. Common
Elements of Each
Methodology
6. Top Three
Best Practices
from
Methodology that
Could Be
Applied to Other
Security
Assessments
(Describe in
detail the best
practices and how
they could be
applied to other
security
assessments.))
7. Other
Comments

No other posting is required for this week.

Paper 6: Information Technology Risk Assessment (2 pages, 3 references)

For this week’s discussion question, in addition to the assigned readings, scan the Insider Threat
Mitigation Guidance pdf available in course “Content” for Week 6.

We consider the insider threat case involving U.S. Army Private First Class Bradley Manning,
the intelligence analyst convicted of disclosing thousands of secret documents and sentenced to
35 years in prison.

View the PBS FRONTLINE video online at the following website:

http://www.pbs.org/wgbh/pages/frontline/wikileaks/
In your first posting:

1. Based upon your readings and the documentary film, note the threats, vulnerabilities, and
risk assessment (information compromised) and provide your theory about how the
military intelligence system failed to prevent and detect Bradley Manning’s breach of
security? Your discussion should include comments on such areas as vulnerabilities,
policies, and procedures.
2. Provide your suggestions for control recommendations with risk mitigation options and
strategies to assure such a security breach is prevented.

Paper 7: Prevention and Security Measures (2 pages, 3 references)

This week we study prevention and security measures.

Note that there are two learning exhibits for the discussion question. The first is a video on the
key principles of Crime Prevention Through Environmental Design ("CPTED"), the analysis of
security risks, and examples of the strategic application of those principles.

View the video by going to this link: http://www.youtube.com/watch?v=CF_V2S6i30c

The second exhibit is the attachment. This is a CPTED survey developed for evaluating
convenience stores (top) and residential areas (bottom). Use this as a helpful example of a
security tool to complete a comprehensive assessment and create an effective security design and
plan.

For your first posting:

1. Select a nearby park area or convenience store and complete a CPTED survey.
2. For the Title of your post, please note the place you have selected.
3. Report the summary of your results in your first posting and specifically focus on the question:
What did your CPTED survey reveal and what CPTED changes would you make and why?
4. As a second part to your posting, create a heading "Security Measures: Policies and Procedures."
Provide the security measures in terms of policies and procedures that should be enforced for
the facility that you selected.

Paper 8: Security Technology (2 pages, 3 references)

For our discussion question, we focus on recent trends in security technologies and security
operations. Staying current with various security tools is an important characteristic of a
proficient security manager.
One method to discover new technologies is to attend security related conferences and network
with other security professionals about current and trending best practices.

For your discussion question, choose two relevant and recent physical security technologies and
describe them. As part of your detailed description, provide:

1) Specific information about the technology's function and application;

2) The type of facilities that the technology would be best suited for;

3) The assets that the technology would best be used to protect;

4) The likely vulnerabilities that the technology would best address;

5) Methods in which the technology would be integrated with other technologies;

6) The number and type of personnel that will need to be committed to the operation of the
technology;

7) Special considerations for policies and procedures to fully implement the technology; and

8) A likely budget needed to implement the technology.

If you are impressed with a particular security technology that your organization uses, share it.
Include any relevant hyperlinks and attach any pictures if applicable.

Here are some security categories of technologies that you may select. Please make sure your
posting covers a specific technology rather than a broad category:

 Intrusion Detection
 Screening Technologies
 Access Control Technologies
 Assessment/Surveillance Technologies
 Communications Technologies
 Central Control Technologies
 Security Lighting

Make certain that you do not duplicate another student's contribution. You can select a
“different” technology from the same category.

Paper 9: Personnel (2 pages, 3 references)

Good managers realize that any organization is as only good as its people and employees'
potential will likely reach no higher than their leaders’.

This week we consider two mini-case studies:


Case #1:

A person has applied to be a bouncer (which is a licensed security position) at a large nightclub.
He placed nothing on his application disclosing a previous arrest. The detective in charge of
licensing completes a record check and discovers that the applicant has been arrested for assault
on his wife about three months ago. His wife received medical attention. He was in jail
overnight, released the next morning and there was no conviction since the wife left town (and
has not returned in fear of her husband).

The application comes to you as the security manager with the detective recommending not to
approve the application given that applicant failed to disclose the arrest (although he was not
convicted). The applicant is otherwise qualified.

For this discussion question, you are in charge of security at the nightclub. What should you do?
Explain the factors supporting your decision.

Case #2

Your second question is to challenge you to think in terms of the subject matter you have studied
and applying it to the unique security assignment to demonstrate that different assignments may
require a different qualification in terms of character, training, pay and experience.

For this question, discuss from your perspective as the director of security, the kind of security
personnel you would want to employ to work as security mid-level managers for the Olympics or
similar large sporting event or political rally. Discuss the requirements for character,
competence, commitment, compensation, and experience.

You should provide a description of the methods to recruit, select, train and supervise. Also,
provide insightful comments about the unique qualifications needed for these kind of security
personnel for such an event.

Keep in mind the kinds of threats that such an event would attract and the critical assets that must
be protected.

For your reference, you may also want to consider the attached pdf entitled, "Identifying High
Talent in the Workplace."

Paper 10: Premises Security Liability and Forensic Security (2 pages, 3 references)

Our focus is on liability that security managers may face in supervising effective security
programs. Shielding the organization from lawsuits by avoiding inadequate security claims is
part of the responsibility of security managers. Effective security planning can mitigate such
risks.
For our discussion this week, we consider a case involving the security assessment of a parking
lot at a commercial establishment. These are areas are often found to have vulnerabilities in
terms of reasonably foreseeable threats and where customers or guests may become crime
victims.

Consider the following Wal-Mart case. Review the case and note the applicable legal liability
principles and factors that are important in determining whether the case should be decided for or
against the plaintiff. After you have addressed the application of the legal principles to the
relevant facts, provide your well-reasoned conclusion and opinion about how the case should be
decided.

If you decide that Wal-Mart is legally liable, what do you believe they should settle for?

Also, note what you believe a business like Wal-Mart should provide as reasonable security
measures to protect their employees, customers and their property?

Wal-Mart Sued By Abductee's Husband

By Kenneth A. Gailliard, The Sun News

CONWAY - The husband of a Galivants Ferry woman is suing Wal-Mart for $10 million more
than three years after two men abducted her from the parking lot of the retail giant's Conway
store and killed her.

The lawsuit accuses Wal-Mart of negligence and carelessness that resulted in Alice Donovan's
injuries and death.

Donovan's husband, Barry, declined comment Wednesday, and his lawyer, Geoffrey H.
Waggoner of Charleston, could not be reached.

Donovan has asked for a jury trial. No date has been set.

A pair of jail escapees abducted Donovan immediately after she drove into the Wal-Mart
parking lot off U.S. 501. They then forced her to drive away from the parking lot in her car and
into Brunswick County, N.C. They later killed her. Her body has not been found.

Federal juries convicted ChadrickFulks and Branden Basham of her murder. Fulks received
South Carolina's first federal death sentence, and Basham received the second.

Allegations in the lawsuit include that Wal-Mart failed to adequately monitor and control its
premises, to effectively protect its patrons, to warn patrons of the nature and extent of crimes
committed on the premises, and to ensure that existing security procedures were followed.
The suit also says Wal-Mart should have been aware of the potential for violent crimes to happen
in its parking lot.

Wal-Mart spokesman Martin Heires said the company secures its parking lots, though he did not
elaborate.

Premise liability suits are common and around 90 percent of them result in settlements.

Donovan drove into the store lot about 2:30 p.m. unaware the men who pulled in behind her
were escapees from a Kentucky jail riding in a stolen truck they wanted to ditch.

When she pulled into a parking space at the store, Basham jumped from the truck, got into
Donovan's BMW and forced her to drive to the back of the parking lot.

There Fulks abandoned the truck and the two men forced Donovan to drive away. Police said the
men drove her into Brunswick County, N.C., later that day, but police have not been able to
determine where they took her.

Both men gave police several stories about her whereabouts, and extensive searches were
conducted for her in North and South Carolina.

Prior to kidnapping Donovan, Fulks and Basham were in West Virginia, where they kidnapped
and killed college student Samantha Burns.

Both men received life sentences in that state for Burns' death.

For this discussion question, there is one case study problem this week for you to read, consider
and respond to.

Paper 11: Ethics in Security Consulting – Sanford County School System (2 pages, 3
references)

You have been requested by the relatively new School Superintendent, Mary Thompson,
to do an analysis of the school security system. The reason she requested you to do the study is
that you came highly recommended by their police chief and also, after speaking with other
references, she is confident you can assist in making some positive school security changes.

Ms. Thompson recently was selected as School Superintendent by a margin of one vote
by the School Board made up of seven members. The current School Board is characterized
with a lot of political in-fighting and a number of the school board members would like to see
Ms. Thompson fail so their local choice for school superintendent can be appointed.

The last school superintendent retired about one-year ago after being aggravated by
negative publicity to the press encouraged by a few school board members following a series of
school vandalism incidents costing thousands of dollars. Moreover, a school security guard was
arrested by the police for selling drugs to a student. School security has become a higher
priority for both the Superintendent and the School Board.

In Ms. Thompson’s fourth month as school superintendent another 23 year old security officer
was accused by a parent with having sex with a female student. The security officer resigned. It
was determined that no assault had occurred and the student was over the age for a statutory rape
criminal charge.

Many board members remain contentious and several have recently stated in the press
that they did not want a consultant study to shift the blame from the school administration.
Instead, they demanded that both the head of security and the new School Superintendent be
fired. They complained that Ms. Thompson had dismissed the head of security for the sex
incident. Of course, the public is upset and the recent parent teacher association (PTA) meetings
have had much heated discussion creating continuing controversy and political pressure.

Before beginning the consulting assignment you meet with the School Board and
Superintendent. Some members of the school board advise you that they think the school district
cannot afford the study and for you to contain the cost. They emphasize try to save money, don't
find more ways to spend it. The amount for the contract is already agreed, and despite what the
few say, it is reasonably priced. Board members also state that when the report is released they
will make sure it goes to the press as if warning you to be careful.

After the meeting, two Board Members call you to say that they know the problems with
security are a lot deeper than anyone thinks, although they will not give you anymore
information. You question their motives in calling you; especially since in neither case did they
offer specifics or sources of information for you to follow-up on.

After the meeting with the Board you meet with Ms. Thompson. She frankly tells you that
her job is on the line and she needs your help to find out what you can to provide some direction
for improving the school security system. The Chief of Police, and your reading back issues of
the paper plainly support what the School Superintendent is telling you. Ms. Thompson also
adds that when she was first hired and during the second month at the School Board meeting, she
requested that the Board approve payment for a school security study by an outside expert. The
same Board members who opposed her selection also opposed allocating funds for the security
study. You sense that although Ms. Turner is impatient with certain members of the board, her
true goal is to improve school security.

Ms. Thompson adds that the security supervisor is also newly hired since the last head of
security was recently fired for the drug incident. The sex case is recent and from a police
investigation, requested by her, they found no due cause to fire the security supervisor. Any sex
between the security guard and student by all indications was after school hours and while he
was off duty. She did not want to fire him, “just to appease the wolves.”

The school system has 21 schools and 10 security personnel. Only the four middle
schools and two high schools have full-time security officers. In addition, the high schools also
have a police liaison officer (school resource officer). She asked that you do a full study about
the leadership, management and supervision, policies and procedures and operations. She
requested that you also detect and identify any inefficiency so that staff could be reduced to save
money in the budget since the Board is looking at significant budgetary cuts for the next school
year. She also said, if there is a need for increase in costs to improve security she wants to know
that as well, although she can't see the School Board approving it without clear justification.

You asked to have access to all budget documents, personnel records, policies and
procedures, and of course, the granted authority to interview security staff, and school personnel,
in private with confidentiality assured. She agrees.

Two months have lapsed. You have reviewed everything in terms of budget documents,
security plans, personnel files, operations, etc., including interviewing all 8 security staff (two
have yet to be replaced). Part of the interview included discussions with the police school
resources officers, principals of each school and selectively some teachers. The draft report that
you have developed is 40 pages in length broken down in a review of the security plan, security
staff, management and leadership and budgetary considerations.

Your report notes there are several CPTED changes that need to be made on school
premises from removing certain shrubberies and adding a fence around the middle-schools with
lighting and cameras. This will reduce school vandalism and possible other problems. Also, you
note the need for security officers to work more in the parking lots before and after school to
monitor students, however more importantly, to keep non-students from coming on campus.

You have uncovered some information that some drug deals are happening in the parking
lots and some students even smelled pot usage. The previous security guard arrested for selling
drugs evidently was being paid by a gang to give them access to students and for him to simply
do nothing.

Existing policies and procedures and routine operations have interfered with security
officers being effective in the parking lots since security officers are routinely posted at the main
door entrance and around the buses. All students must enter the main school door at the
beginning of school, although they can use multiple exits when leaving.

Although three security guards work at night patrolling back-and-forth to the school
premises, there are not enough security guards to cover the parking lots and monitor door
entrances. Your report states that both high school parking lots must have no less than one
security officer present before and after school, as well as during large school athletic events.
This is going to cost the school at least another $50,000 to provide the additional security
coverage in parking lots. The police cannot assign anymore officers to support the schools.

Of course, your report addresses how the security plan missed several threats and
vulnerabilities and how those risks may be reduced to protect critical assets of people, property
and information. You also addressed how police and security can work more closely regarding
certain developing problems with gang intimidation and rivalries that are appearing on campus
over the last two years.
The security officers receive little if any training, including the new security supervisor.
You note that has to change and make some good suggestions. The highest priority suggestion,
however, is that you found through reliable information provided by two security officers, each
wanting to remain anonymous, that one of the older security officers with 15 years tenure has on
more than one occasion been found with alcohol on his breath coming off duty. On another
couple of occasions he has also been found sleeping in the boiler room of the middle school.

What exacerbates the problem is that a few officers are evidently covering for him, and it
is assumed although you have no direct proof, those who cover for him “go ghost,” themselves
since they are all on night patrol. Again, all these men work on the night patrol, and of course,
there are vandalism problems that reoccur at the schools often happening at night. You provide
information how the security supervisor through placed hidden cameras can verify these
allegations of sleeping on duty, along with some other investigative measures.

You are then scheduled to meet with the school superintendent. In relation to the report
and that meeting, please respond to these questions supporting your position using guiding
ethical principles:

1) Knowing your report will be going to the school board and be inevitably released to the
public, is it ethical to simply tell the School Superintendent about the alcohol problem and likely
problem with security officers sleeping on the job, or should that be written in your report?

2) If you had noted the above in writing the draft of your report and the school superintendent
asked that you take it out, especially about the alcohol matter, and she said she will deal with the
personnel problem without all the publicity, would you agree? If, you answered “yes,”, under
what conditions and why is that ethical. If you answered, “no,” why is that ethically responsible
(especially since the school superintendent believes she will likely lose her job and the employee
will have to endure public shame)? His personnel file notes that he has been an exceptional
employee up until the last year when he lost his wife to cancer and son in an automobile
accident). What should be your position in disclosing this information to the School Board? To
the public? To the media?

3) Your report underscores the need to add more security personnel for the parking lots, while
keeping security at the main doors at the high schools since weapons related to emerging gang
rivalries are at risk to be brought on the premises. You already provided the “tuck-in-shirt”
policy and some other anti-gang policies. The school superintendent, wanting to keep the budget
under control, asks that you change the wording in the report from being highly recommended to
a suggested option. She emphasizes one of your assigned objectives was to help reduce security
costs, now the report is calling for an increase in funds. She will be ridiculed. She recommends
that your report be reworded so that these additional costs are only a mild suggestion. She
promises if you do this she will hire you next year to help totally re-write the security plan and
she will support it.

DISCUSSION QUESTION: Ethically, should you change the report language and sense of
priority for this security measure? Ethically, why, or why not?
4) After discussing the report, the School Superintendent has you meet with the School
Supervisor with her in private. The Supervisor asks you who were the security officers that
provided you the information about the alcohol and sleeping on the job? The Superintendent
says it would be helpful to know the identity in order to handle this serious personnel matter.
They tell you they will not tell anyone. You told everyone privately spoken with during your
staff interviews that everything that they shared with you would be held in confidence. Would
you share their names? Why, or why not?

 Organize your ONE ORIGINAL RESPONSE this week by outlining: Question 1,


Question 2, Question 3 and Question 4. Please thoughtfully address each one with your
ethical responses while supporting your decision.
 Make certain you constructively resp

You might also like