WK6_Progress_SCMT390

docx

School

American Military University *

*We aren’t endorsed by this school

Course

390

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

7

Uploaded by JudgeBoulderWombat20

Report
ZZZ Corporation 1 ZZZ Corporation SCMT 390- AMU
ZZZ Corporation 2 Introduction Welcome to the security department of ZZZ Corporation, a leading defense company specializing in hardware and software development for various government agencies to enhance warfighter capabilities. With offices located globally, our organization employs a diverse workforce of skilled professionals dedicated to innovation and excellence. Because we are a defense contractor, we face a unique set of threats and hazards due to the nature of their work, which involves providing products and services to military and government agencies. Our organization employs a diverse workforce of skilled professionals dedicated to innovation and excellence. It is crucial to safeguard our physical and digital assets, ensuring that only authorized individuals can enter restricted areas or access sensitive information. We conduct risk assessments regularly to ensure we are protected from identified threats. The organization faces a vast array of threats and hazards. My responsibility as the security manager and my team of security professionals is to protect the organization from cybersecurity attacks, insider threats, espionage, and natural disasters. We conduct yearly assessments with local law enforcement agencies and our contracted asset protection services to ensure our security measures are employed and operating efficiently. These tests ensure that our security plan is effective and compliant with the policies and procedures we must adhere to (Coole et al., 2012). We want to ensure the asset is safe and secure. Moreover, our biggest asset is you. Our main campus here was selected because of the location. It allowed us to use Crime Prevention through Environmental Design when designing the facility and planning our defense in depth. We reduced costs by using the property's landscaping to establish natural surveillance and territorial reinforcement. Using the territorial reinforcement approach, the security manager can clearly define what is a protected area. The use of fencing, pavement, and signs clearly
ZZZ Corporation 3 indicate the boundary line to discourage potential intruders (Crime Prevention Through Environmental Design Guidebook, 2003). Clear sight lines, lighting, and observation techniques allow security professionals the ability to maintain a constant observation of the area. Natural surveillance is paramount because criminals do not wish to be seen. Natural access controls rely on physical elements that keep unauthorized people out of areas they do not need to be in. This will allow us to reallocate funds to other security systems to establish the layers of security you will see around the campus. Security Operations Center The Security Operations Center (SOC) plays a crucial role in safeguarding the defined asset and ensuring a safe work environment for employees, customers, and stakeholders. A SOC's primary focus is to monitor and assess the closed-circuit television (CCTV) system for threats and breaches. The security officers must constantly evaluate the security posture and performance of systems. Security officers must be well-versed in the procedures and technologies that promptly respond to security incidents. Security officers must also follow the protection plan created by security management, a well-defined plan outlining how to respond to different security incidents. The SOC acts as the brains to the brains for the detection systems. SOC operators identify and investigate security incidents, analyze the impact, and initiate appropriate response actions. They are also responsible for maintaining logs from the various detection systems to ensure compliance and maintenance. Security Management and administrators rely heavily on the SOC to monitor security events and alerts to detect potential security incidents, maintaining security tools and technologies such as Security Information and Event Management (SIEM), Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ZZZ Corporation 4 Defense in Depth The security manager must conduct a thorough land survey to determine the necessary barriers for establishing a distinct boundary between public and private property. Developing a robust exterior design that ensures site security against intruders and maintains visual appeal for employees is essential. The aim is to create a secure environment without the appearance of a prison. Wrought iron fence posts should be strategically placed in apparent areas and reinforced with high-tension cabling to prevent vehicular breaches. A 6-ft chain-link fence with a Y-top guard, grounded at least 2 inches deep, is recommended for the remaining perimeter. This fence line should include a clear zone for CCTV coverage and observation by roving security patrols tasked with maintaining the fence's integrity and detecting any signs of intrusion. Continuous 24- hour CCTV monitoring, with cameras equipped for pan, tilt, and zoom functions and fixed thermal cameras for motion tracking in dense vegetation areas, will ensure comprehensive surveillance coverage. Establishing Closed-Circuit Television (CCTV) coverage necessitates meticulous planning to ensure effective surveillance, contingent upon the specific needs of the building, required security levels, and financial considerations. It is essential to strategically position cameras to oversee key areas like valuable assets, entrances, exits, lobbies, and other critical zones for asset protection ("CCTV Technology Handbook," 2013). Additionally, CCTV coverage should extend to perimeter areas with overlapping surveillance, including vehicle entry and exit points and gatehouses, while minimizing blind spots by carefully considering lighting, obstructions, and camera angles. Utilizing various camera types, including those with pan-tilt- zoom capabilities and high resolution, ensures comprehensive monitoring. Fixed cameras at entrance and exit doors enable monitoring of individuals entering and exiting. Adequate training
ZZZ Corporation 5 for control room personnel is crucial to maximize system utilization. Secure network connections facilitate remote access to video feeds for real-time monitoring and recording for future review. Implementing a maintenance plan with scheduled checks, cleaning, adjustments, and firmware updates ensures optimal CCTV system performance. Furthermore, augmenting CCTV surveillance with roving security patrols enhances visual inspection and rapid response capabilities. Integrated Identification Technology The integration of identification technology has begun to play a critical role in detection systems. They combine various identification technologies such as biometrics, radio frequency identification (RFID) tags, and smart cards. This allows detection systems to accurately authenticate and identify individuals within a controlled environment (Smith & Brooks, 2013). To verify identity, biometric identification utilizes unique biological traits like iris patterns, facial features, and fingerprints. Smart cards and RFID tags store electronic data and can be used for access control and tracking. When these technologies are integrated into detection systems, they enhance security by providing efficient and reliable means of monitoring and identifying personnel and assets and increasing effectiveness and responsiveness to potential threats. Access control systems are implemented to manage and control physical access to an area or facility (FEMA, 2007). The highest priority is safety, with security a close second. As a security manager, you want to ensure that only authorized personnel can access the area. To prevent unauthorized entry, I would position card readers in all hallways or corridors that lead into office areas. Employees and contractors will be badged. Their badge will be encrypted, and their access token will bypass the card reader, giving them access to the area. If an area requires additional layers of protection, then a card reader, pin, and fingerprint will be used to validate
ZZZ Corporation 6 access. The areas with additional access control measures also require a fixed CCTV to watch the door. Visitors will be directed to the lobby for security screening and given a visitor badge. The visitor badge will let the employees know that the person has limited access and must always remain under the control of the escort. The security manager can create a more secure and controlled environment by employing physical access control systems. Conclusion In conclusion, implementing detection systems represents a critical need for security infrastructure. Integrating advanced technologies such as biometrics, smart cards, and CCTV surveillance systems plays a pivotal role in safeguarding the asset. An effective detection system relies on planning, deployment, and maintenance. Evolving security challenges require the detection systems to become adaptable. Leveraging detection systems effectively, organizations can mitigate risks, enhance awareness, and ensure the safety and security of their operational environment.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ZZZ Corporation 7 Fema.gov. Site and Urban Design for Security. (2007, December). https://www.fema.gov/sites/default/files/2020-08/fema430.pdf Crime Prevention Through Environmental Design Guidebook . (2003). National Crime Prevention Council. https://rems.ed.gov/docs/Mobile_docs/CPTED-Guidebook.pdf CCTV Technology Handbook. (2013, July). DHS. Retrieved March 15, 2024, from https://www.dhs.gov/sites/default/files/publications/CCTV-Tech-HBK_0713-508.pdf Smith, C. L., & Brooks, D. J. (2013). Security Science: The Theory and Practice of security . https://ro.ecu.edu.au/ecuworks2013/137/ Coole, M., Corkill, J., & Woodward, A. (2012). Defense in depth, protection in depth and Security in depth: a comparative analysis towards a common usage language. Edith Cowan University . https://ro.ecu.edu.au/cgi/viewcontent.cgi? referer=&httpsredir=1&article=1023&context=asi