Case Study #1
Kristian Lauren R. Martin
November 6, 2011
Case Study #1
Building the Foundation – Security Assessments
As the security manager of a major corporation tasked with creating the initial security assessment and auditing program for the company, the first step in developing proposals for the security services would be conducting a comprehensive survey (policies, procedures and operations) of the entire facility to identify the critical factors affecting the security of the premises (Broder, 2006). The next step would be to analyze the vulnerabilities and recommend protection which is cost-effective (Broder, 2006). To start, establishing policies and procedures which ...view middle of the document...
In Appendix A of Broder’s Risk Analysis and the Security Survey, The following security surveys should be used each time to generate a survey report when concerned with infrastructure protection:
* General Questions Before Starting a Survey
* Number of Employees
* Classified Operations
* Theft Experience
These checklists will help to identify any developing trends in each facility and to note any changes in operation of the facility. In addition, the discovery of any classified work being started or stopped can signal a change in security operations to lessen or refresh the security detail to accommodate security needs. Theft surveys can also help with making decisions on whether or not to move to more costly security countermeasures while maintaining a cost-effective plan. The main idea behind incremental implementations is to avoid “security overkill” (Broder, 2006).
Once the preceding surveys have been completed, we move on to discovering more granular details for each facility by using Appendix A of Broder’s Risk Analysis and the Security Survey as a reference. The responses to these surveys may not change within a year but over the span of a few years or more. However for the sake of trend analysis and change notifications, it is important to include these surveys for each security survey:
* Physical Description of the Facility
* Perimeter Security
* Building Security
* Security of Shipping and Receiving Areas
* Area Security
* Key Control, Locking Devices and Containers
* Control of Personnel and Vehicles
* Safety for Personnel
* Organization for Emergency
* Theft Control
Since the current aim is to...