Cjs 250 Appendix G

In: Other Topics

Submitted By dorene4444
Words 288
Pages 2
Associate Level Material
Appendix G

Security Assessment

Directions

Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.

Setting 1: School

THREAT
RISK
COUNTERMEASURE Probability Criticality Total
Example:
Information theft
4
7
11
Employee screening, limited computer access, and computer monitoring
Child Abduction 5 10 15 Doors locked from outside, security cameras throughout building inside and outside
Earthquake/Fire 5 10 15 Extensive evacuation plan, install sprinkler system
Firearm or Bomb 4 10 14 Metal detectors at all entrances, armed and unarmed guards, security cameras
Drug sells/usage 3 7 10 Conduct random checks, have drug sniffing dogs do a check
Internal theft 3 6 9 Security cameras

Setting 2: Hospital

THREAT
RISK
COUNTERMEASURE Probability Criticality Total
Assault on a staff member 6 6 12 Security should be present on each floor
Theft of narcotics 8 8 16 Keep a very strict log of who checks meds in and out and include the quantity
Bomb threat 4 4 8 Take all precautions and calls seriously. Retrieve as much info as possible to give to the local authorities
Hostage situation 3 3 6 Conduct on going training sessions regarding steps to take during a hostage situation
Assault on patients 6 6 12 Have 2 staff members present when performing…...

Similar Documents

Appendix G

...Associate Level Material Appendix G Ethical Actions Worksheet Write a 100- to 150-word response to each of the following questions: • Was there anything in either the University of Phoenix Student Code of Conduct or the Student Code of Academic Integrity that surprised you? If so, what was it? Why were you surprised? If not, why not? There is nothing that surprised me about the University Of Phoenix Code Of Conduct or the Student Code of Academic integrity. I am used to having codes of conduct and codes of integrity or rules as I like to call them. I have had them all throughout school and sports and so I know what they are and how important they are. They are all different in means to wording, but they all follow the same principles. They all help guide us in to letting us know what is acceptable and not acceptable, what is wrong or right, and to remind us that honesty and truth is important and to never take shortcuts, lie, cheat. Which is important to any school, team, or group. • What did you learn about the behaviors considered important for an ethical learner or student in the University of Phoenix learning community? As a University of Phoenix student, I am expected to hold a high regard of respect to my classmates and teachers. I am learning how to follow all the rules again. I need to also learn how to respect people over the computer. To get respect for my classmates and teachers, I must also be respectful to other. Being welling to......

Words: 383 - Pages: 2

Appendix B Cjs 250

...Associate Level Material Appendix D The Three Models of Physical Security Directions: Read and study the description of an office building’s physical layout and its current security features in Part I. Then, answer the questions in Part II. Part I: Office Building Description A six foot fence secures the outer perimeter. Video surveillance is active on the north fence and inactive on the south. A manned guard station permits entrance into the outer perimeter from the west; an unmanned and unlocked gate permits entrance from the east. No Trespassing signs are posted at intervals upon the perimeter fence; Employees only is posted on the gate. Visitors must obtain a pass at the guard station. The outer perimeter contains the parking lot and office building. The perimeter has two light posts that, when functioning, illuminate the entire parking lot. Currently, the light post on the south side is not functioning. The office building exterior has three outer doors and one window. The first door is marked with an Employees Only sign and requires a badge for access. The second door is the main entrance for visitors and is manned by a guard, who requires a visitor’s pass for admittance. The third door is an emergency exit only and is clearly marked. Any attempt to gain access through the first door without a badge, the second door without a pass, or the third door at all, results in alarm activation and guard response. The window is locked from within; any attempt...

Words: 666 - Pages: 3

Cjs/250 Appendix G

...Associate Level Material Appendix G Security Assessment Directions Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat. Setting 1: airport security | | | | |THREAT |RISK |COUNTERMEASURE | | |Probability |Criticality |Total | | |Example: | | | | | |Information theft |4 |7 |11 |Employee screening, limited computer | | | | | |access, and computer monitoring...

Words: 339 - Pages: 2

Appendix G

...Associate Program Material Appendix G Sequential and Selection Process Control Structure In the following example, the second line of the table specifies that tax due on a salary of $2,000.00 is $225.00 plus 16% of excess salary over $1,500.00 (that is, 16% of $500.00). Therefore, the total tax is $225.00 + $80.00, or $305.00. | |Salary Range in Dollars |Base Tax in Dollars |Percentage of Excess | |1 |0.00-1,499.99 |0.00 |15 % | |2 |1,500.00-2,999.99 |225.00 |16 % | |3 |3,000.00-4,999.99 |465.00 |18 % | |4 |5,000.00-7,999.99 |825.00 |20 % | |5 |8,000.00-14,999.99 |1425.00 |25 % | Ok number 3 if the excess is over $3,000.00 then that would be 16% of $236.00; therefore the total tax would be $236.00 +36.00 which would be $272.00 Number 4 if the excess is 5,000 then that would be 18% of $232.5; therefore the total tax would be $232.5 + 32.5, or $265.00. Number 5 if the excess is over 8,000 then that would be 25% of $570.00......

Words: 309 - Pages: 2

Cjs 250 Appendix B

...Associate Level Material Appendix B Security Assessment Directions: Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat. This assessment is based on the Facts for Consideration on page _93___ | | | | |THREAT |RISK |COUNTERMEASURE | | |Probability |Criticality |Total | | |Example: | | | | | |Physical assault |9 |4 |13 |Highly visible officer presence | |Missing prisoners |4 |10 |14 |Check prisoners and count......

Words: 466 - Pages: 2

Cjs Appendix G

...Associate Level Material Appendix G Security Assessment Directions Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat. Setting 1: School Security | | | | |THREAT |RISK |COUNTERMEASURE | | |Probability |Criticality |Total | | |Example: | | | | | |Information theft |4 |7 |11 |Employee screening, limited computer | | | | | |access, and computer monitoring ...

Words: 326 - Pages: 2

Cjs/250

...Associate Level Material Appendix D The Three Models of Physical Security Directions: Read and study the description of an office building’s physical layout and its current security features in Part I. Then, answer the questions in Part II. Part I: Office Building Description A six foot fence secures the outer perimeter. Video surveillance is active on the north fence and inactive on the south. A manned guard station permits entrance into the outer perimeter from the west; an unmanned and unlocked gate permits entrance from the east. No Trespassing signs are posted at intervals upon the perimeter fence; Employees Only is posted on the gate. Visitors must obtain a pass at the guard station. The outer perimeter contains the parking lot and office building. The perimeter has two light posts that, when functioning, illuminate the entire parking lot. Currently, the light post on the south side is not functioning. The office building exterior has three outer doors and one window. The first door is marked with an Employees Only sign and requires a badge for access. The second door is the main entrance for visitors and is manned by a guard, who requires a visitor’s pass for admittance. The third door is an emergency exit only and is clearly marked. Any attempt to gain access through the first door without a badge, the second door without a pass, or the third door at all, results in alarm activation and guard response. The window is locked from within; any attempt...

Words: 795 - Pages: 4

Cjs 250 Entire Course

...CJS 250 ENTIRE COURSE To purchase this visit here: http://www.activitymode.com/product/cjs-250-entire-course/ Contact us at: SUPPORT@ACTIVITYMODE.COM CJS 250 ENTIRE COURSE CJS 250 Week 1 Checkpoint Historical Laws and Security CJS 250 Week 1 Assignment Biography of Allan Pinkerton CJS 250 Week 2 Checkpoint Threat and Risk Assessment CJS 250 Week 2 DQ 1 and DQ 2 CJS 250 Week 3 Exercise Interview schedule CJS 250 Week 3 Assignment Security Objective Components CJS 250 Week 3 Checkpoint Risk Managment CJS 250 Week 4 Checkpoint Models of Physical Security (Appendix D) CJS 250 Week 4 DQ 1 and DQ 2 CJS 250 Week 5 Checkpoint Evaluating Safe Work Conditions Appendix E CJS 250 Week 5 Checkpoint Floor Plan CJS 250 Week 5 Assignment Security Manager Interview CJS 250 Week 6 Checkpoint Security Assessment CJS 250 Week 6 DQ 1 and DQ 2 CJS 250 Week 7 Checkpoint Public Relations and Professionalism CJS 250 Week 7 Assignment Relationship between Private and Public Police CJS 250 Week 8 Checkpoint Law and Legal Issues CJS 250 Week 8 DQ 1 and DQ 2 CJS 250 Week 9 Capstone CheckPoint CJS 250 Week 9 Final The Security Plan Activity mode aims to provide quality study notes and tutorials to the students of CJS 250 ENTIRE COURSE in order to ace their studies. CJS 250 ENTIRE COURSE To purchase this visit here: http://www.activitymode.com/product/cjs-250-entire-course/ Contact us at: SUPPORT@ACTIVITYMODE.COM CJS 250 ENTIRE COURSE CJS 250 Week 1 Checkpoint......

Words: 897 - Pages: 4

Cjs 250 Entire Course

...CJS 250 Entire Course http://homeworkgallery.com/index.php/product/cjs-250-entire-course/ http://homeworkgallery.com/index.php/product/cjs-250-entire-course/ CJS 250 Week 1 Assignment Biography of Allan Pinkerton 1. Assignment: Biography of Allan Pinkerton No study of the private security industry would be complete without mention of Allan Pinkerton and the Pinkerton Detective Agency. Pinkerton made many contributions both to private security and to national law enforcement, and the Pinkerton Detective Agency was the forerunner to modern private security and detective agencies. · Write a 500- to 700-word biography of Allan Pinkerton focusing on the overlap between private and public security in the career of Pinkerton and the development of the Pinkerton Detective Agency. CJS 250 Week 1 Checkpoint Historical Laws and Security 1. CheckPoint: Historical Laws and Security · Write a brief description in your own words of the following laws, including where and when each law originated: o The Code of Hammurabi o Draco’s law o Law of the Twelve Tables o Justinian Code o Magna Carta o Statute of Westminster · Answer the following questions: How have these laws led to the historical development of security forces, both private and public? Why do you think the need for both private and public security still exists? CJS 250 Week 2......

Words: 1689 - Pages: 7

Cjs 250 Appendix F

...Associate Level Material Appendix F Security Manager Interview Directions Contact a security manager and conduct the interview listed in Part I (space has been provided for extra questions, should you ask any). Once the interview has been completed, answer the questions in Part II. Part I: Interview Questionnaire 1. Can you briefly describe your current position, its duties, and responsibilities? Her duties include running her department smoothly, oversee her employees, making sure everyone is up to date with security procedures, hire and discharge employees, set up training and seminars, protect the public, evaluate personnel, and make sure that all systems are working properly. 2. What is your hiring procedure like for personnel? They must go through a psychological evaluation, and a screening process. They will be asked how they would handle different procedures and given a brief description of what type of environment they will be working in. Drug screening is part of the interview also. They will have to have a background check. During the interview Samantha really likes to get to know the individual because after all, this person will be representing this company. 3. Is there any type of pre-employment screening? Yes, explained above. 4. What qualifications do you require of applicants? Must be 18 years old with no criminal convictions, high school diploma or GED, must be able to pass drug screen and background check, credit check and good......

Words: 433 - Pages: 2

Appendix G

...Associate Level Material Appendix G Ethical Actions Worksheet Write a 100- to 150-word response to each of the following questions: * Was there anything in either the University of Phoenix Student Code of Conduct or the Student Code of Academic Integrity that surprised you? If so, what was it? Why were you surprised? If not, why not? There is nothing that really surprised me in the University Of Phoenix Code Of Conduct or the Student Code of Academic integrity. I am accustomed to having codes of conduct and codes of integrity. I have them at work and we have all had them throughout our life with school and other jobs. Even though they might be slightly different and worded in a different way, they all follow the same principles. They all help guide us in to letting us know what is acceptable and not acceptable, to remind us that honesty and truth is important and to never take shortcuts, lie, cheat, or infringe on others rights. Above all they tell us that every community, school, and workplace have a set of rules that must be followed and kept in line. What did you learn about the behaviors considered important for an ethical learner or student in the University of Phoenix learning community? I think that, as a University of Phoenix student, I am expected to have much respect to my fellow classmates and teachers. I am learning to become a more professional person then what I started as, and one thing I will need to become is a respectable person of......

Words: 477 - Pages: 2

Appendix G

...Associate Level Material Appendix G Ethical Actions Worksheet Write a 100- to 150-word response to each of the following questions: • Was there anything in either the University Of Phoenix Student Code Of Conduct or the Student Code of Academic Integrity that surprised you? If so, what was it? Why were you surprised? If not, why not? I was surprised about one and that was self-plagiarism, double dipping, or dovetailing. – Submission of work that has been prepared for a different course without fair citation of the original work and prior approval of faculty. Students who submit assignments that were previously submitted in another course are subject to the same consequences they would face if they plagiarized these assignments. The use of one’s previous work in an assignment requires prior approval from the current faculty member and citation of the previous work. The reason I was surprised was because it is your own work. It is what you have already learned. And this is saying you cannot use what you have already learned in one class for another class. I could see the self-plagiarism if you just copied it. But while taking the quiz it said you couldn’t tweak it or use it even if it fits the question in another class. That I am confused about. • What did you learn about the behaviors considered important for an ethical learner or student in the University of Phoenix learning community? What I have learn about the behaviors that are considered important...

Words: 474 - Pages: 2

Appendix G

...Associate Level Material Appendix G Ethical Actions Worksheet Write a 100- to 150-word response to each of the following questions: • Was there anything in either the University of Phoenix Student Code of Conduct or the Student Code of Academic Integrity that surprised you? If so, what was it? Why were you surprised? If not, why not? There was nothing that really surprised me about the University of Phoenix Student Code of Conduct or the Student Code of Academic Integrity. These are simple rules that everyone should follow on a day to day basis. Anywhere someone goes there are always going to be rules and regulations to follow. If students are not able to conduct themselves in a respectful and honest manner, then the University of Phoenix is not the place for them. If students are able to follow the simple rules that are set forth by the University of Phoenix then they make their time at the University of Phoenix much easier. However, if faculty and staff where to do the opposite, then of course they only make it harder for themselves. Decisions that we make as students and faculty members can have a big effect on us in the future. • What did you learn about the behaviors considered important for an ethical learner or student in the University of Phoenix learning community? I learned that to be an ethical learner requires a person to be honest. We should behave in an appropriate manner and make proper choices...

Words: 512 - Pages: 3

Appendix G

...Associate Level Material Appendix G Ethical Actions Worksheet Write a 100- to 150-word response to each of the following questions: • Was there anything in either the University of Phoenix Student Code of Conduct or the Student Code of Academic Integrity that surprised you? If so, what was it? Why were you surprised? If not, why not? I was surprised about the act of self-plagiarism. I was never aware that someone can plagiarize themselves. I was always under the impression that plagiarism is the act of using someone else’s ideas, and claiming them as your own or not citing your work. When asked, “Which of the following behaviors is most likely to create a hostile learning environment”, I felt stuck between two answers: Using a derogatory term towards a member of the GLBT community and having a swastika on the cover of someone’s class notebook. I find both to be very disrespectful, lucky I chose the right one. • What did you learn about the behaviors considered important for an ethical learner or student in the University of Phoenix learning community? I believe that, as a University of Phoenix student, I am expected to hold a high regard of respect to fellow classmates and professors. I am learning to become a professional adult, and one thing I will need to become is a respectable person. To gain respect, one must also be respectful to others. Being open-minded is an important aspect of respect. Listen to what others have to say, and take each......

Words: 427 - Pages: 2

Cjs 250 Appendix E

...Appendix E Evaluating Safe Working Conditions Directions: Read each scenario and answer the following questions. 1. Workplace Violence Sam is a security officer for ABC Corporation in the Phoenix area. He is always stationed at the security desk in the main lobby to greet employees and visitors. One day he observed an employee from the finance department muttering something under his breath and acting strangely as he walked by the security desk. He noticed this same behavior the following day. On the third day, there was a shooting in the finance department. The director of finance and her administrative assistant were shot and killed by the employee exhibiting strange behavior; the employee committed suicide prior to the arrival of the police. What should Sam have done prior to the incident? Should the security officer have notified anyone about the employee’s strange behavior? What company policies do you think should be in place regarding situations similar to this? Explain your answer. What the security officer should have done was let his supervisor know what he thought to be strange behavior from the individual just because he had never seen this person act this way before. If there is not a supervisor on site, notify the head person in his department. The officer needs to watch the individual closely to make sure that he does not pose a threat to anyone or himself. There should be a “No tolerance for violence” policy provided for every employee. ......

Words: 893 - Pages: 4

The Complete Chess Course - From Beginning to Winning Chess - 21st Century Edition (2016).epub Gooner | MLA Paper | Anticellulite