Vancouver Island University Controls to Prevent Incidents Paper

User Generated

ertlnz

Writing

vancouver island university

Description

  • Research physical security incidents and write a paper on one which interests you the most. Also recommend controls to prevent the incident from happening again.
  • Paper MUST be submitted in APA format
  • Propose a possible change in that organization’s physical security that could have prevented the breach/failure for that scenario
  • Submit at least 2 but no more than 4 pages double spaced

Unformatted Attachment Preview

WHY PHYSICAL SECURITY? 1 CHAPTER 1 ENCOMPASSING EFFECTIVE CPTED Introduction Crime Prevention Through Environmental Design • Three-D approach • Core CPTED principles Conclusion 2 CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN • TO ASSIST IN NEIGHBORHOOD CRIME PREVENTION, CPTED APPLIES STRATEGIES INCORPORATING: • PHYSICAL DESIGN • CITIZEN PARTICIPATION • LAW ENFORCEMENT 3 3 CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN • THE THREE-D APPROACH: • DESIGNATION – WHAT IS THE PURPOSE OF THE SPACE? DOES IT SUPPORT ITS INTENDED USE? • DEFINITION – DEFINE THE SPACE, BORDERS, OWNERS, CONFLICTS • DESIGN – HOW WELL DOES PHYSICAL DESIGN SUPPORT INTENDED FUNCTION? 4 4 CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN • SENSE OF CAUTION TOWARDS APPROACH: • NOT CONCLUSIVELY DEMONSTRATED • DISAGREEMENT AMONG CRIME PREVENTION THEORISTS • MAGNITUDE OF TYPICAL PROJECT BEYOND PRACTITIONER’S CURRENT ABILITY • COST REPRESENTS MAJOR FINANCIAL INVESTMENT 5 5 CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN • FIVE STRATEGIES: • LAND USE PLANNING • BUILDING GROUND SECURITY • BUILDING PERIMETER SECURITY • BUILDING INTERIOR SECURITY • CONSTRUCTION STANDARDS 6 6 CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN • CHANGES TO CONSIDER: • DESIGN FEATURES (LOCKS, LIGHTS, FENCES) • IMPACT OF IMPLEMENTED DESIGN FEATURES ON RESIDENTS AND OTHER LEGITIMATE PROPERTY USERS • DIRECT AND INDIRECT EFFECT OF INTERVENING FACTORS ON CRIME 7 7 CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN • FOR A CPTED ASSESSMENT, FOCUS ON THE CORE CPTED PRINCIPLES: • NATURAL SURVEILLANCE • ACCESS MANAGEMENT • TERRITORIALITY • PHYSICAL MAINTENANCE • ORDER MAINTENANCE • ACTIVITY SUPPORT 8 8 CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN • RESULTS IN FEATURED CITIES INCLUDE: • REDUCED OPPORTUNITIES FOR CRIME • COOPERATION BETWEEN LAW ENFORCEMENTS AND RESIDENTS • INCREASED NEIGHBORHOOD IDENTITY • PUBLIC INFORMATION PROGRAMS • IMPROVED TRANSPORTATION SYSTEMS • STEPS TO ACHIEVE GOALS WERE: • OUTDOOR LIGHTING, SIDEWALK/LANDSCAPING IMPROVEMENT • BLOCK WATCH, SAFE HOMES, AREA CLEANUPS • CAMPAIGN TO DISCOURAGE CARRYING CASH • PUBLIC TRANSPORTATION IMPROVEMENT/EXPANSION • IMPROVED STREET LIGHTING 9 9 CHAPTER 2 INTRODUCTION TO VULNERABILITY ASSESSMENT Vulnerability Assessment Risk Management Statistics and Quantitative Analysis 10 VULNERABILITY ASSESSMENT • THREE PHASES: • PLANNING • CONDUCTING THE VA • REPORTING AND USING RESULTS • PART OF LARGER RISK ASSESSMENT PROCESSES 11 11 RISK MANAGEMENT • RISK MANAGEMENT: • SET OF ACTIONS TAKEN TO ADDRESS IDENTIFIED RISKS: • AVOIDANCE • MITIGATION • TRANSFER • ACCEPTANCE 12 12 RISK MANAGEMENT • THREE QUESTIONS TO BE ANSWERED: • WHAT CAN GO WRONG? • LIKELIHOOD IT WOULD GO WRONG? • WHAT ARE THE CONSEQUENCES • RISK MANAGEMENT DECISIONS BASED ON: • CONSEQUENCE OF LOSS OF ASSETS • DEFINED THREAT • RISK TOLERANCE OF THE ENTERPRISE 13 13 RISK MANAGEMENT • MITIGATION: • ACHIEVED BY ACTIONS TO LOWER RISKS TO REDUCE LOSS SEVERITY TO ACCEPTABLE LEVELS • MITIGATION IS MOST COMMON ACTION TAKEN IN RISK MANAGEMENT • AVOIDANCE: • ACCOMPLISHED BY REMOVING RISK SOURCE 14 14 RISK MANAGEMENT • TRANSFER: • INSURANCE TO COVER REPLACEMENT OR OTHER COSTS • ACCEPTANCE: • ACCEPT THE RISK IN ITS CURRENT FORM • RECOGNITION THERE WILL ALWAYS BE RISK • NEED TO DETERMINE ACCEPTABLE LEVEL 15 15 STATISTICS AND QUANTITATIVE ANALYSIS • ERROR RATES—MATHEMATICAL COMPLEMENT OF THE SUCCESS RATES • SUCCESS RATES—NUMBER OF TRIALS MINUS NUMBER OF SUCCESSES • STATED AS FALSE ACCEPT AND FALSE REJECT RATES • EXAMPLE: NOT DETECTING THE HUMAN-SIZE OBJECT IS A FALSE ACCEPT • EXAMPLE: DETECTING A SMALLER-THAN-HUMAN SIZE A FALSE REJECT. 16 16 STATISTICS AND QUANTITATIVE ANALYSIS • TRUE POSITIVE – A TEST RESULT WHICH CORRECTLY INDICATES THAT A PARTICULAR CONDITION OR ATTRIBUTE IS PRESENT. • TRUE NEGATIVE – A TEST RESULT WHICH CORRECTLY INDICATES THAT A PARTICULAR CONDITION OR ATTRIBUTE IS ABSENT. • FALSE POSITIVE – A TEST RESULT WHICH INCORRECTLY INDICATES THAT A PARTICULAR CONDITION OR ATTRIBUTE IS PRESENT. • FALSE NEGATIVE - A TEST RESULT WHICH INCORRECTLY INDICATES THAT A PARTICULAR CONDITION OR ATTRIBUTE IS ABSENT. 17 17 STATISTICS AND QUANTITATIVE ANALYSIS • STATISTICAL ANALYSIS OF SECURITY PERFORMANCE BASED ON THOSE FOUR OUTCOMES. • DETECTION RATE—RATE AT WHICH SENSOR SUCCESSFULLY DETECTS OBJECTS • PROBABILITY—DETECTION RATE + CONFIDENCE LEVEL, BASED ON: • NUMBER OF EVENTS ANALYZED • MORE DATA AVAILABLE 18 18 CHAPTER 3 INFLUENCE OF PHYSICAL DESIGN Defensible Space • Territoriality • Natural Surveillance • Design Guidelines • Modifying Existing Physical Design Defense Strategies • Personal • Territorial • Law Enforcement • Confidence Restoration Security Survey • Five components • Nine points of security concerns • Positives and negatives of recommendations 19 PHYSICAL DESIGN AND INFORMAL SOCIAL CONTROL • BETTER PHYSICAL PLANNING KEY TO IMPROVED PHYSICAL SECURITY • CLOSELY KNIT COMMUNITIES TEND TO PROTECT MEMBERS • OPPORTUNITIES FOR CRIME REDUCED OR ELIMINATED • DEVELOPMENT OF INFORMAL SOCIAL CONTROL 20 20 DEFENSIBLE SPACE • TERRITORIALITY • A MAN’S HOME IS HIS CASTLE! • IDEA LARGELY LOST IN MOVEMENT TOWARDS ROW HOUSES, HIGH-RISE APARTMENTS, AND HOUSING PROJECTS • DO NOT FEEL RESPONSIBILITY FOR AREA OUTSIDE THEIR DOOR • LACK OF RESPONSIBILITY LEADS TO: • OUTSIDE WORLD AS A NO-MAN’S LAND • LACK OF SOCIAL SENSE OF OWNERSHIP • CRIMINALS CAN ACT ALMOST AT WILL 21 21 DEFENSIBLE SPACE • NATURAL SURVEILLANCE • INCREASED PRESENCE OF HUMAN OBSERVERS NEEDS ACTION, DEPENDING ON: • HOW MUCH OBSERVERS FEEL PERSONAL/PROPERTY RIGHTS ARE VIOLATED • EXTENT TO WHICH OBSERVER IDENTIFIES WITH VICTIM • HOW MUCH OBSERVER FEELS THEY CAN HELP 22 22 DEFENSIBLE SPACE • LOW-COST TECHNIQUES TO MODIFY FACILITIES • INSTALL SECURITY DEVICES • DIVIDE COMMON LAWN AREAS INTO PRIVATE YARDS • IMPROVE SEMI-PRIVACY OF PATHWAYS/COMMON AREAS • REDUCE NUMBER OF PUBLIC ACCESS POINTS • ESTABLISH AUDIO AND VIDEO SURVEILLANCE • LIVING ENVIRONMENT OPENED UP AND USED BY RESIDENTS INSTEAD OF BEING CLOSED IN • STIMULATES A SELF-POLICING CONDITION • OPPORTUNITIES FOR CRIME MAY EXIST, BUT PROBABILITY FOR CRIMINAL ACTIVITY IS REDUCED 23 23 DEFENSE STRATEGIES • PERSONAL • TERRITORIAL • LAW ENFORCEMENT • CONFIDENCE RESTORATION 24 24 PERSONAL DEFENSE STRATEGIES • SAFE STREETS FOR PEOPLE STRATEGIES – SURVEILLANCE BASED STRATEGY • TRANSPORTATION STRATEGIES – REDUCE CRIME EXPOSURE BY IMPROVING PUBLIC TRANSPORTATION • CASH OFF THE STREETS STRATEGIES – REDUCE CRIME INCENTIVE BY URGING PEOPLE TO CARRY LITTLE OR NO CASH • CITIZENS INTERVENTION – GET CITIZENS INVOLVED IN ASSUMING RESPONSIBILITY AND REPORTING CRIME 25 25 TERRITORIAL DEFENSE STRATEGIES • LAND USE PLANNING STRATEGIES – AVOID LAND USE MIXTURE THAT NEGATIVELY IMPACT NEIGHBORHOOD SECURITY • BUILDING GROUNDS SECURITY STRATEGIES – FIRST LINE OF DEFENSE AGAINST UNAUTHORIZED ENTRY TO SITES • BUILDING PERIMETER SECURITY STRATEGIES – SECOND LINE OF DEFENSE • BUILDING INTERIOR SECURITY STRATEGIES – THIRD LINE OF DEFENSE • CONSTRUCTION STANDARDS STRATEGIES – BUILDING SECURITY CODES AND MATERIALS WHICH REDUCE CRIME AND SAFETY HAZARDS 26 26 LAW ENFORCEMENT STRATEGIES • POLICE PATROL STRATEGIES – OPTIMIZE POLICE DEPLOYMENT STRATEGIES • CITIZEN POLICE SUPPORT STRATEGIES – POLICE OPERATIONAL SUPPORT ACTIVITIES WHICH IMPROVE CITIZEN=POLICE RELATIONS AND ENCOURAGE CITIZENS TO COOPERATE WITH THE POLICE IN PREVENTING AND REPORTING INCIDENTS 27 27 CONFIDENCE RESTORATION STRATEGIES • INVESTOR CONFIDENCE STRATEGIES –PROMOTE ECONOMIC INVESTMENT IN AREAS, WHICH IMPROVES SOCIAL AND ECONOMIC VITALITY • NEIGHBORHOOD IDENTITY STRATEGIES – BUILD COMMUNITY PRIDE 28 28 SECURITY SURVEY • CRITICAL ON-SITE EXAMINATION AND ANALYSIS OF A PLACE TO: • DETERMINE PRESENT SECURITY • IDENTIFY DEFICIENCIES OR EXCESSES • DETERMINE PROTECTION NEEDED • MAKE RECOMMENDATIONS TO IMPROVE OVERALL SECURITY • SURVEY OR AUDIT MUST INCLUDE: • EXTERNAL AND INTERNAL COMPLEX • IDENTIFICATION OF THREATS • IDENTIFICATION OF CONTROLS • LEVEL OF RISK 29 29 FIVE COMPONENTS • ANTICIPATION: • PROGNOSIS OF FURTHER ACTION • RECOGNITION: • ABILITY TO RECOGNIZE AND INTERPRET CRIME RISK • APPRAISAL: • RESPONSIBILITY TO DEVELOP, SUGGEST, AND COMMUNICATE RECOMMENDATIONS • CRIME RISK: • OPPORTUNITY GAINED FROM CRIME • INITIATION OF ACTION: • RECIPIENT OF RECOMMENDATIONS DECIDES WHETHER TO ACT, BASED ON SUGGESTIONS 30 30 SECURITY SURVEY • MOST EFFECTIVE AFTER A: • CRISIS IN THE CORPORATION • BREAKING AND ENTERING OR MAJOR LARCENY • MAJOR CHANGE IN PHYSICAL INFRASTRUCTURE OR OPERATIONAL PROCESS • REQUEST FROM AUDITORS • REASONS INCLUDE: • IDENTIFY WHAT NEEDS TO BE PROTECTED • ASCERTAIN RISK/SECURITY MANAGEMENT NEEDS • DETERMINE THREATS/RISKS/VULNERABILITY TO ASSETS • ENSURE THE SECURITY MANAGEMENT PLAN COMBATS IDENTIFIED THREATS IN COSTEFFECTIVE AND PROACTIVE MANNER 31 31 NINE POINTS OF SECURITY CONCERN • GENERAL PURPOSE OF BUILDING • HAZARDS INVOLVING THE BUILDING OR OCCUPANTS • POLICE OR SECURITY OFFICER APPLICATIONS • PHYSICAL RECOMMENDATIONS • LOCKS, EQUIPMENT TO BE BOLTED, CARD AND KEY CONTROL • ALARMS • STORAGE • TRESPASSING • CUSTODIANS 32 32 POSITIVE AND NEGATIVE ASPECTS OF MAKING RECOMMENDATIONS • POSITIVE: • CRIME IS REDUCED • LESS VANDALISM • VISUAL IMPACT IS NEGATIVE • NEGATIVE: • FORTRESS ENVIRONMENT—MORE PSYCHOLOGICAL BARRIER THAN PHYSICAL ONE • COMMUNITY REACTION: • INVOLVE RESIDENTS • CONSIDER CYCLONE OR OTHER SEE-THROUGH FENCING • USE CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN (CPTED) TO IMPROVE APPEARANCE 33 33
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Introduction
Physical control refers to a collection of activities that are carried out with the aim of protecting
networks, software, hardware and data from physical events o actions that have the potential to destroy
them leading to damage and losses. Example of such events includes cyber-attack and hacking, burglary,
terrorism, theft, fire, floods and natural disasters among others. The ability to maintain a strong physical
control plays a crucial role in the running of an organization. The discussion below analyzes cyber-attack
as an incident of physical control to identify various controls that can help to prevent the incident from
happening again.
Incident
The advent of the internet has positively affected businesses as it has helped to streamline
communication, processing among other processes. It is through the use of the internet that has seen
the productivity of a business increase. However, the use of the internet presents a business with a
major threat a poor management means that it can be hacked. In the recent past, a company was a
victim of such an event. The hackers took advantage of such vulnerability to get large amount of money
from the company. Eventually, the business successfully regained control of its database but is still
under threat as hackers transferred some files from their database.
Controls to prevent incide...


Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags