I need help revising my week 4 IP.

User Generated

tbetb013

Business Finance

Description

Revise your Week 4 IP. Include in your final reiteration of this project a basic threat assessment that will identify 2 significant threats to Company Alpha and how your new security plan will address these threats. Threats are impeding dangers or harmful acts such as theft, shoplifting, medical emergency, disorderly group or crowd, workplace violence, and so on. My Week 4 IP is the file below.

Unformatted Attachment Preview

Company Alpha Security Plan Jada Ellsworth CTU Company Alpha Security Plan Every establishment requires security services for different purposes. While some organizations require to protect their physical infrastructure, others require security services for the protection of both physical and software infrastructure (Roman, Lopez & Mambo, 2018). In this case, Company Alpha intends to offer services for a commercial establishment, which will guarantee the necessary attention to both the physical and software infrastructure. Notably, business enterprises may lose significant infrastructure if people accessed the facilities and were in a position to make away with the inventory therein. Additionally, the businesses have information stored on the organizational network, which when lost, could jeopardize the company’s competitive advantage, and potentially share consumer information to third parties. Ultimately, providing security services to a commercial establishment requires attention to both the physical and virtual infrastructure. Security Objectives In essence, the commercial establishment will have businesses with physical inventory and others working entirely on the cyberspace. Therefore, there will be need for physical as well as virtual surveillance to ensure that the necessary attention is paid to all the vulnerable areas within the facility. Consequently, the protection of these areas will require physical surveillance in addition to the use of virtual surveillance measures. For instance, in addition to one security officer working at the facility’s entrance, there will be another one working in the security cameras room, to observe the activities tithing the hallways as viewed from the security cameras. Additionally, an information technology expert will help ensure that the cyberspace within which the company operates is secure enough. Staffing Needs Notably, the business will require observation every hour of the day, which implies that the security officers will have to work in shifts. Six-hour shifts will require at least four employees working per day. Therefore, a minimum of six employees will be necessary for the security officers working at the entrance, and those within the facility observing images from the cameras within the facility. Two fulltime employees will then work in monitoring the cyberspace within the facility, to protect the businesses therein as much as possible. Therefore, the security plan requires a minimum of fourteen employees to completely meet the needs of the facility. Hiring and Training Plan With the necessary positions identified, the next step would be hiring the necessary professionals to fill the positions. In particular, using hiring agencies to fill the positions will be more appropriate since the reputation of the employees would be guaranteed under such circumstances. Company Alpha will simply need to provide the agency with the necessary requirements from the employees, based on which the agency will then develop the appropriate parameters to determine the most appropriate employees for the company. With the experience in hiring process, the agency will be best positioned to provide the best candidates to the company. However, training will be necessary once the firm gets the recruits, in which case they will receive the fundamental principles that distinguish Company Alpha from other organizations. Additionally, the training will provide orientation into the commercial establishment. With that complete, the employees will be ready enough to begin working with the facility, and with enough knowledge of what the company expects of them based on organizational culture. References Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680-698.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, here is your revised paper :), also, I attached outline, in case you need it ;). Let me know if you have further questions or need more edits okay ;)

1

Company Alpha Security Plan
Jada Ellsworth
CTU
August 9, 2018

2

Company Alpha Security Plan
Every establishment requires security services for different purposes. While some
organizations require to protect their physical infrastructure, others require security services for
the protection of both physical and software infrastructure (Roman, Lopez & Mambo, 2018). In
this case, Company Alpha intends to offer services for a commercial establishment, which will
guarantee the necessary attention to both the physical and software infrastructure. Notably,
business enterprises may lose significant infrastructure if people accessed the facilities and were
in a position to make away with the inventory therein. Additionally, the businesses have
information stored on the organizational network, which when lost, could jeopardize the
company’s competitive advantage, and potentially share consumer information to third parties.
Ultimately, providing security services to a commercial establishment requires attention to both
the physical and virtual infrastructure.
Security Objectives
In essence, the commercial establishment will have businesses with physical inventory
and others working entirely on the cyberspace. Therefore, there will be need for physical as well
as virtual surveillance to ensure that the necessary attention is paid to all the vulnerable areas
within the facility. Consequently, the protection of these areas will require physical surveillance
in addition to the use of virtual surveillance measures. For instance, in addition to one security
officer working at the facility’s entrance, there will be another one working in the security
cameras room, to observe the activities tithing the hallways as viewed from the security cameras.
Additionally, an information technology expert will help ensure that the cyberspace within which
the company operates is secure eno...


Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags