Description
Revise your Week 4 IP. Include in your final reiteration of this project a basic threat assessment that will identify 2 significant threats to Company Alpha and how your new security plan will address these threats. Threats are impeding dangers or harmful acts such as theft, shoplifting, medical emergency, disorderly group or crowd, workplace violence, and so on. My Week 4 IP is the file below.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Hi, here is your revised paper :), also, I attached outline, in case you need it ;). Let me know if you have further questions or need more edits okay ;)
1
Company Alpha Security Plan
Jada Ellsworth
CTU
August 9, 2018
2
Company Alpha Security Plan
Every establishment requires security services for different purposes. While some
organizations require to protect their physical infrastructure, others require security services for
the protection of both physical and software infrastructure (Roman, Lopez & Mambo, 2018). In
this case, Company Alpha intends to offer services for a commercial establishment, which will
guarantee the necessary attention to both the physical and software infrastructure. Notably,
business enterprises may lose significant infrastructure if people accessed the facilities and were
in a position to make away with the inventory therein. Additionally, the businesses have
information stored on the organizational network, which when lost, could jeopardize the
company’s competitive advantage, and potentially share consumer information to third parties.
Ultimately, providing security services to a commercial establishment requires attention to both
the physical and virtual infrastructure.
Security Objectives
In essence, the commercial establishment will have businesses with physical inventory
and others working entirely on the cyberspace. Therefore, there will be need for physical as well
as virtual surveillance to ensure that the necessary attention is paid to all the vulnerable areas
within the facility. Consequently, the protection of these areas will require physical surveillance
in addition to the use of virtual surveillance measures. For instance, in addition to one security
officer working at the facility’s entrance, there will be another one working in the security
cameras room, to observe the activities tithing the hallways as viewed from the security cameras.
Additionally, an information technology expert will help ensure that the cyberspace within which
the company operates is secure eno...