Free Essay

Devry Security Site Survey

In: Other Topics

Submitted By ninjazx6r
Words 2015
Pages 9
Jim Jones
February 15, 2013
Eval of Security Systems
Professor Semore Butts


This site survey was conducted by Jim Jones on February 15, 2013. This document is intended to detail the security survey and analysis for Devry Corporate headquarters. The report will detail the strengths and weaknesses of each of the operational areas. While it will detail an overview of staff and visitor procedures it will not be a personal evaluation of the staff’s readiness or ability to carry out those activities and responsibilities.
The objective of the recommendations in this audit are to ensure that Devry Corporate headquarters complies with state, local, and federal regulations for the safety of its employees, the public, and visitors. It will also assist with recommendations that ensure Devry Corporation is free from any legal liabilities as a result of action or non action as it relates to security and safety (Garcia, 2008).

The Devry Corporate Headquarters is the central location for Devry Inc., which owns and operates fourteen educational institutions, their supporting both domestic and international operations. These Institutions are comprised of large scale educational facilities requiring sophisticated infrastructures. Each of the supported institutions must adhere to the Higher Education Act standards of security and safety. Those standards would not be applicable in the corporate headquarters as the use of these facilities are strictly related to corporate governance, share holder support, board of directors , and investor relations.
The Information in this report was obtained from Devry Inc. Directors, Management, and supporting staff members. There will be aspects of the analysis and observations contained in this report that relate to third party vendors and the procedures in which they serve and interact with the Devry staff. The content of this document will address the activities and services within the Corporate Headquarters and will not address vendor or third party company policies and procedures. These policies and procedures will have been evaluated as part of their contract and RFQ process.
Physical Location and Characteristics

Devry Center is located at :
9210 Higher Education Drive New York, NY 11747

Devry Center is a thirty story corporate tower, which classifies it as a high rise building. The building is situated on a four acre plot of land in downtown New York City. Construction was completed in December of 2008. Information regarding the construction phase from the New York department of buildings revealed that the building complied with code and safety standards at that time.
The building was recently inspected for physical safety and structural integrity. The façade, interior, and foundation were all well within safety standards. The New York City department of building codes also verified that the elevators, both freight and passenger were recently inspected and have never received violations.
A discussion with the Director of Maintenance revealed that internal safety inspections are performed on a rotating schedule. When maintenance staff moves through out each area of the building they are doing manual walk through of the entire surrounding areas. The third party window cleaning staff is responsible for reporting issues with the façade the maintenance staff also inspects internal elevator and motor and cabling apparatus’s on a weekly basis. Each passenger and freight elevator contains a framed inspection placard that is current. The elevators contain passenger safety instructions in the event there is an emergency as well as how to operate each function in icon, Braille format. The maintenance staff was also able to provide the location of the current building inspections posted in placards next to the bank of passenger elevators (New York City Government, 2013).
Exit signs, and safety information as well as fire alarms, fire hoses, extinguishers and sprinkler systems are all installed as required by New York city building code, and New York City Fire Inspection standards,
My recommendation for improvement and liability protection of the physical structure integrity is that a third party structural engineering company performs a full inspection twice yearly.

Physical Security and Access Controls

The Devry Center has 1,800 tenants and a maximum capacity of 2,000 there are 30 floors with only 27 of them utilized as employee workspaces. The building also contains an underground parking garage, a ground level freight delivery loading dock and rooftop garden. A twenty four hour security staff monitors the building via patrol and closed circuit security camera’s. There are alarms in the shipping bay doors and the parking garage entry however there are very limited alarm applications in interior areas

Visitor and Employee Access

The first floor of the Devry Center consists of an indoor public lobby and café with several seating areas and vendors that provide coffee and pre-packaged food items in portable refreshment stands. Moving toward the back of the building there is a security and reception desk directly across from the banks of elevators. Office Hours for the public are Monday thru Friday 9am to 5pm EST. Visitors must check in at the reception desk. Reception greets them and verifies the purpose of their visit and confirms access with a supervisor from the appropriate department. Visitors are then directed to the elevator bank with verbal instructions on how to find the offices that they are looking for.

According to the employee handbook employees are required to display their employee Identification on their person at all time. They do not check in via any process. A guard at the desk watches for individuals bypassing the desk but does not physically check for identification. Employees accessing the building after office hours must sign in at the Reception desk. Security does not verify any of the afterhour’s access with a department supervisor.

All of the floors utilized for employee workspaces are not secured entry points. Individuals may exit the elevator and walk freely through each of the area’s the executive floors are the only exception where there is an additional reception area and security desk.

My recommendation is that the lobby security and reception desk be moved to act as a barrier in front of the elevator bank requiring access from a security measure to actually enter the elevators. Each of the interior floors would be locked and secured with a waiting area of its own.

One side of the reception barrier would be reserved for individual access. Visitors would come to the front of the desk to check in and be issued a visitors pass that they must display on their person at all time while they are on the premises. The pass would be equipped with an RFID that only allows access to the floors that they are allowed to enter. Once the pass was activated and given to the individual, the visitor would enter through the metal detector and utilize their pass at turnstile to access the elevator. Security would notify the supervisor or appointed employee that the visitor is on their way up.

For food or other local non freight delivery security would sign in the vendor and notify the employees. The employee would either come to the reception area to accept the delivery, or security would escort the delivery person to the elevator bank select the floor for them and ask them to wait in the secured area for the employee to greet them. Security would also monitor them via the camera system until the returned to exit the building (Garcia, 2008).

Employee badges would also be equipped with RFID readers. Appointed human resource employees and information technology employees would have unlimited access to the system. Supervisors would have access to their own departments so that they could set entry times appropriate to the employees work schedules. Employees would access the building through the metal detector and turnstiles (Fennely, 2004).
The Parking Garage

The underground parking garage accommodates 1250 spaces and is accessible via a lift arm style entry controlled via a pin pad. The garage is monitored by closed circuit televisions systems that are equipped with night vision. At this time there is low visibility in the parking garage it is difficult to determine if a space is executive, visitor, or general employee parking.

My recommendations are that in addition to the pin entry system that a RFID reader be placed along with a guard stand. The stand would be occupied by a member of security during the morning and evening commute hours to assist guest and employees should there be an incident or difficulty with the entry systems. Employee badges would allow quick access to parking so that entry becomes more efficient and there is less wait time and traffic issues. In addition parking spaces should be color coded and timer and motion sensor activated lighting added in addition to current fixtures. Intercoms should be available every 100 ft and clearly labeled for emergency situations (Fennely, 2004).
The Shipping Receiving Area

The Shipping and Receiving are is located at the rear of the building at street level. The loading dock is well lit and monitored by closed circuit television cameras. The bay doors are alarmed and secured with adequate locking systems. Freight is brought in and stationed throughout the area.

My only recommendation is that a secured cage be provided for equipment delivered for the information technology department. Computer and networking equipment and accessories are expensive items and should be secured at all times unless being escorted through the building by an authorized employee (Garcia, 2008).

The Rooftop Garden

The Rooftop garden contains portable seating areas throughout the area and a fenced area that is shrouded containing building exhaust systems, air-conditioning units, and telecommunications equipment. The fenced area is locked.

My recommendations are that the portable seating be removed and only provided on demand by a maintenance staff or event coordinator. hardscape or heavy secured seating areas should be the only permanent seating fixtures. The fenced area should be alarmed and the entire rooftop should be monitored by closed circuit television cameras. Aesthetic barriers should be installed on the ledges around the entire roof perimeter (Devry University ).

Miscellaneous Interior Areas

Currently telecommunications, networking and maintenance closets are locked with a pin entry system. My recommendation is that these areas should also be equipped with RFID readers and alarms. Office supply closets should also be secured by a pin or RFID entry system.

Each floor contains temperature controls throughout the area. My recommendation is that each of these be secured in clear lockboxes to prevent tampering. This measure is critical in the systems server rooms to prevent overheating.

Each floor contains an employee convenience area equipped with burner style coffee machines and high wattage multi functional microwave ovens. My recommendation is to replace the coffee machines with a non burner style unit. In addition the microwaves should be replaced with lower wattage function activated panels. Both of these replacements will assist in fire safety and prevention.

While every floor has adequate lighting there are no master controls for each my recommendation is that a smart lightning system be installed timers and motion sensors determine hours and usage. Motion sensors will activate lighting as needed during off peak time.
My recommendation is that each floor should also be alarmed and motion sensors installed to assist guard patrols in determining intrusions.
Each floor has emergency maps and coordination materials as well as coordinators to assist in the event of an emergency. Employees receive training when they are hired and safety drills are performed every 90 days. My recommendation is that each floor supervisor should also be issued a panic alarm panel that will indicate necessary force, fire, or medical response if needed (Garcia, 2008)

Works Cited

Department of Homeland Security. (2011, July 13). Retrieved February 11, 2013, from Department of Homeland Security:
Devry University . (n.d.). Eval of Security Programs Weekly Lecture Materials.
Fennely, L. (2004). Effective Physical Security. 3, 100 - 203. Boston.
Garcia, M. L. (2008). The Design and Evaluation of Physical Protection Systems. Burlington, MA: Butterworth-Heinemann.
New York City Government. (2013). NYC Buildings Safety and Enforcement. Retrieved February 15, 2013, from NYC.GOV:


Similar Documents

Premium Essay

Organizational Security Survey

...Evaluation of Security Programs SECURITY SITE SURVEY REPORT THE DEVRY CENTER  9210 HIGHER EDUCATION DRIVE NEW YORK, NY 11747 OVERVIEW A security survey is the official procedure utilized to review specific applications, areas, or Processes of residence or a business to document security, risk vulnerabilities, and authenticate the program in place (Broder & Tucker, 2011). One could perform a survey from all the risk perspectives such as facility security, physical security, or life safety. An expert conducts a involving a pre-determined constraint of checklist as well as an official reporting system. A security survey is a significant element of the general risk and security program (Craighead, 2009). When carrying out a security survey one must set clear goals. The goals would also be extensive from reviewing the fitness of the whole security program to more summarizing goals, such as the value and effectiveness of the physical security of the programs (Luis, 1994). SITE DESCRIPTION The Devry center building is located in downtown New York City on a four-acre piece of land. The building is a thirty story high containing 1,250 underground garage parking spaces and a rooftop garden. The building has a maximum capacity of 2000 tenants, and the tenants occupy the 27th and 30th floor of the building. SCOPE I conducted the security survey at Devry Center on December 1, 2013 to December 5, 2013. This......

Words: 1939 - Pages: 8

Free Essay


...assisted a Military Police Unit while deployed. Currently completing a Technical Management degree at DeVry University of New York. Seeking to utilize skills developed in the Marines to continue to progress gain experience. Areas of Expertise * Project Management * Problem Solving * Combat Experience * Bilingual English/Spanish * Weapons Training | * Team Development * Strategic Planning * Project Scope/Definition * Police Officer Training * Collaborative Teamwork | * Process Improvement * Current Secret Clearance * Communication Skills * Able to work under stressful and fast paced environments | ------------------------------------------------- Professional Experience Security Supervisor, Premier Security Services 2013-present Full Time 40 Hours * Oversee that all aspects of the security function on-site is performed in a diligent manner (staffing, scheduling and on-site training all Premier Security Services personnel assigned to site which held over 1,000 apartments). * Ensure that contract-required training and screening elements for security personnel have been met. * Maintain overtime to a preset requirement designated by Premier Security. * Ensure quality of service and contract compliance by regularly inspecting security personnel assigned to site. * Perform other operations related functions...

Words: 469 - Pages: 2

Premium Essay

Devry Card 415 Complete Course-2015 December

...Devry Card 415 Complete Course-2015 December (All Discussions And All Assignment Except Week 7 Pactice Interview) IF You Want To Purchase A+ Work then Click The Link Below For Instant Down Load IF You Face Any Problem Then E Mail Us At JOHNMATE1122@GMAIL.COM Question week 1 Personal Values (graded) Chapter 1 of our text focuses on an understanding of one’s place in one’s field through such things as personal traits, preferences, and values. Evaluate the list of personal values that employers seek, found on page 8 of our text. Share two of the personal values listed that you feel are the most important. Support your view with examples from personal work experiences when possible. week 2 Self-Assessment Exploration (graded) In anticipation of this week’s self-assessment assignment, go to and explore the many self-assessment sites presented. Without choosing sites that are fee based, take several of the surveys in a few different categories. Did your results confirm what you knew about yourself or did they surprise you at all? Name several of the traits, interests, skills, and/or values that you discovered and link them to success in your chosen field.week 3 SMART Goal Practice (graded) Let’s talk a bit about setting goals. Goals are easy to set but a bit harder to make a reality. This week’s lecture defines and gives...

Words: 2918 - Pages: 12

Free Essay

Leadership and Organizational Behavior

...19, 2011 DeVry University is an accredited nationwide University whose headquarters are based in Chicago, Illinois; there has also been global expansion to Belize and Calgary. DeVry University’s primary goal and focus is providing quality practitioner oriented education to students and has for nearly 80 years. “The Sacramento Center, as the campus is called, is booming. Marcela Iglesias, who has been dean since it opened in 2003, estimates that the campus will exceed its capacity of 825 students within a year, and DeVry officials have begun to search for more space.” (Keller, 2010). Along with DeVry University, Carrington College, Ross University, Keller Graduate School of Management, Becker and Stalla have also been acquired under the DeVry University Inc. umbrella and are affiliated with the brand. Advanced Academics is a school recently acquired that is targeted to middle school and high school students as a means of completing their middle school and high school degrees, to ensure a greater chance of success and continuing their education after they graduate; and also been acquired under the DeVry University Inc. umbrella and are affiliated with the brand. “DeVry's origins trace back to 1931, when Dr. Herman DeVry established DeForest Training School in Chicago to prepare students for technical work in electronics, motion pictures, radio and, in later years, television. The school's name was changed to DeVry Technical Institute in 1953, which then became DeVry......

Words: 7607 - Pages: 31

Premium Essay

Engl 227 Final Research Paper

...Research Report on Negative Messages Spread Through Social Media DeVry University January 20, 2012 Devry Alum Creek Campus 1350 Alum Creek Dr. Columbus, OH 43209 February 20, 2012 Professional Writing professor Devry Alum Creek Campus 1350 Alum Creek Dr. Columbus, OH 43209 Dear Professor: We are pleased to inform you that the research report that was assigned to us is finally complete. The research report was about the negative impact on society through social media and we have learned quite a lot from this group project. As you read through our report, you should keep in mind what is being said to see the war we fight on social media. We feel that not only you but everyone should take the war on social media into consideration because it affects our lifestyle. Social media constantly shoves us toward choices that we might not want to make. It also shows your children the wrong way to feel about themselves and others; this could potentially lead to other endeavors in their life leading to bad mistakes and relationships. Thank you for your much appreciated time. Sincerely, Table of Contents Title Page i Letter of Transmittal ii Table of Contents iii Abstract iv Introduction 1 Impact on Relationships 1 Personal relationships 1 The evolution of signing on 2 The reversal of an initially positive social......

Words: 2949 - Pages: 12

Premium Essay

Mis 535

...MIS535 Week 7 Discussion How phishing attacks have compromised major systems? Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks. In a typical phishing attack, the attacker puts up a Web site that looks nearly identical to the victim's Web site. Technology changes fast, our genetic code and learned behaviors not so. As security professionals, we must concentrate not on technical measures, but on education, education, education. Phishers often set up the fake sites several days before sending out phishing e-mails. One way to stop them from swindling customers is to find and shut down these phishing sites before phishers launch their e-mail campaigns. Companies can outsource the search to a fraud alert service. These services use technologies that scour the Web looking for unauthorized uses of your logo or newly registered domains that contain your company's name, either of which might be an indication of an impending phishing attack. This will give your company time to counteract the strike Phishing attacks bring with them other risks and costs as well; including the direct IT costs to locate the source of data loss. Organizations should establish a cross-functional anti-phishing team and develop a response plan so that they're ready to deal with any attack. Ideally, the team should include representatives from IT, internal......

Words: 2248 - Pages: 9

Premium Essay

We'Re Talking

...We’re Talking Judith Mullins Marketing Management 522 Dr. James Hess DeVry University 1.0 Executive Summary The adolescent years can be very challenging for some teenagers and their families. We’re Talking is a nonprofit agency providing mentoring programs for young men and women in South Nashville in Davidson County. While adolescence can be an emotionally intense, stormy phase for virtually all teenagers, sometimes a teen's struggles require special intervention. Many teens struggle with issues related to mental health, family relationships, friends, school performance, substance abuse, sexuality, and other high-risk behaviors. (HelpStartsHere,2005) This program will form partnerships with local school districts, community centers, churches and the juvenile court systems. We’re Talking’s goal is to offer a sense of security to young people that will promote friendships, strong interpersonal skills, and reaffirm a sense of hope in the future. It is these through personal relationships that a sense of individual responsibility can be reestablished that will give the youth desire to follow through on a path to adulthood with a sense of pride and accomplishment (Palo Alto Medical Foundation, 2013). 2.0 Situation Analysis We’re Talking was founded 15 months ago by three women who were looking to make a difference in the lives of young men and women. This company was created as a result to teach life and survival skills to disadvantaged youths in the community. As...

Words: 2760 - Pages: 12

Free Essay

Comparing Multimedia and Design Career Fields

...Comparing Multimedia and Design Career Fields Ashley Raybuck DeVry University English 227 October 17, 2013 Table of Contents Page Introduction …………………………………………………………………………………………………2 Web Design versus Graphic Design What is the difference? .........................................................................................................3 Skill Sets……………………………………………………………………………………………...3 Work Environment Web Design………………………………………………………………………………………….4 Graphic Design……………………………………………………………………………………..5 Educational Requirements Web Design…………………………………………………………………………………………5 Graphic Design…………………………………………………………………………………….5 Projected Career Outlook Web Design…………………………………………………………………………………………6 Graphic Design…………………………………………………………………………………….6 Salary Web Design………………………………………………………………………………………...6 Graphic Design……………………………………………………………………………………6 Conclusions and Recommendations…………………………………………………………………7 References…………………………………………………………………………………………………8 Introduction When choosing a career path, it can be a bit intimidating. There is lots of information to sift through, such as salary, education needed, what skill sets are required, what is the work environment like, and the list can go on and on. It also can be a bit difficult because each person wants to make sure that not only can they support themselves or their family, but will they be happy with this choice for, sometimes, the rest of their lives? Choosing can be a difficult decision, but with the...

Words: 2083 - Pages: 9

Free Essay

Sec 320

...Perimeter Security Applications Robinson Paulino DeVry College of New York Sec- 330 Professor: Gerard Beatty Perimeter Security Applications Outline Introduction 2 Intruder Detection Accuracy 3 Security Cameras 4 1. Using Size Filters for Video Analytics Accuracy 4 2. Geo-Registration and Perimeter Security Detection Accuracy 5 3. Clarity against a moving background 5 Perimeter Security Best Practices 6 Auto Tracking PTZ Camera 6 Long Range Thermal Camera 6 Covering Perimeter Camera Blind Spots 7 Determine a Perimeter Camera’s Range 7 Perimeter Fence . 8 Chain-Link Fences Protection 8 Electric and Infrared Fences 8 Fiber Optic Intrusion Detection Systems 9 In-Ground Intrusion Detection Systems 10 References 11 Perimeter Security Applications Introduction Physical security is the protection offered for property, these may be buildings or any other form of asset, against intruders (Arata, 2006). . The idea therefore, is to keep off unwanted persons or objects from ones premises. One’s premise is defined by a boundary which separates private property from the rest of the land. This boundary is referred to as the perimeter. The perimeter could be physical or logical. Physical security is intended to keep intruders from land and grounds around such property. Logical perimeters on the other hand, are for protection against computer sabotage or any other remote malicious activities (Fennelly, 2012). In a nutshell, perimeter security......

Words: 2429 - Pages: 10

Premium Essay


...Senior Project BUSN 460-Professor T. Wischer DeVry University November 21, 2013 6 Issues facing CanGo from week 3and week4 Maurine Edwards Market Research Flow Charts/Data Brent Tucker Leadership Financial Caromill Almanzar Website/User Friendly ASRS 3 Issues facing CanGo from week 3 Jack’s justification for the new system (ASRS) - Caromill Almanzar Jack feels that the company should go under a new system to increase efficiency for their warehouse and inventor. Liz is concerned that the investment for the (ASRS) may not yield the necessary return to justify the investment. Jack’s argument is, the (ASRS) will help tremendously with the pickup station operators, to an extent that the station will be gone. Currently operators pick about 45 books per hour, the new system has the capacity to pick 360 books per hour. Liz isn’t convinced with Jack, She’s has doubt with the expense. She is also concerned about the integration of the system, the website, and their discount system. The only benefit that she sees with the new system is the reduction of labor. Recommendation: The ASRS is generally applied in applications where high volumes of inventory are moved into and out of manufacturing or distribution operation. The ASRS system typically is considered an alternative to fork lifting, and manual material handling. The system also saves space and building cost. The issue with this system will be with the process stability, capital effectiveness,......

Words: 2165 - Pages: 9

Premium Essay

How Identity Theft Affect the Culture of Our Society

...How Identity Theft Affect the Culture of our Society Sections I, II, III and IV Rodrekus Baskin DeVry University How Identity Fraud and Theft Impact the Culture of Our Society Section I Identity theft affects millions of Americans every day. Scam artists and hackers lay in wait for an unsuspecting person to get caught up their scheme through ignorance or naivety so they can take full advantage of their personal information to do as they desire with it. Problem is, it infiltrates and depreciates the integral infrastructure of our society which creates a cultural lapse through the declination of economic and cultural growth and double jeopardizes an already unstable system to the brink of its destruction. To understand how identity theft works or happens, one need to know and understand what identity theft is, the different forms of identity theft, cyber security and the impact on its victims, the methods used by identity thieves to obtain identifying information about their victims, and preventive solutions. How Identity Theft Affect the Culture of Our Society A single mother looking forward to advancing her financial situation comes across what appears to be the opportunity she has been waiting for. A real estate agent has provided her with the fortune of owning her own home and without skepticism of any impending dangers or foul play, even though he displayed what appeared to be proper credentials, she relinquished all of her personal data...

Words: 5785 - Pages: 24

Free Essay


...effective goal-setting program. Goal-setting is the process of specifying outcomes toward which individuals, teams, departments and organizations will strive and is intended to increase organizational efficiency and effectiveness (Hellriegel and Slocum, 2011). Goals motivate individuals, teams and whole organizations to perform better and at higher level (Adenike, 2009). As a matter of fact, it is considered one of the most important motivational tools for affecting the performance of employees in organizations (Hellriegel and Slocum, 2011). Achieving goals is certainly not an easy task, but Allstate Corporation believes that its diversity strategy is one of the company's most important competitive weapons. According to James DeVries, senior vice president of human resources, this strategy has two major points: one internally and one externally focused. The internal diversity focus is about discovering potential in Allstate's workforce by providing them with all necessary tools, resources and opportunities to succeed. The external focus of diversity is about making sure that the Allstate's workforce matches the experience, backgrounds and sensitivities of the markets it serves (Hellriegel and Slocum, 2011). Allstate made its first action program back in 1976. The main question human resource management faced was how to incorporate all differences together and make a program that will lead to achievement of corporate goals? They made a program that consists......

Words: 1353 - Pages: 6

Free Essay

Implementation of Sharepoint

...Implementation of an Intranet Site within the Chief Financial Officer Division at the Texas Department of Aging and Disability Marlo King IS535 Managerial Applications of Information Technology Devry University-Keller Graduate School of Management April 15, 2012 Table of Contents Proposal 3 Topic 3 Problem 3 Approach 3 Methodology 4 Milestone 1 (Restated Business Problem) 5 Company Background 5 Business Issues 6 Solution Benefits 7 Technical Approach to Solution 8 Milestone 2 (Technological Solution) 9 Technical Solution 10 Value of SharePoint Implementation 11 Business Process Changes 12 Execution 12 Milestone 3 (Closing) 13 Business Practice 13 Conclusion/Overall Recommendations 14 Implementation Plan 15 Summary 16 References 18 Implementation of an Intranet Site within the Chief Financial Officer Division at the Texas Department of Aging and Disability PROPOSAL Topic The Texas Department of Aging and Disability Services (DADS) provides long-term health care and residential services to the elderly and the intellectually challenged. The Chief Financial Officer (CFO) is responsible for making sure the department has adequate funding from State and Federal levels to render these services accurately. It is very important for employees within the CFO division to all feel they are a part of a collaborative effort in working towards the department’s mission, which is to “provide a......

Words: 4338 - Pages: 18

Premium Essay

Accounting vs. Human Resources Research, Comparison, and Recommendation

...ACCOUNTING vs. HUMAN RESOURCES Research, Comparison, and Recommendation Irina Mashevsky DeVry University Contents Introduction 1 The purpose of the report 1 Report organization 1 Sources and methods 1 Job overview 2 Accounting 2 Job description 2 Working environment and hours 2 Human Resources 2 Job description 2 Working environment and hours 2 Job requirements 3 Accounting 3 Skills and personality traits 3 Education/Training 3 Human Resources 3 Skills and personality traits 3 Education/Training 3 Employment outlook 4 Accounting 4 Current statistics 4 Salary 4 Future predictions 4 Related occupations 4 Human Resources 5 Current statistics 5 Salary 5 Future predictions 5 Related occupations 5 Job satisfaction 6 Conclusion 6 Summary 7 References 8 Introduction On average people spend 40-50 years and even longer in the work force, which makes the choice of the career path one of the most important in our lives. A satisfying career can be a source of financial security, benefits, and gives a great sense of accomplishment. This decision requires a lot of thought and research. To make the best choice possible it is important to choose a career that is compatible with an individual’s personality, capability, and background, has the opportunity for professional growth, and requires a practical amount of education and training. The purpose of the report The purpose of this report is to present, analyze, and evaluate two career......

Words: 3083 - Pages: 13

Premium Essay

Case Study N0 5

...Case Study N0 5 SEC – 320: Risk Loss Prevention, Emergency Planning Professor: S. W. Smith DeVry University Prepared by: MLZ Sunday, November 16, 2014 Table of Contents Introduction 3 Municipal Emergency Response to a Dirty Bomb Incident (Orlando, FL) 4 Low-level Nuclear Material Stateside and Abroad 5 Logistics of Decontamination 6 Disposal of Contaminated Property 7 Clean-Up Materials 8 Conclusion 10 References 11 Introduction According to the United States Nuclear Regulatory Commission a “Radiological Dispersal Device (RDD) commonly known as Dirty Bomb is the combination of conventional explosives for example plain dynamite mixed with some radioactive materials.” If detonation of a dirty bomb would occur in a place consider as a vacation destination such as Orlando, Florida which happens to be a dense populated tourist location, where we find many Theme Park attractions, a major international airport, and location for many manufacturing facilities and important businesses, it would create great chaos, mayhem and devastation. Reason for the major chaos and despair is because as I just explained a dirty bomb uses dynamite, and other explosives to scatter radioactive dust, smoke, and other materials in order to inflict bodily harm, destroy property, and finally cause overwhelming mayhem with a dose of radioactive contamination. Most of the danger of a dirty bomb would come from the blast of the explosion itself; this in metropolitan......

Words: 2802 - Pages: 12