Premium Essay

Physical Security Survey

In: Computers and Technology

Submitted By Rayroman
Words 1217
Pages 5
Physical Security Survey Report for: Magnolia Utility Citizens’ Cooperative
Prepared for: Janet Garret, Director of Security
By: Top Notch Security Specialist Jake Johnson
Date of Survey: 6 January 2012


My company conducts physical security surveys and we were hired to perform an evaluation on Magnolia Utilities Citizens’ Cooperative. I was given access to many personnel throughout the organization and was able to receive tangible data to conduct a thorough survey. Mr. Gorsky was in charge of the security check point at the vehicle yard. Mr. Videtti is the warehouse supervisor. Mr. Williams is the tool and equipment distribution center supervisor. Interviewing these personnel gives me an inside look to the physical security layout.
The Magnolia organization currently employees 32 personnel and business is conducted within two separate locations. Cash management area, Electric Way hours are conducted between 10AM to 12PM and 2PM to 5PM. Cash Management Area South Street functions are conducted between 8AM and 6PM. Warehouse tool and equipment distribution center is opened from 5Am to Midnight. The provided information and information gathered throughout the survey has led me to an evaluation which concentrates on areas that need improvement.
After interviewing all employees it is evident that not all of them receive security training on a regular basis. In order to maintain a highly secure working environment all employees regardless of their duties should receive security training. The old saying prevails “you are only as strong as you’re weakest link”. It is evident that not all employees within this organization are up to date with their training.

1. What police agency has jurisdiction over the site?
The Magnolia Townships Sheriff’s Office.
2. Has the site terminated anyone for theft, fraud, etc., or drug...

Similar Documents

Premium Essay

Computer Forensics and Cyber Crime

...Some weaknesses identified in the process of a security survey may be: vulnerability to injury, death or destruction by natural causes, vulnerability of corporate assets to outside and within criminal activity, physical security of property and activities or operational procedures or physical hazards that may lead injuries and legal liabilities. In addition, a security survey measures the effectiveness of existing protection policies and standards, how employees conform to them...

Words: 686 - Pages: 3

Premium Essay

Ccsecurity Mp Outlin

...By first prioritizing the identified campus risks, and then using a multi-faceted approach from the key areas of physical environment, security staffing, and feasible technology, CATALYST will present a clear security philosophy to guide the selection and implementation of campus security upgrades. The Security Master Plan will be developed to address long-term system compatibility, communication...

Words: 1345 - Pages: 6

Premium Essay

Organizational Security Survey

...Evaluation of Security Programs SECURITY SITE SURVEY REPORT THE DEVRY CENTER  9210 HIGHER EDUCATION DRIVE NEW YORK, NY 11747 OVERVIEW A security survey is the official procedure utilized to review specific applications, areas, or Processes of residence or a business to document security, risk vulnerabilities, and authenticate the program in place (Broder & Tucker, 2011). One could perform a survey from all the risk perspectives such as facility security, physical security, or life safety. An expert conducts a involving a pre-determined constraint of checklist as well as an official reporting system. A security survey is a significant element of the general risk and security program (Craighead, 2009). When carrying out a security survey one must set clear goals. The goals would also be extensive from reviewing the fitness of the whole security program to more summarizing goals, such as the value and effectiveness of the physical security of the programs (Luis, 1994). SITE DESCRIPTION The Devry center building is located in downtown New York City on a four-acre piece of land. The building is a thirty story high containing 1,250 underground garage parking spaces and a rooftop garden. The building has a maximum capacity of 2000 tenants, and the tenants occupy the 27th and 30th floor of the building. SCOPE I conducted the security survey at Devry Center on December 1, 2013 to December 5, 2013....

Words: 1939 - Pages: 8

Premium Essay

Mxx, X.

...The instrument used in this study was titled "Our School's Safety", designed by the California Department of Education, consisted of 36 Likert-scale questions and examined the physical, social and cultural aspects of school safety in order to procure a comprehensive overview of important factors related to safety. The completed surveys were analyzed. The results showed that, the school physical, social, and cultural safety levels were in an acceptable situation. Majority of all students agree or strongly agree that social environment safety (73.2%), cultural environment safety (71.6%) and physical environment safety (65%) levels were satisfying. Doroodzan middle school successfully provides safety and it was determined that school potential for safety problems was reduced, due to the safety and security interventions in place and...

Words: 4302 - Pages: 18

Free Essay

Mobile Forensics in Healthcare

...Patient information security has become a major concern, especially with the wide adoption of electronic medical records. Mobile Forensics has been utilized by law enforcement to systematically procure and preserve mobile evidence. However, the adoption of mobile forensics in the healthcare lags behind. The goal of our project is to examine the options and to provide recommendations for adoption and customization of mobile forensics in the healthcare field. An open-ended survey of local healthcare and related facilities around Indianapolis has been explored to examine the current status of Mobile Forensics in the healthcare field. The results have been evaluated using statistical analysis. A methodology is being proposed that would use mobile forensics procedures taking into account the regulatory measures that have to be instituted due to the Health Insurance Portability and Accountability Act (HIPAA) of 1996. Keywords-mobile forensics, healthcare. Evelyn Walton Informatics Indiana University Purdue University Indianapolis 799 W. Michigan St., ET 301 Indianapolis, IN 46202 forensics has been introduced by the law enforcement field to prescribe a thorough structure of policies and procedures to ensure that criminal evidence is properly detected, extracted, and preserved, thus ensuring that all evidence obtained is legally valid and can be used as evidence in a court of law. [2] Applying forensics...

Words: 4340 - Pages: 18

Free Essay

Merger Integration at Boa

...(IJCSIS) International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, 2009 A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks Dr. G. Padmavathi, Mrs. D. Shanmugapriya, Prof and Head, Dept. of Computer Science, Avinashilingam University for Women, Coimbatore, India, Lecturer, Dept. of Information Technology, Avinashilingam University for Women, Coimbatore, India, Abstract—Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats....

Words: 5174 - Pages: 21

Premium Essay

Risk Assessment Checklist

...• To have the client perform a security assessment analysis and to develop a comprehensive Site Security Plan and processes by using the rings of protection concept. • To have the client develop a comprehensive communications and emergency communications plan. Pre-survey Information Information that should be researched and on record from the risk assessment General Information | |Date survey initiated and completed. |...

Words: 3641 - Pages: 15

Free Essay

Labor & Company Law

...The programme aims at strengthening the capacity of FPMU and the policy wings and planning units in partner ministries to effectively implement and monitor the Plan of Action of the NFP in order to improve food availability, enhance physical, social and economic access to food, and ensure safe and nutritious food. It also aims at expanding and deepening the civil society capacity to conduct high quality research on food security, and to establish an effective platform for dialogue between government policy officials and civil society researchers to better inform the elaboration and implementation of the NFP as well as its Plan of Action. Copies of this publication can be downloaded from or requested from: _________________________________________________________________________________ NFPCSP Email: Khaddya Bhaban Web site: 16, Abdul Ghani Road, Dhaka-1000 Bangladesh EVALUATION OF RESEARCH ORGANIZATIONS IN BANGLADESH Prepared by: Stanley R. Johnson Former Vice Provost of Iowa State University, USA Distinguished Professor of Economics Emeritus at Iowa State University, USA Assistant to the Dean for...

Words: 54214 - Pages: 217

Premium Essay

Security Management Case Study #1

...Martin November 6, 2011 Case Study #1 Building the Foundation – Security Assessments As the security manager of a major corporation tasked with creating the initial security assessment and auditing program for the company, the first step in developing proposals for the security services would be conducting a comprehensive survey (policies, procedures and operations) of the entire facility to identify the critical factors affecting the security of the premises (Broder, 2006). The next step would be to analyze the vulnerabilities and recommend protection which is cost-effective (Broder, 2006). To start, establishing policies and procedures which define the mission of the security department should be the bare minimum in the role of the security department....

Words: 802 - Pages: 4

Premium Essay

A Key Concept in Information Systems

...Computer and network security has become very important to businesses, government, military, and individuals. Many companies have been compromised and personal information obtained and used without authorization. It is very important to have computer and network security to keep hackers and malware from collecting data and destroying a computer system and network. Computer security protects all of the data that is stored on your computer. Every component should be protected that includes hardware, software, and data. The history of Network security started when hacking crimes started in the 1980’s. Robert Morris was a computer hacker that released a worm that affected 6,000 computer systems. It created a large monetary financial lost because of a computer worm. The Computer Emergency Response Team (CERT) was said to be form after the attack to inform users they had security problems. ”The Department of Homeland Security's United States Computer Emergency Readiness Team (US-CERT) leads efforts to improve the Nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the Nation while protecting the constitutional rights of Americans (US-CERT).” Hospitals have major concern in protecting computer and network security....

Words: 1025 - Pages: 5

Premium Essay

What Determines Obesity in Today’s Society

...The third study “State of American well-being 2014 Obesity Rankings” is more about the ratings on obesity in the United States and has done 2.2 million surveys to capture how people feel about and experience their lives and compare them with the five elements purpose, social, financial, community and...

Words: 2697 - Pages: 11

Free Essay


...Work stress and job performance Jungwee Park W ork stress is defined as the harmful physical and emotional responses that occur when job requirements do not match the worker’s capabilities, resources, and needs (National Institute of Occupational Safety and Health 1999). It is recognized world-wide as a major challenge to individual mental and physical health, and organizational health (ILO 1986). Stressed workers are also more likely to be unhealthy, poorly motivated, less productive and less safe at work. And their organizations are less likely to succeed in a competitive market. By some estimates work-related stress costs the national economy a staggering amount in sick pay, lost productivity, health care and litigation costs (Palmer et al. 2004). Work stress can come from a variety of sources and affect people in different ways. Although the link between psycho-social aspects of the job and the health and well-being of workers has been well documented (Dollard and Metzer 1999), limited work has been done on the effects of distinct stressors on job performance. As well, various protective factors can prevent or reduce the effects of work stress, and little research has been done toward understanding these mitigating individual and organizational factors. One important source of work stress is job strain....

Words: 2340 - Pages: 10

Free Essay

Devry Security Site Survey

...SECURITY SITE SURVEY DEVRY CORPORATE HEADQUARTERS – The Devry Center Jim Jones February 15, 2013 Eval of Security Systems Professor Semore Butts Overview This site survey was conducted by Jim Jones on February 15, 2013. This document is intended to detail the security survey and analysis for Devry Corporate headquarters. The report will detail the strengths and weaknesses of each of the operational areas. While it will detail an overview of staff and visitor procedures it will not be a personal evaluation of the staff’s readiness or ability to carry out those activities and responsibilities. The objective of the recommendations in this audit are to ensure that Devry Corporate headquarters complies with state, local, and federal regulations for the safety of its employees, the public, and visitors. It will also assist with recommendations that ensure Devry Corporation is free from any legal liabilities as a result of action or non action as it relates to security and safety (Garcia, 2008). Summary The Devry Corporate Headquarters is the central location for Devry Inc., which owns and operates fourteen educational institutions, their supporting both domestic and international operations. These Institutions are comprised of large scale educational facilities requiring sophisticated infrastructures. Each of the supported institutions must adhere to the Higher Education Act standards of security and safety....

Words: 2015 - Pages: 9

Premium Essay

Request for Proposal

...Key Terms: access control, biometrics, convenience sampling, customer perceptions, fingerprint identification, in-house research, long-term customer, quantitative research, quota sampling, respondent, security. This research was designed to study the acceptance of fingerprint scanning technology among customers and employees. This project addressed the need for fingerprint scanning technology at Associated Bank to reduce the need for photo identification when receiving cash back at the end of a transaction. The purpose of the study was to determine the level of acceptance of the fingerprint identification technology at Associated Bank by both customers and employees. The following objective was offered: compare the acceptance of fingerprint scanning technology for identification purposes between males and females and different age groups. The research...

Words: 4138 - Pages: 17

Premium Essay


...The Security Rule establish a national set of security standards for protecting certain health information that is held or transferred in electronic form. The Security Rule operationalized protections by addressing both...

Words: 1094 - Pages: 5