Free Essay

Site Security Survey

In: Other Topics

Submitted By ajames10560
Words 3373
Pages 14



1. Entry Barriers 3 2 Signs 5 3. Lighting 6 4. Windows 7 5. Equipment Near Street Level Windows 8 6. Interior Patrol Visibility 9 7. Burglary Resistant Glazing Materials 9 8. Shrubbery 10 9. Skylights 10 10. Vents 10 11. Air Conditioners 11 12. Grills and Gratings 11 13. Doors and Door Frames 12 14. Strikes 14 15. Key Control 15 16. Equipment Locks 15 17. Hinge Protection 16 18. Roof Accessibility 17 19. Fences 18 20. Vehicle Security 19 21. Padlocks 19 22. Hasps 20 23. Chains 20 24. Safes 21 25. Inventories and Engraving 21 26. Reporting Crimes 22 27. Employee Participation 22


|A. Normal business hours |
| | |
|1. |Place signs limiting access to "EMPLOYEES ONLY" to discourage people from entering an area. |
| | |
|2. |Have all visitors pass through a reception area. |
| | |
|3. |Always have at least one person in the reception area. If there is no one available to watch over the area, lock all entries to |
| |prevent unauthorized entry. |
| | |
|4. |Never leave one employee isolated in an unsecured area. |
| | |
|5. |Escort visitors in areas containing equipment and/or records not under constant surveillance. |
| | |
|6. |Employees should offer to escort visitors entering the facility. |
| | |
|7. |Have one employee and an alternate responsible for locking all doors, windows, gates, vehicles, and setting alarms in each work |
| |area. |
| | |
|8. |Post nonpublic areas and encourage employees to inquire about strangers in these areas. |
| | |
|9. |Encourage employees to keep doors closed, keep valuables out of sight, and to lock desks, files, and other storage compartments |
| |before leaving. |
| | |
| 10. |Lock inner office areas from the exterior side. |
| | |
|11. |Install an electrical access control system on the reception area door. |
| | |
|12. |Install a lockable entry gate at the reception area counter. |
| | |

|B. After-hours, weekends, holidays |
| | |
|1. |Employees should sign in and out after-hours. |
| | |
|2. |Keep doors locked and control entry to areas with 24-hour operation. |
| | |
|3. |Encourage employees to park in well lit areas close to their work stations. |
| | |
|C. Deliveries and pick ups |
| | |
|1. |Do not leave goods unattended on loading docks or by doors. |
| |Plan to have incoming goods stored immediately. |
| |Require identification from anyone removing goods from the premises. |
| | |
|2. |Keep delivery doors closed when NOT in use. |
| | |
|3. |Do not leave notes on delivery doors, allow locks to be taped open, or wedge doors ajar. |
| | |
|4. |Use physical barriers to separate shipping areas from receiving areas. |


|A. Office interior |
| | |
|1. |Use signs to restrict certain areas of the office to “AUTHORIZED PERSONNEL.” |
| | |
|2. |Use signs to direct the public to locations for service. In addition to improving security, this strategy will reduce foot traffic |
| |in nonpublic areas. |
| | |
|3. |Use color-coded floor stripping in conjunction with signs to channel and control public traffic. |
| | |
|4. |Label emergency exit doors with the words : |EMERGENCY EXIT ONLY |

|B. Parking lots and office exterior |

|1. |All doors providing public access to the office should have a |PUBLIC ENTRANCE |
| |conspicuous sign posted on the exterior side stating: | |
|2. |All doors not providing public access should be labeled: |NOT FOR PUBLIC ACCESS |

(Note: Keep nonpublic doors locked to prevent their use by unauthorized persons.)


|A. Interior lighting |
| | |
|1. |Unless valuable equipment is visible from the outside, leave interior lighting on during the hours of darkness. |
| | |
|2. |To save energy use a timer or a light sensing device to control these lights. |
|3. |Unless valuable equipment is visible from the outside, lighting should be sufficient to allow passing police patrols to observe a |
| |person inside. |

|B. Exterior lighting |
| | |
|1. |Leave exterior lights on during the hours of darkness. |
|2. |To save energy use a timer or a light sensing device to control these lights. |
|3. |Lighting near access doors, around parking lots, and in |Sufficient to illuminate these areas to a constant level of 1 to 1.5 |
| |storage areas should be: |foot-candles at ground level. |
| | |High pressure sodium lighting, which is generally accepted as most |
| | |efficient for exterior security lighting. |


|A. Sliding wood or metal frame windows |
| | |
|1. |Secure sliding wood or metal frame windows by pinning |a. Drill small holes at a downward angle, through the top and bottom of the |
| |from the building interior: |interior channel flange, and halfway through the window frame. |
| | |b. Insert a small hard metal pin in each hole. |
| | |c. Eliminate unnecessary play (movement up and down) by opening the window |
| | |and installing a thin plywood strip along the upper sliding channel so that |
| | |when you close the window it will just clear. |
| | |
|B. Louvered windows |
| | |
|1. |Although adequate locking devices are not available for|Remove and replace with another type window. |
| |louvered windows, there are three methods for securing |Install grills or gratings over them, preferably on the interior side. |
| |such windows: |Epoxy each louvered window to the frame. |
| |
|C. Double hung windows |
| | |
|1. |Secure double hung windows by pinning from the building |Drill holes at a downward angle through the inside window frame where top |
| |interior: |and bottom overlap. |
| | |Continue drilling halfway through the outside frame. |
| | |Insert hard metal pins. |

|D. Casement windows |
| | |
|1. |Secure casement windows with smooth-headed carriage |a. Drill holes, top and bottom, through the frame and window frame. |
| |bolts: |b. Insert carriage bolt, head outside, and secure with wing nut. |
| | |c. Strip the bolt threads or spot weld. |

|E. Transom windows |
| | | |
|1. |These windows should be permanently secured. If you need them for ventilation, use grills or gratings. |


|Equipment located within reach of street level windows creates an attractive target for the window-smash burglar. One or more of the following|
|steps can discourage this type of crime. |
| | | |
|Move all equipment away from the window so it cannot be reached if window is broken. |
|Install a secondary barrier between the window and the equipment, such as grills and/or gratings. |
|Replace the present windows with burglary resistant glazing material. |
|Lock or bolt all portable equipment to desk or table surfaces. |
|Install security film on windows. |


|A clear view from the outside, when tempting equipment is not visible, can help police spot suspicious conditions or activities. |
| | | |
|1. |Unless valuable equipment is visible through your windows, keep drapes and blinds open at night to allow passing police patrols an |
| |unobstructed view of the interior of the facility. |
|2. |Keep windows clear of obstructions. |
|3. |Contact your local law enforcement agency, advising them of your regular procedure. |


|Two types of glazing deters the window-smash burglar: |
| | |
|LAMINATED GLASS comes in several thicknesses. The thicker the lamination, the better the resistance. Although this type of material will |
|break with sufficient force, it will take a burglar much longer to create a hole large enough to get through. |
|POLYCARBONATES are the best glazing materials currently available. While this material is expensive, it will not freeze, burn, or break. |


|Untrimmed shrubbery offers the burglar an excellent hiding place, especially if it is near windows, doors, thin walls, or fences. Given |
|adequate time and concealment, burglars have been known to penetrate solid walls, including those made of heavy brick. |
| | |
|1. |Trim and thin shrubbery below the window line and away from doors and fences. |
|2. |Do NOT leave space between bushes or hedges and the walls of the building. |


|Skylights are prime targets for roof burglars. |
| | |
|1. |Secure skylights with grills or gratings fastened on the interior side. |
|2. |Include skylights in your alarm systems. |
| | |

|Vents are a primary entry point for burglars |
| | |
|1. |Cover your vents with a grill or grate to prevent their use as an entry point. |

| |
|Small air conditioning units which have been installed either in the wall or a window should be permanently secured to prevent easy removal. |
| |
|A. Wall type |
| | |
|1. |The unit should be permanently secured to the wall, preferably with carriage bolts through the wall. |
|2. |Once the bolts are installed and the nuts tightened, strip the threads to prevent easy removal. |

|B. Window type |
| | |
|1. |Fill the space between the unit and the window frame with 2 inch thick wood secured to the window frame with carriage bolts. |
|2. |Secure the unit to the wood. |


|Grills and gratings provide additional security for windows and other openings, and can be installed in ways that enhance the looks of a |
|building. |
| | |
|1. |They must be installed on the inside of the opening and secured to make it difficult for intruders to get around them. |
| | |
|2. |The openings between grills and gratings should not exceed 6 inches. Where equipment is located near windows, you may need smaller |
| |openings, depending on the type and size of the equipment. |
|3. |Accordion and roll-down metal covers should be used for front windows. |
| | |
|4. |Fixed grills or gratings are used to cover rear windows, roof vents, air conditioning vents, and skylights. |
| | |
|5. |All grills and gratings should have a fire release from the interior. |


|A. Single swing |
| | |
|1. |Use material rated burglary resistant for glazing in or near doors. |
|2. |These doors must: |Contain a 1-1/2 inch laminated bolt, or, contain a 3/4 inch hooking bolt |
| | |with a ceramic insert. |
| | |Have double cylinders equipped with hardened steel cylinder guards. |
| | |Have a steel strike reinforcer. |

|B. Wood frame glass |
| | |
|1. |These doors must contain a 1 inch dead bolt with a hardened steel roller bearing insert and |
| |double cylinders equipped with hardened steel cylinder guards. |
|2. |If the door contains plate glass, you should protect it with a secondary barrier |
| |(grills and gratings) or replace the glass with burglary resistant rated glazing. |

|C. Glass in door |
| | |
|1. |Secure doors with small panes of glass in one of the |Replace the glass with a burglary resistant glazing material. |
| |following ways: |Replace the door with a solid wood or metal door. |
| | |Protect the glass with grills or gratings. |
|2. |If there is glass within 36 inches of the locking |Add a double cylinder dead bolt lock. |
| |mechanism: | |

|D. Solid wood |
| | |
|1. |Use at least a single cylinder 1-1/2 inch dead bolt equipped with a hardened steel roller bearing and cylinder guard. |

|E. Double doors |
| | | |
|1. |Secure stationary or inactive doors with a 1 inch hard |The bolt actuator should not be movable or accessible when doors are |
| |metal flush bolt on top and bottom. |closed. |
| | |The bolts must fit firmly into their strikes. |
| | |If the doors are metal with aluminum strike areas, the strikes should be |
| | |reinforced with steel. |
|2. |If the double doors are on a garage, shed, or storage room, consider a locking cross bar. |

|F. Dutch doors |
| | |
|1. |These doors must be handled as two separate doors and secured in the same manner as wood frame glass or solid wood doors. |
|2. |The doors can be replaced with a single solid core door. |
|3. |If you are going to install vertical cross bars, they should be metal. |

|G. Sliding doors |
| | |
|1. |Aluminum frame glass can only be adequately secured from the inside. |
|2. |Wood or metal sliding doors: |Secure in the same manner as sliding glass windows, or by a key operated |
| | |lock. |
| | |These doors must fit solidly in the upper and lower tracks. |
| | |Secure the door with an adequate hasp and padlock. |

|H. Door frames |
| | |
|1. |Reinforce door frames to prevent spreading of the frame by hammers, jacks, crowbars, or other implements. |

|I. Workmanship |
| | |
|1. |Poor workmanship is often the occasion for unwanted intrusions. |Excess space between the door and the frame and/or strikes |
| |Inspect your doors carefully for faults that could encourage forced |will invite burglars to place tools in these spaces and pry |
| |entry. |the door open. |


|A. Wood door frames | |
| | | |
|1. |You should reinforce the strike area of all door frames with steel strike plates. |
|2. |Anchor exterior door frames with not less than four screws at least 3-3/4 inches long. |

|B. Aluminum door frames | |
| | | |
|1. |Reinforce door frames with steel strike plates to prevent door jamb peeling. |
|2. |Reinforce the inactive aluminum double door frames with steel strike plates when double doors are in use. |
|3. |Protect strike areas by a strike guard or astragal extending at least 6 inches above and below the strike plate. |

|A consistent key control program can reduce property loss and protect employees. |
| | | |
|1. |Have one person in charge of issuing keys and obtaining signed receipts from employees. |
|2. |Re-key your locks when a key is lost and recovery is unlikely. |
|3. |Review and update your key control system: |Issue only the minimum number of keys necessary. |
| | |Design the key system so that employees' keys will allow them |
| | |only into areas their duties require. |
| | |Be especially careful in issuing master keys. |
| | |Conduct an annual key inventory to assure employees still have|
| | |the keys they were originally issued. |
| | | |
|4. |Have one person responsible for having new keys made and have all |STATE OF CALIFORNIA |
| |keys clearly stamped: |DO NOT DUPLICATE |
|5. |Re-key your office every five years. If you have high employee turnover, re-key more frequently. |


|If your facility evaluation indicates a serious crime threat exists in your area, you may need to install equipment lock-down devices. |
| | | |
|1. |Contact a reputable office equipment supply store to obtain information on the various types of lock-down devices available. |
|2. |Regardless of the type of lock-down device used on your equipment, be sure that the machine is secured to a non-removable part of a |
| |desk, table, or bench. Never use a lock-down device on a mobile stand or cart. |


|Exposed pins can be easily removed and the door opened from the hinge side. There are four ways to secure these hinge pins: |
| | | |
|1. |Remove the existing hinges and replace them with ones having non-removable hinge pins. |
|2. |Spot weld the hinge pin to the hinge. |
|3. |If the hinge screw holes opposite each other match: |a. Remove one screw from each leaf of the hinge opposite each other. |
| | |b. Insert a small round-headed screw or finishing nail, approximately 1 |
| | |inch long, into the leaf jamb, leaving 1/2 inch. |
| | |c. Drill out the opposite screw hole in the door frame leaf. |
| | |d. This should be done on each hinge. |
|4. |If the hinge screw holes do not match: |a. Drill a hole just above the hinge approximately 1/2 inch into the door. |
| | |b. Insert a 1 inch small round-headed screw or finishing nail, leaving 1/2 |
| | |inch. |
| | |c. Close the door until the screw (or nail) comes in contact with the door |
| | |frame. |
| | |d. Drill into the door frame 1/2 inch where the contact point is made. |
| | |Installation of a hinge pin(s) will create a dead bolt effect across the |
| | |back side of the door. |


|Eliminate easy access to the roof |

|A. Permanent ladders attached to building |
| |
|Solid metal coverings should cover such ladders and should be secured with an adequate hasp and padlock. |
| |
|B. Extension ladders |
| |
|Secure ladders so they cannot be used by unauthorized persons. |
| |
|C. Utility poles |
| |
|Remove the climbing pegs within ten feet of the ground to prevent roof access. |
| |
|D. Trees |
| |
|Trim or remove trees to prevent roof access. |
| |
|E. Trash containers, boxes, lumber, and other objects |
| |
|Keep anything that may be used for climbing away from the building. |
| |
|F. Vehicles and mobile equipment |
| |
|Park vehicles and equipment away from the building. |


|Fences |
| | | |
|1. |A fence surrounding the property will create the first line of defense, providing a psychological and physical deterrent to the |
| |intruder. |
| | | |
|2. |The maintenance of a fence is as important as the installation. Make periodic checks to detect any damage or weaknesses. |
| | | |
|3. |Pay attention to foliage near the fence: |a. Cut weeds and shrubs to ground level or remove them to |
| | |eliminate cover for potential intruders. |
| | |b. Thin or remove limbs and foliage from trees to a height two|
| | |feet above the fence top for maximum visibility. |
| | |c. Plant shrubbery that enhances security along a fence line. |
| | | |
|A. Y-Bar fence top protection |
| | | |
|If permitted by local ordinance, use this type of fence top in high risk areas.|It is comprised of a Y-mounting bar at the top of each fence |
| |post equipped with six strands of barbed wire, three angled |
| |inward and three outward. |
| | | |
|B. Concertina or razor ribbon wire |
| | | |
|Facilities with special security needs may require concertina or razor ribbon fence topping. (Check local ordinances before installation to |
|avoid possible conflict.) |


|Vehicles are often prime targets for theft, vandalism, and burglary. To reduce the likelihood of such incidents: |
| | | |
|Always lock stored or parked vehicles. |
|Keep storage/parking areas well lit, and park with engine compartments facing the street. |
|Install locking gas caps and hood locks to help prevent gasoline and battery thefts. |
|Try NOT to store equipment in vehicles. Inventory equipment stored in vehicles at least monthly. Park vehicles with extensive and/or high |
|value inventory inside. |
|Install hood security rails. |


|A. Padlock requirements |
| | | |
|Minimum 5/16 inch hardened steel shackle, locking heel and toe. |
|Minimum five pin tumbler operation. |
|Some padlock companies place a key code number on the bottom of their padlocks. Write this number down and remove it from the padlock. |


|A. Minimum requirements |
| | | |
|1. |Minimum 5/16 inch hardened steel eye. |
|2. |Mounting the hasp: |a. Use carriage bolts, which should go completely through the door or |
| | |wall on which you are mounting the hasp. |
| | |b. Use a steel plate on the inside to reinforce the hasp. |
| | |c. After you have firmly tightened the nuts, either spot weld them or |
| | |strip the bolt threads. |


|A. Chain requirements |
| | |
|1. |Minimum 5/16 inch hardened steel alloy. |
|2. |Welded links. |


|Safe Requirements |
| | | |
|1. |Locate safes in secure areas, out of public view. |
|2. |Securely anchor lightweight or portable safes to the floor. |
|3. |DO NOT leave your safes combinations in the building. Never record combinations on office desk calendars or in daily reminder |
| |books. |
|4. |Your safes should all meet UL specifications, and safes used to secure money should have a class "E" rating or higher. |


|Maintaining current inventories, and attaching or engraving permanent numbers in a visible location on state equipment accomplishes two goals: |
| | | |
|Reduces the risk of theft: a thief is less likely to steal marked property. |
|Assists in locating the owner agency when property is recovered. |
| | | |
|Procedures: |
| | | |
|1. |Maintain an up-to-date inventory record in the immediate area and make annual inventories of all equipment. |
|2. |Check with your department property protection coordinator for guidelines on engraving |
| |equipment with your State Agency Identification Number (SAIN). |


|The CHP must investigate crimes occurring on state-owned or state-leased property. All crimes must be reported to the CHP. |
| | | |
|1. |If your office is within the CHP designated service area, immediately report any crimes/incidents to the CHP via telephone. (Check |
| |your State Telephone Directory.) |
|2. |If your office is located outside CHP designated service area. |Report crimes/incidents on a Std. 99. |
| | |For emergency services call your local police department or |
| | |sheriff's office for immediate assistance. |


|An active and informed workforce is the backbone of any crime prevention effort. |
| | | |
|1. |Emphasize employee responsibilities to help safeguard persons and property at employee orientations. |
|2. |Require employees to sign receipts for equipment issued and hold them accountable for any losses. Do not issue an employee's last |
| |payroll check until all property has been returned. |
|3. |Encourage employees to challenge strangers in your facility or at your work site. |
|4. |Encourage employees to engrave their personal items with their Driver License number. |

Similar Documents

Free Essay

Devry Security Site Survey

...SECURITY SITE SURVEY DEVRY CORPORATE HEADQUARTERS – The Devry Center Jim Jones February 15, 2013 Eval of Security Systems Professor Semore Butts Overview This site survey was conducted by Jim Jones on February 15, 2013. This document is intended to detail the security survey and analysis for Devry Corporate headquarters. The report will detail the strengths and weaknesses of each of the operational areas. While it will detail an overview of staff and visitor procedures it will not be a personal evaluation of the staff’s readiness or ability to carry out those activities and responsibilities. The objective of the recommendations in this audit are to ensure that Devry Corporate headquarters complies with state, local, and federal regulations for the safety of its employees, the public, and visitors. It will also assist with recommendations that ensure Devry Corporation is free from any legal liabilities as a result of action or non action as it relates to security and safety (Garcia, 2008). Summary The Devry Corporate Headquarters is the central location for Devry Inc., which owns and operates fourteen educational institutions, their supporting both domestic and international operations. These Institutions are comprised of large scale educational facilities requiring sophisticated infrastructures. Each of the supported institutions must adhere to the Higher Education Act standards of security and safety. Those standards would not be applicable in the corporate...

Words: 2015 - Pages: 9

Premium Essay

Physical Security Survey

...Physical Security Survey Report for: Magnolia Utility Citizens’ Cooperative Prepared for: Janet Garret, Director of Security By: Top Notch Security Specialist Jake Johnson Date of Survey: 6 January 2012 Introduction My company conducts physical security surveys and we were hired to perform an evaluation on Magnolia Utilities Citizens’ Cooperative. I was given access to many personnel throughout the organization and was able to receive tangible data to conduct a thorough survey. Mr. Gorsky was in charge of the security check point at the vehicle yard. Mr. Videtti is the warehouse supervisor. Mr. Williams is the tool and equipment distribution center supervisor. Interviewing these personnel gives me an inside look to the physical security layout. The Magnolia organization currently employees 32 personnel and business is conducted within two separate locations. Cash management area, Electric Way hours are conducted between 10AM to 12PM and 2PM to 5PM. Cash Management Area South Street functions are conducted between 8AM and 6PM. Warehouse tool and equipment distribution center is opened from 5Am to Midnight. The provided information and information gathered throughout the survey has led me to an evaluation which concentrates on areas that need improvement. After interviewing all employees it is evident that not all of them receive security training on a regular basis. In order to maintain a highly secure working environment all employees regardless of...

Words: 1217 - Pages: 5

Premium Essay

60% of Uk Companies Have Suffered a Security Breac

...function is assumed by a business, government agency or a commercial TTP, the issuance of digital certificates creates ongoing costs. At $70 million in 1999, revenues from outsourced PKI services are still small, reflecting the present lack of fully operable PKI solutions and the current focus on the business community. Revenues from PKI services will rise significantly as B2C E-commerce grows. Datamonitor expects revenues from outsourced PKI services to reach $595 million in 2003. For further information, contact Krishna Rao at Datamonitor on Tel: +44 (0)171 316 0001; Fax: +44 (0)171 316 0002; E-mail:; Web site: 4 60% of UK companies have suffered a security breach Results of the UK’s biggest and widely recognized survey on information security breaches reveals that 60% of companies interviewed have suffered a security breach within the past two years. Sixty-four percent of companies with a serious breach maintained that ‘nothing has changed’ since the breach occurred. Forty percent of...

Words: 878 - Pages: 4

Free Essay


...Summary This report summarizes a plan to conduct a wireless site survey, also called a radio frequency (RF) survey, at Orchard Street Art Center. This survey will generate recommendations for maximizing network security, coverage, and capacity. Expert Advice Earlier this year, the board of directors of Orchard Street Art Center asked me to propose a plan to improve wireless coverage throughout the center’s public areas, offices, classrooms, music studios and indoor and outdoor theaters. To make sure I proposed the most effective plan possible, I decided to seek the advice of experts. Fortunately, one of the area’s top experts in wireless networking, Jamie Brookstone, president of Brookstone Network Consulting, offered the services of his staff pro bono. Thanks to his offer, I was able to meet several times with the following consultants: Lyn Luzerne Our conversations focused on ways to improve network connections for the center’s staff and patrons. I also studied information obtained from leading hardware manufacturers and software distributors. This research suggests that our first step is to conduct a site survey of our entire facility. Final Recommendation A high availability, secure wireless network is crucial to our mission at Orchard Street Art Center. Lighting and sound systems in our two theaters increasingly rely on wireless signaling, as do our classroom facilities. Furthermore, patrons and instructors now consider a secure wireless network essential for a......

Words: 806 - Pages: 4

Premium Essay

Ccsecurity Mp Outlin

...SECURITY MASTER PLAN OUTLINE for CHABOT LAS POSITAS Community College District Submitted by: CATALYST Consulting Group, Inc. 851 Napa Valley Corporate Way, Suite D Napa, CA 94558 In Association With: DMJM, Program Management For Measure B Bond Program 6601 Owens Drive, Suite 238 Pleasanton, CA 94588 May 2, 2005 9/21/2005 2 SECURITY MASTER PLAN OUTLINE Chabot Community College District This outline presents the fundamental topics of the Security Master Plan, an independent document incorporated by reference into the TBP Architecture District Master Plan for the Chabot College campus new construction and building improvements. To develop the Security Master Plan, CATALYST has first performed numerous site surveys and interviews, analyzed crime index data, reviewed the relevant technologies, and assessed the campus physical environment to define the risks and vulnerabilities that need to be addressed for a long-term vision of campus security. From this goal set, CATALYST has developed the guidelines and recommendations for the District to standardize the approach and cost of physical security on their campuses. The Security Master Plan will include the topic sections listed in the outline following. The primary intent of the Security Master Plan is to define security mitigation standards that integrate efficiently with new building construction and building improvements, saving upgrade costs today by planning for the campus of tomorrow. By first......

Words: 1345 - Pages: 6

Premium Essay

Computer Forensics and Cyber Crime

...Author Institution Computer Forensics and Cyber Crime A security survey or audit can also be referred to as a vulnerability analysis. A security survey is an exhaustive physical examination whereby all operational systems and procedures are inspected thoroughly (Fischer & Green, 2004). A security survey involves a critical on-site examination and analysis of a facility, plant, institution, business or home to determine its current security status, its current practices deficiencies or excesses, determine level of protection needed, and ways of improving overall security levels are recommended. A security survey can either be done by in-house personnel or by external security consultants. However, outside security experts are preferred their approach to the job would be more objective and would not take some parts of the job for granted therefore resulting to a more complete appraisal of current conditions. A security survey/audit should be carried out regularly so as keep improving to and up to date especially with the growing rate of technology. Overall objectives of a security survey are: determination of current states of security, location various weaknesses in the security defenses, determination of level of protection required and finally give recommendations for the establishment of a total security program (Fischer & Green, 2004). Some weaknesses identified in the process of a security survey may be: vulnerability to injury, death or destruction by......

Words: 686 - Pages: 3

Free Essay

Site Survey Report

...Wireless Site Survey Recommendation Wireless Site Survey Recommendation Orchard Street Art Center Orchard Street Art Center Summary This report summarizes a plan to conduct a wireless site survey, also called a radio frequency (RF) survey, at Orchard Street Art Center. This survey will generate recommendations for maximizing network security, coverage, and capacity. Expert Advice Earlier this year, the board of directors of Orchard Street Art Center asked me to propose a plan to improve wireless coverage throughout the center’s public areas, offices, classrooms, music studios and indoor and outdoor theaters. To make sure I proposed the most effective plan possible, I decided to seek the advice of experts. Fortunately, one of the area’s top experts in wireless networking, Jamie Brookstone, president of Brookstone Network Consulting, offered the services of his staff pro bono. Thanks to his offer, I was able to meet several times with the following consultants: Lyn Luzerne Associate Engineer Dean Armstrong Senior Engineer Suzanne j. Sheffield-Harper Project Manager Our conversations focused on ways to improve network connections for the center’s staff and patrons. I also studied information obtained from leading hardware manufacturers and software distributors. This research suggests that our first step is to conduct a site survey of our entire facility. What Is a Wireless Site Survey? A wireless site survey is an analysis of a facility’s wireless......

Words: 896 - Pages: 4

Free Essay

Create User Policy

...IS4550 SECURITY POLICIES AND PROCEDURES 14 CREATE USER POLICY UNIT 5 ASSIGNMENT 1 IS4550 SECURITY POLICIES AND PROCEDURES 14 CREATE USER POLICY UNIT 5 ASSIGNMENT 1 To: Hospital Administrators From: IT Security Specialist Subject: User Policy We understand the type of security policies that you currently have in place. However we are here to present to you what security, users, and possible threats to your mainframe issues can impose. In today’s society we deal with many types of hackers and they are not like the 1980’s. Today we deal with threats unlike ever before, some examples would be: The stakes are high as the Institute of Medicine (IOM) highlights in its recent publication related to privacy: “Breaches of an individual’s privacy and confidentiality may affect a person’s dignity and cause irreparable harm” and “[unauthorized disclosures] can result in stigma, embarrassment, and discrimination.” IOM: Beyond the HIPAA Privacy Rule—Enhancing Privacy, Improving Health Through Research, February 4, 2009” 1. So Many Mobile Devices, So Much Risk Mobile devices are ubiquitous in today's society, and the number and types of devices used by physicians, nurses, clinicians, specialists, administrators and staff – as well as patients and visitors – is growing at healthcare organizations across the country. Providing anywhere/anytime network access is essential, particularly when instant communication is required to ensure quality patient care. But......

Words: 2047 - Pages: 9

Premium Essay

Facebook Survey

...Caminong Jeanny Daz Robert Michael Defensor Ma. Kristela Olonan Stephanie San Pedro John Walter Talavera August 2011 Abstract The study aims to find out if Facebook users are satisfied with the services the social networking site provides and find out what changes can the site developers do to meet the needs and expectations of the users. To accomplish this, a survey questionnaire was given to 30 students from six different programs. It is concluded that most teenagers are not completely satisfied with the services provided by Facebook especially their account settings feature for its low level of security. The researchers recommend that Facebook developers should set additional restrictions to increase security of its users. Procedure The data for this report were gathered from 11 August 2011 – 13 August 2011. A questionnaire survey was conducted from 25 July 2011 – 10 August 2011. The survey questionnaire consists of twenty four (24) item questions with regards to the services and features offered by one of the top social networks in this generation, Facebook. These features include the chat, photo uploading, video call, and account security services. The survey questionnaire also includes the comparison of Facebook to other networking sites. The questionnaires were distributed to a total of 30 respondents, consisting of students of all levels with different programs including Information Technology, Computer Science, Nursing, Business Administration,......

Words: 701 - Pages: 3

Free Essay


...University Abstract Three different types of surveys will be discussed for sample size and how they compare to each other. A personal survey’s information is provided and the breakdown of the answers is shown in charts for review. A personal opinion regarding how survey information can be used with a business or other service is discussed. Introduction An entertainment, political, and general survey will be examined for sample size and discussed in this paper. A personal survey will also be reviewed and additional information will be discussed as to how they relate to each other and how the information could be used in a business or other setting. Part 1: Survey Analysis: Entertainment Social gaming is taking the desktop and console gaming world to new heights by attracting gamers that might not have every touched a video game before according to Shaer, (2010). He reports that 56.8 million American consumers over the age of 6 had participated in social game playing over the past three months. According to the U.S. Census Bureau, the 2010 population was 281,421,906, and Shaer’s 56.8 million consumers represent approximately 20% of the overall population. I was surprised to find the accuracy in Shaer’s numbers representing one-fifth of the U.S. population in 2010. That is a staggering number of people doing nothing more than playing games! To further understand the impact these numbers have on social gaming sites such as PopCap Games, I visited the Information......

Words: 2203 - Pages: 9

Premium Essay


...3-4: Project Charter |Project Title: Project Management Intranet Site Project | |Project Start Date: May 2, 2005 Projected Finish Date: November 4, 2005 | |Budget Information: The firm has allocated $140,000 for this project. The majority of costs for this project will be internal labor. An | |initial estimate provides a total of 80 hours per week. | |Project Manager: Erica Bell, (310)889-5896, | |Project Objectives: Develop a new capability accessible on JWD Consulting’s intranet site to help internal consultants and external | |customers manage projects more effectively. The intranet site will include several templates and tools that users can download, examples of | |completed templates and related project management documents used on real projects, important articles related to recent project management | |topics, article retrieval service, links to other sites with useful information, and an “Ask the Expert” feature, where users can post | |questions they have about their projects and receive advice from experts in the field. Some parts of the intranet site will be accessible | |free to the public, other parts will......

Words: 1683 - Pages: 7

Free Essay

It/241 Week 5 Site Survey Benefits

...connectivity. A site survey in a medium or large business required more physical work and time, a proper site survey interview should occur to both educate the customer and properly determine their needs. When a company is going to operate with cordless is necessary first to have a site survey, a good network wireless signal will provide the company the most powerful way to operate with portables devices. The prices of the installation will depends in the size of the building, for example a building of 75000 sq./ft. the price is around 100-150/hr. A site survey program can save significant amounts of time, money and any type of frustration when for the first installation or modifying an existing Wireless Local Network. The site survey will provide the necessary information that address coverage, interference sources, equipment placement, power consideration, wiring requirements. The site survey design requirements like the high availability, scalability, manageability, and interoperability. This site survey serves as a guide for network design and for the installation or verification of the wireless communication infrastructure. It is pretty important to create the correct questions during a site survey interview with the correct tools; this will help to make the site survey more productive. Some advantages of installing a site survey is the opportunity to have a wireless access point with reduce signal just covering inside of the building. A site survey......

Words: 542 - Pages: 3

Free Essay

The Athletes Shack Wireless Upgrade Proposal

...The Athletes Shack Wireless Upgrade Proposal | | | Proposal with recommendations for installing a wireless network to the existing wire LAN. | | | 6/17/2012 | | Executive Summary 3 Site Survey 4 WLAN Security 5 Beta Testing 7 Equipment 8 Budget 12 Conclusion 12 Bibliography 14 Appendix A: TECHNICAL TERMS 15 Executive Summary The Athletes Shack (TAS) is a chain of sporting goods stores that is looking into adding a wireless network (WLAN) to their current network. TAS has 10 retail distribution stores in the area and would like all the stores to be able to see live inventory suing mobile devices. The management team at Athletes Shack has realized that their success depends on exceptional customer service and efficiency on the floors of the store. To take the next step the company is looking to go wireless and use that technology to separate themselves from other sporting good chains. To continue to have an edge over Foot Locker, Champs Sports and other Athletes Shack feel this is a necessary step. Once the WLAN is installed in each of the 10 locations this will allow remote log in via the internet and VPN connection. The expectation is to have a major improvement on customer service. Added technological benefits to sales associates while on the floor will include real time sales pricing quotes, inventory product availability and to check the company website. In store operations will see additional business value through addition......

Words: 2939 - Pages: 12

Premium Essay

Organizational Security Survey

...Evaluation of Security Programs SECURITY SITE SURVEY REPORT THE DEVRY CENTER  9210 HIGHER EDUCATION DRIVE NEW YORK, NY 11747 OVERVIEW A security survey is the official procedure utilized to review specific applications, areas, or Processes of residence or a business to document security, risk vulnerabilities, and authenticate the program in place (Broder & Tucker, 2011). One could perform a survey from all the risk perspectives such as facility security, physical security, or life safety. An expert conducts a involving a pre-determined constraint of checklist as well as an official reporting system. A security survey is a significant element of the general risk and security program (Craighead, 2009). When carrying out a security survey one must set clear goals. The goals would also be extensive from reviewing the fitness of the whole security program to more summarizing goals, such as the value and effectiveness of the physical security of the programs (Luis, 1994). SITE DESCRIPTION The Devry center building is located in downtown New York City on a four-acre piece of land. The building is a thirty story high containing 1,250 underground garage parking spaces and a rooftop garden. The building has a maximum capacity of 2000 tenants, and the tenants occupy the 27th and 30th floor of the building. SCOPE I conducted the security survey at Devry Center on December 1, 2013 to December 5, 2013. This......

Words: 1939 - Pages: 8

Premium Essay

Term Paper

...efficiently and flexibly, to work more closely with suppliers and partners, and to better satisfy the needs and expectations of their customers. Trust is the key to the success of e-business and lack of trust is the significant problem on the way to e-business success. During every business transaction, the parties involved should feel trust with the people and the companies. It must be established and managed continuously in business transaction activities. Security services offering protection from security threats are: identification, authentication, confidentiality, integrity, access control, and non-reputation. Today, e-business applications are doing more than ever to increase efficiency and improve relationships with partners and customers. In relation to trust and internet technologies, consumers are concerns about two main things which are privacy and security. This study is focusing on the issues relating to e-business, such as its importance, issues and the solutions in order to overcome related to the security and trust in e-business. Importance of Trust regarding e-business Traditionally, the issue of trust was addressed in a few ways. Personal face-to-face meetings, exchange of information, obtaining references and reputations of various parties from customers and partners and negotiation of contracts have helped the transacting parties to develop some instincts on the relative trustworthiness of the parties. Moreover, legislative framework also helped in...

Words: 1212 - Pages: 5