Verified Document

Security Assessment Is Done To Thesis

This leaves those clients that are inside unsupervised while the guard is outside. There is also a lack of signage inside displaying rules and regulations along with directions. This propagates a lot of unnecessary questions being asked of the surety officer on duty. In order to alleviate these issues it would be essential to place distinct parking signage outside in order to help facilitate clients parking in the correct spaces. It is also necessary to place directional signage within the facility along with general rules and policies. All of these signs together would cost approximately $1,000 to install. The last security issue that needs to be addressed is that of the security information processes that is in place. As each client arrives at the facility, their license plate numbers are recorded and they are then assigned a number. They are seen by the appropriate medical personnel based upon the order in which they are signed in. Each day a list is generated that contains personal and confidential information on each client. There are currently no processes in place to make sure that this confidential information is not breached. The hard copies of the lists are kept in a desk drawer for the required amount of time at which point they are then destroyed. The solution to this problem would be to install a computer terminal at the security officer's station in which he could utilize to record the required information. A network would need to be installed to link all computers in the office together so that confidential information could be accessed by anyone in the office in a secure and private way. Installation of this type of system would run approximately $5,000.

The nature of this business is a very delicate one. The facility...

It is imperative that the security surrounding the Methadone is top notch along with the protection of the clients and their personal information. Having new locks installed would guarantee that no security breaches could occur from former employees. Installing new signage would not only alleviate congestion in the facility but would allow the security officer to act less like a traffic coordinator and be more available to secure the facility and its occupants. The new computer system would allow record keeping to become electronic making that information much more secure. It would also help to speed up services and efficiency of the facility as a whole. Because the facility is relatively new, they have yet to hit the capacity of clients that they will eventually have. Planning for this increase will ease future problems that might occur with the rise in clientele.
References

Conducting a Security Assessment. (2009). Retrieved May 25, 2009, from Processor Web site:

http://www.processor.com/editorial/article.asp?article=articles%2Fp2808%2F30p08%2F30p08.asp

How to Conduct an Operations Security Assessment. (2009). Retrieved May 25, 2009, from eHow.com Web site: http://www.ehow.com/how_2060197_conduct-operations-security-assessment.html

Methadone Maintenance Treatment. (2009). Retrieved May 25, 2009, from Drug Policy Alliance

Web site: http://www.drugpolicy.org/library/research/methadone.cfm

To Secure Your Business, Consider the Access Points. (n.d.). Retrieved May 25, 2009, from Inc.

Web site: http://www.inc.com/resources/office/articles/20060401/morgan.html

Sources used in this document:
References

Conducting a Security Assessment. (2009). Retrieved May 25, 2009, from Processor Web site:

http://www.processor.com/editorial/article.asp?article=articles%2Fp2808%2F30p08%2F30p08.asp

How to Conduct an Operations Security Assessment. (2009). Retrieved May 25, 2009, from eHow.com Web site: http://www.ehow.com/how_2060197_conduct-operations-security-assessment.html

Methadone Maintenance Treatment. (2009). Retrieved May 25, 2009, from Drug Policy Alliance
Web site: http://www.drugpolicy.org/library/research/methadone.cfm
Web site: http://www.inc.com/resources/office/articles/20060401/morgan.html
Cite this Document:
Copy Bibliography Citation

Related Documents

IT Security Assessments Process of Matching Security
Words: 3712 Length: 12 Document Type: Essay

IT Security Assessments (Process of matching security policies against the architecture of the system in order to measure compliance The systems security assessment is the method of creating a security policy that would be complimentary to the architecture of the system and the method would allow for the measure of compliance. Security assessments are activities that belong to the phase of the design cycle, and that is because it is

Security Overview Businesses Today Are
Words: 3366 Length: 13 Document Type: Research Paper

(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture

Security Planning and Assessment Security
Words: 2028 Length: 7 Document Type: Thesis

It's not necessary, for the purposes of this paper, to look in detail at these steps for a basic understanding of how a security assessment is conducted. To understand the nuances, there are about a million books one can read, but we will discuss a few general "rules." The first thing to keep in mind with an assessment is that the methodology is flexible. It has to be to adapt to

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Security Analysis in the UK
Words: 2541 Length: 8 Document Type: Essay

Security Report In the present day, organizations are reliant on information in order to continue being relevant and not become obsolete. To be specific, organizations are reliant on the controls and systems that have been instituted in place, which provide the continuing privacy, veracity, and accessibility of their data and information (Lomprey, 2008). There is an increase and rise in threats to information contained within organizations and information systems (Lomprey, 2008).

Security Technology in Next Five Years Globally
Words: 1593 Length: 5 Document Type: Essay

Security Technology in Next Five Years Globally security concerns have placed great pressure on the survival of human life and had threatened the daily life, confidence and dignity of societies at large. To resolve the security concerns and overcome with this disastrous obstacles, security technological advancements have been made in many facets. Human life is playing its vital role in moving the world to a secure place where families, businesses,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now