¶ … Security Plan Target Environment
Amron International Inc.
Amron International Inc. is a division of Amtec and manufactures ammunition for the U.S. military. Amron is located in Antigo, Wisconsin. Amron also manufacturer's mechanical subsystems including fuses for rockets and other military ammunitions as well as producing TNT, a highly explosive substance used in bombs.
Floor Plan Target Environment
The target environment in this security plan is the manufacturing operation located in Antigo, Wisconsin, a manufacturing plant with personnel offices adjacent to the facility. The work of Philpott and Einstein (nd) reports the fact that more than 50% of U.S. businesses do not have a crisis management plan and for those who do have a plan, it is generally not kept up-to-date. Philpott and Einstein states that even fewer businesses and organizations "have integrated physical security plans to protect the facility and the people who work in it.
The challenge is reported to be twofold:
(1) the first is reaching an agreement that a security plan is needed which "involves altering mindsets, building consensus and getting senior management to buy in;
(2) the second challenge "is in developing and implementing an effective and tailor-made integrated physical security (IPS) plan." (Philpott and Einstein, nd)
This plan is comprised by three elements which support the plan:
(1) physical security measures;
(2) operations procedures; and (3) policies. (Philpott and Einstein, nd)
Operational procedures are reported to be the "lifeblood of any organization -- they cover how the facilities works on day-to-day businesses, such as shift changes, deliveries, maintenance schedules and so on. It is necessary to understand how the facilities works and operates in order to develop an effective integrated physical security plan that allows it to get on with its job with the least disruption as possible." (Philpott and Einstein, nd)
There are five steps in the physical security plan involving four specific elements including those of:
(1) people;
(2) operations;
(3) information; and (4) inter-dependence. (Philpott and Einstein, nd)
Stated as crucial elements to the security plan are those as follows:
(1) Deterrence: this makes provision of countermeasures including policies, procedures and technical devices in addition to controls for defense against attacks protected assets;
(2) Detection -- monitoring for possible breakdowns in mechanisms that are sued for protection and that could result in a breach of security;
(3) Delay -- necessary measure in event of a breach so that intruders are slowed allowing security to catch them before they realize success;
4) response -- an element requiring human involvement including procedures and actions for assessment of the situation and providing response to a breach;
(5) recovery -- the plan for continuation of business and normal operations and (6) re-evaluation -- constant reassessment is necessary; (Philpott and Einstein, nd)
List of Threats
Threats present at Amron, International Inc. include the following:
(1) Fire;
(2) Intruder security breach;
(3) Employee security breach;
(4) Weather threats;
(5) Improper manufacturing methods; and (6) Information security breach.
Risk Assessment Threat
In the event that employees fail to follow procedures and policies concerning manufacturing processes and should employees fail to follow smoking policies and designated smoking area rules, fire and explosions could become a real threat.
Current Vulnerability Gaps
Vulnerability gaps at Amron International Inc. appear to have been closed due to tight security measures.
Countermeasures Components Security Object
Training and safety manuals in addition to intensive security training address the threats to security that are potentially present at Amron International Inc.
Physical Security
The physical security of Amron International Inc. has been sufficiency addressed. All exits and entrances are monitored by security including exits and entrances to buildings and parking facilities. Security cameras fully cover the facilities doorways, windows and docking areas. Drivers who carry loads to and from the facility are thoroughly checked at both the gates and the docking areas.
Information Security
Information security has been addressed by Amron International Inc. through use of information security software programs that are considered best practice by the U.S. military operations.
Personnel Security
Personnel security is inclusive of but not limited to the following:
(1) all personnel submits to drug screening and background checks;
(2) personnel required to wear employee identification badges at all times;
(3) security checks personnel employee identification badges at all entrances and exits to the plant, gates and parking facilities.
The interviewee stated that hiring procedures for personnel consist of one submitting an application through the main branch. Human Resources will then contact potential candidates for an interview. Once the selection process has been completed, drug and alcohol screening is set up. Background screenings are submitted...
Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,
Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is
Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are
Security Management at Aviation and Healthcare Sectors Security Management Essay This paper discusses the concept of aviation security management and security management at healthcare settings. In addition to that, this paper also lists down and describes the important factors that can have an influential impact on the functions of aviation and a healthcare security manager. Security Management at Aviation and Healthcare Sectors Aviation Security The general aviation security confronts a number of security challenges. The
Security management 1. In a civil action, how can a claim of negligent hiring have a greater chance of succeeding? Jurisdictions have been increasingly putting laws in place pertaining to what makes organizations a potential target for a lawsuit on negligent hiring. Though in most instances, claims of negligent hiring may be effectively fended off, it proves increasingly tricky in the following cases: · If the individual harming or injuring another is an
The reality is however that legacy systems pose the greatest potential risk to any enterprise, as these platforms are anachronistic in terms of security support, lack many common safeguards, and don't have the necessary Application Programmer Interfaces (APIs) to scale globally as a secured platform (Gupta, Roth, 2007). Legacy systems were designed in an era where single authentication for an entire enterprise system was sufficient enough, and the concept
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now