Seminar in Security Management

Semin” rel=”nofollow”>inar in” rel=”nofollow”>in Security Management (10 pages, 10 references)Instructions:
Each question is worth 20 poin” rel=”nofollow”>ints. This exam is worth 25% of the fin” rel=”nofollow”>inal grade.
1. Each answer should be a min” rel=”nofollow”>inimum of 2 pages, double – spaced with one-in” rel=”nofollow”>inch margin” rel=”nofollow”>ins. State your assumptions. Please do not repeat the question as a part of your answer; it’s not necessary.
2. Draw your answers from course readin” rel=”nofollow”>ings, session notes (lectures), discussions, exercises and your personal in” rel=”nofollow”>insights. Students may use any academic resource and in” rel=”nofollow”>industry resources, so long as they are properly cited and referenced.
Question 1.
What elements would you in” rel=”nofollow”>include in” rel=”nofollow”>in providin” rel=”nofollow”>ing a layered security system for a three-buildin” rel=”nofollow”>ing corporate campus that in” rel=”nofollow”>includes a five-story buildin” rel=”nofollow”>ing housin” rel=”nofollow”>ing, which is the headquarters office for a major pharmaceutical company in” rel=”nofollow”>in the followin” rel=”nofollow”>ing scenario? (HINT – start by identifyin” rel=”nofollow”>ing what you believe are the critical assets and their locations and work from there . . .) (Assume that there have been “Moderate” threat’s made again” rel=”nofollow”>inst this company – however not too specific- employees are worried, and executives somewhat cautious in” rel=”nofollow”>in their daily activities.) There have been major protests in” rel=”nofollow”>in and around the facility, however only a few arrests have been made.
The campus is located adjacent to a river that flows in” rel=”nofollow”>into Chesapeake Bay and sits on ground 8 feet above sea level. The buildin” rel=”nofollow”>ing is in” rel=”nofollow”>in a suburban location, sited on approximately five acres adjacent to an in” rel=”nofollow”>interstate highway ramp. Parkin” rel=”nofollow”>ing is in” rel=”nofollow”>included within” rel=”nofollow”>in the campus boundary and approximately 750 employees are present daily, plus approximately 50 visitors. The loadin” rel=”nofollow”>ing docks can be accessed from the parkin” rel=”nofollow”>ing lot via side roads.
Buildin” rel=”nofollow”>ing 1 contain” rel=”nofollow”>ins the headquarters offices and is where all of the company’s executives work; all field admin” rel=”nofollow”>inistrative operations (human resources etc.) are coordin” rel=”nofollow”>inated from this buildin” rel=”nofollow”>ing. Buildin” rel=”nofollow”>ing 2 is where sensitive research is conducted (scientist, and research) and computer – in” rel=”nofollow”>information technology is coordin” rel=”nofollow”>inated. Buildin” rel=”nofollow”>ing 3 has what may be considered as the overflow operations for the company; sensitive train” rel=”nofollow”>inin” rel=”nofollow”>ing (laboratories), conference rooms and storage. The computer room is in” rel=”nofollow”>in the basement of Buildin” rel=”nofollow”>ing 2 essentially to provide a cool operatin” rel=”nofollow”>ing environment. The storage facilities hold equipment and supplies used to main” rel=”nofollow”>intain” rel=”nofollow”>in the grounds.
See the map below for the company. Light poles are in” rel=”nofollow”>indicated by the “+” symbol.
Question 2.
Your security firm is hired to provide recommendations for crime prevention for a renovated three four story 50-year-old brick apartment buildin” rel=”nofollow”>ings located in” rel=”nofollow”>in Detroit, Michigan. Each buildin” rel=”nofollow”>ing has twenty apartments priced in” rel=”nofollow”>in the upper-middle class range. There is a fairly large overflow parkin” rel=”nofollow”>ing lot exposed to the city streets. Each apartment is afforded one parkin” rel=”nofollow”>ing slot in” rel=”nofollow”>in a garage under the buildin” rel=”nofollow”>ing.
This apartment complex is part of a project to renovate the near downtown area and it is placed in” rel=”nofollow”>in an area where there is significant amount of crime about a quarter mile away. The adjacent streets have old busin” rel=”nofollow”>inesses, some empty buildin” rel=”nofollow”>ings, liquor store, a couple of bars and a popular corner café.
There will be a green landscaped buffer area that extends fifty yards all around the apartment complex to a new sidewalk; an exact landscape plan has not been furnished until you provide your ideas.
However, there are several large old oak trees and mature purple and white flowered lilac shrubbery that has been preserved on the campus kept from a portion of an old in” rel=”nofollow”>inner city park.
In your security plan what would you recommend in” rel=”nofollow”>in terms of crime prevention and target hardenin” rel=”nofollow”>ing security measures for this new residence complex?
1. Explain” rel=”nofollow”>in the security measures recommended in” rel=”nofollow”>in terms of critical assets considerin” rel=”nofollow”>ing likely threats, vulnerabilities, risks and crime theories.
2. Consider also what must be done prior to any recommendations bein” rel=”nofollow”>ing made.
3. Note your opin” rel=”nofollow”>inions, and what options may be available for the client to consider. E. What are your recommendations?
4. Describe an appropriate security and risk assessment for this scenario.
Question 3.
As a security consultant you are asked to review a recent armed robbery and rape case that happened on State University, USA, associated with the athletic complex. The crime happened at night when Doris Franklin” rel=”nofollow”>in fin” rel=”nofollow”>inished her late work out for the gymnastic team. She showered and dressed and ready to leave she noticed the last evenin” rel=”nofollow”>ing bus left at 10 PM. She just missed it.
The janitor told her she would have to leave the buildin” rel=”nofollow”>ing because he had to lock up the complex. She told him the bus had left and she did not want to walk back to the dorm in” rel=”nofollow”>in the dark and asked if she could call the campus police? He agreed and even stayed with her while she made a call to the campus police.
She called the campus police and asked for an escort. The campus police said they could have a campus security officer come by in” rel=”nofollow”>in about 20 min” rel=”nofollow”>inutes if she could wait. She agreed.

She told the janitor and he had her leave the buildin” rel=”nofollow”>ing and wait immediately in” rel=”nofollow”>in front.
After 30 min” rel=”nofollow”>inutes Doris got tired of waitin” rel=”nofollow”>ing so she started to walk back in” rel=”nofollow”>in the direction of the dorm when a car approached her, two males brandished a weapon, at gunpoin” rel=”nofollow”>int forced her in” rel=”nofollow”>into the car, stole her purse and she was later raped twice at another location. Fortunately, she was not killed, durin” rel=”nofollow”>ing the in” rel=”nofollow”>incident and was left severely hurt on the roadside.
The security officer showed up 35 min” rel=”nofollow”>inutes after the call and could not fin” rel=”nofollow”>ind her. He had stopped for a coffee at McDonald’s before comin” rel=”nofollow”>ing. He left the athletic buildin” rel=”nofollow”>ing never callin” rel=”nofollow”>ing in” rel=”nofollow”>in the fact she had not been escorted. The procedure is that security must always report the outcome of escort service in” rel=”nofollow”>in terms of person, time of pick up, when the person was safely delivered to their dorm and mileage.
The campus police and security said they are not responsible sin” rel=”nofollow”>ince Doris chose to leave and not wait for the escort. The security officer was somewhat delayed arrivin” rel=”nofollow”>ing, however, he picked up his coffee at a drive-through win” rel=”nofollow”>indow and had already missed his break sin” rel=”nofollow”>ince they were short a security officer.
What are the premise liability issues in” rel=”nofollow”>in this case? As a security consultant, what are your fin” rel=”nofollow”>indin” rel=”nofollow”>ings?
Question 4:
You are a newly appoin” rel=”nofollow”>inted admin” rel=”nofollow”>inistrator of a large public school district that has been experiencin” rel=”nofollow”>ing high crime rates among the student population, both on and around campus buildin” rel=”nofollow”>ings and facilities. Thefts of property, vandalism and assaults are reported on a daily basis.
The local PTA is upset that the school district has not addressed these problems adequately in” rel=”nofollow”>in the past, and now it appears that these longstandin” rel=”nofollow”>ing problems are out of control.
Recently, two students were shot in” rel=”nofollow”>in the hallway of the local high school durin” rel=”nofollow”>ing an altercation between two rival groups of gang members. Some students have reported observin” rel=”nofollow”>ing drug transactions occurrin” rel=”nofollow”>ing in” rel=”nofollow”>in the bathrooms and in” rel=”nofollow”>in the parkin” rel=”nofollow”>ing lots, before, durin” rel=”nofollow”>ing, and after school hours.
Your job is to develop a short-term and long-term strategy to effectively deal with these problems. As with most public agencies, your school system is operatin” rel=”nofollow”>ing on a very limited budget, so you must choose your in” rel=”nofollow”>interventions wisely.
Assume that there are no programs in” rel=”nofollow”>in place to effectively deal with these problems, but the PTA wants answers now! Accordin” rel=”nofollow”>ing to the evidence, which programs work, and which programs do not appear to work? Which ones would you consider usin” rel=”nofollow”>ing?
Consider the pros and cons of whatever program/procedure you suggest or implement.

Question 5:
You are the appoin” rel=”nofollow”>inted leader/supervisor of a group representin” rel=”nofollow”>ing the office of a newly appoin” rel=”nofollow”>inted Chief of Police for a large city experiencin” rel=”nofollow”>ing high crime rates, which have been directly associated with gun violence on the street. (All of you are considered by the public as bein” rel=”nofollow”>ing police executives, and are equally responsible for the powers of the Chief of Police.) Street-level violence within” rel=”nofollow”>in the community has existed for years but the numbers of reported robberies, burglaries, murders, assaults, and theft have become in” rel=”nofollow”>increasin” rel=”nofollow”>ingly prevalent in” rel=”nofollow”>in more recent times.
The mayor’s office and various members of the community are demandin” rel=”nofollow”>ing “answers” because you were hired to help reduce these types of crimes based on your expertise in” rel=”nofollow”>in the policy-makin” rel=”nofollow”>ing process.
In order to make a difference in” rel=”nofollow”>in overall crime rates, you must address all serious issues relatin” rel=”nofollow”>ing to crime and its prevention. You have to address the crime problems mentioned above, but what does the research tell you?
Your job is to develop a short-term and long-term strategy to effectively deal with these problems. As with most localities, the various agencies workin” rel=”nofollow”>ing within” rel=”nofollow”>in your jurisdiction are operatin” rel=”nofollow”>ing under tight budgets, so you must choose your in” rel=”nofollow”>interventions wisely. Assume there are no programs in” rel=”nofollow”>in place to deal with the challenges that you are now facin” rel=”nofollow”>ing. (You may want to consider what security tools you should, or may what to use in” rel=”nofollow”>in your evaluation.)
Assignment # 1: Vulnerability Assessment (5 pages, 5 references) – Course Objectives # 2 – 4
Develop and complete a vulnerability assessment tool to be used to conduct a survey of a home, busin” rel=”nofollow”>iness, faith in” rel=”nofollow”>institution or other physical facility of your choice.
The paper should in” rel=”nofollow”>include:
1) Cover page with student’s name, course title and number, and date submitted.
2) Body of paper:
1. Introduction that provides the purpose of the paper;
2. Discussion of the site selection and the rationale for the site selected;
3. Components of the vulnerability assessment; and
4. Suggestions and recommendations of security counter-measures to mitigate and reduce the risk of identified vulnerabilities to an acceptable level.
3) Reference list.
4) Appendix that provides a copy of the vulnerability assessment tool that you assembled and used for the project.
All papers should be submitted to the assignment folder and adhere to APA guidelin” rel=”nofollow”>ines. It should be a min” rel=”nofollow”>inimum of five (5) to ten (10) computer-generated, double-spaced pages and use a 12-poin” rel=”nofollow”>int font. Margin” rel=”nofollow”>ins are to be 1 in” rel=”nofollow”>inch (top, bottom, right, and left). This does NOT in” rel=”nofollow”>include the vulnerability assessment tool that will be added as an appendix.
Assignment #2: Risk Assessment Tool (5 pages, 5 references) – Course Objectives # 1 – 5
Develop a risk assessment tool to be used to conduct a survey of a home, busin” rel=”nofollow”>iness, faith in” rel=”nofollow”>institution, or other physical facility of your choice.
The paper should in” rel=”nofollow”>include:
1) Cover page with name, course title and number, and date submitted.
2) Body of paper:
1. Introduction that provides the purpose of the paper;
2. Discussion of the site selection and the rationale for the site selected; and
3. Components of the risk assessment tool.
3) Reference List.
4) Appendix that provides a copy of the risk assessment tool that you assembled and used for the project.
All papers should be submitted to the assignment folder and adhere to APA guidelin” rel=”nofollow”>ines. It should be a min” rel=”nofollow”>inimum of five (5) to ten (10) computer-generated, double-spaced pages and use a 12-poin” rel=”nofollow”>int font. Margin” rel=”nofollow”>ins are to be 1 in” rel=”nofollow”>inch (top, bottom, right, and left). This does NOT in” rel=”nofollow”>include the risk assessment tool that will be added as an appendix.
Assignment #3 Shared Security Issue/Topic Paper (5 pages, 5 references) – Objectives #1 – 12
Write a paper on one of the followin” rel=”nofollow”>ing topics while followin” rel=”nofollow”>ing the below in” rel=”nofollow”>instructions. Select one of the over twenty (20) topics below and research no less than three (3) academic articles (preferably five (5)), regardin” rel=”nofollow”>ing the selected topic. The articles should be academic or professional articles of substance. Use of newspaper articles and other such secondary sources should be avoided.
If you have another security issue, or topic that is of special in” rel=”nofollow”>interest to you, please request permission from the in” rel=”nofollow”>instructor about your proposal.
As a general outlin” rel=”nofollow”>ine, the paper should address all of the followin” rel=”nofollow”>ing items:
1) Introduce the importance of the security topic. This should in” rel=”nofollow”>include your reasons for selectin” rel=”nofollow”>ing the topic. Provide a clear purpose statement.
2) What is the different authors’ perspectives, evidence, or claims regardin” rel=”nofollow”>ing the topic?
3) Compare and contrast the articles. Where do they agree, or do NOT agree? If there is some uncertain” rel=”nofollow”>inty, please state the reasons why while discussin” rel=”nofollow”>ing any implications.
4) How does your analysis align with what we have learned thus far in” rel=”nofollow”>in the course?
As a fin” rel=”nofollow”>inal step, in” rel=”nofollow”>include a one page summary of your papers in” rel=”nofollow”>in the discussion area and explain” rel=”nofollow”>in your topic by sharin” rel=”nofollow”>ing your perspective, critical analysis, and opin” rel=”nofollow”>inions. Provide sufficient logical reasonin” rel=”nofollow”>ing and data to support your position. .
All papers should adhere to APA guidelin” rel=”nofollow”>ines. Papers should be a min” rel=”nofollow”>inimum of five (5) to ten (10) double-spaced pages and use a 12-poin” rel=”nofollow”>int font. Margin” rel=”nofollow”>ins are to be 1 in” rel=”nofollow”>inch (top, bottom, right, and left).

List of Topics:
• Home Protection, What You Should Know
• Preventin” rel=”nofollow”>ing and Respondin” rel=”nofollow”>ing to Workplace Violence
• Preventin” rel=”nofollow”>ing and Respondin” rel=”nofollow”>ing to Insider Threats.
• Security Alarm Systems, (or subtopic and issues like the Problem of False Alarms).
• The Role of Security in” rel=”nofollow”>in Relation to National Disasters (i.e. Katrin” rel=”nofollow”>ina).
• Private Security and the Use of Force.
• Selectin” rel=”nofollow”>ing and Train” rel=”nofollow”>inin” rel=”nofollow”>ing Qualified Security Personnel.
• Information Protection.
• Professionalizin” rel=”nofollow”>ing Security, Dream, or Reality?
• Current Security Liability Issues (You can choose one, or cover several Court case reviews are a good source of in” rel=”nofollow”>information).
• Raisin” rel=”nofollow”>ing Security Awareness, Can it make a Difference?
• Security Licensin” rel=”nofollow”>ing.
• Bomb Threat and Hazardous Material Response.
• Effective Policies, Procedures and Practices for Handlin” rel=”nofollow”>ing Disgruntled Employees, (and/or Customers).
• Effective Control Access Technologies.
• Surveillance Technologies.
• Security and Police Relations.
• CPTED (Crime Prevention through Environmental Design), when does it, or doesn’t work?
• The Threat Terrorism and Role of Security.
• Private Security and Customer Relations.
• Usin” rel=”nofollow”>ing Crime Analysis to Improve Security.
• Sex Offender Programs (maps in” rel=”nofollow”>indicatin” rel=”nofollow”>ing community location) and Alerts, how, and do they work?
• Security topic/issue of your choice submitted for approval.

find the cost of your paper