Nobody downloaded yet

Security Case Study - Research Paper Example

Comments (0) Cite this document
Security Plan for Walter Widget Manufacturing Plant No: Roll No: Date: University: Security Plan for Walter Widget Manufacturing Plant Introduction In this modern age and times, security of many organizations is a focal point for the top brass…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
Security Case Study
Read TextPreview

Extract of sample "Security Case Study"

Download file to see previous pages The business community is now ready to share material information with each other for common objectives that is to eradicate theft, burglary and vandalism. They are aware that leakage of information relating to security plan may cause irreparable damages to the assets of the organization (Allen, 2009). The existing employees and the former employees who have or had an access to the internal policies, procedures and management information system of the organization can easily disclose, manipulate or distort the data / information for the benefits of others (Allen, 2009). Remedial measures are to be considered by Walter Widget while taking into account the potential threats to property damage, thefts and vandalism. Prevention of Plant Burglary However, the ideal way for the employees of Walter Widget to thwart the attempts of thieves is to apply common sense to handle the situation with the assistance of effective alarming system. Some effective tools are mentioned hereunder: a) Digital Video Surveillance System: b) RFID Tags c) Advance Motion and Sound Detector The security system of Walter Widget manufacturing plant should be designed in a way which deter out laws to barge into manufacturing plant with ulterior motives to damage the plant and machinery. The installed security system of Walter Widget manufacturing plant should have detection, monitoring and effective communication gadgets in and around the manufacturing plant to meet the challenges. The mentioned security system, if installed, would be an effective system for the safety and security of the assets (Allen, 2005). Digital Video Surveillance The manufacturing plant of Walter Widget in view the assets installed should have multiple video cameras on the needed locations to keep an eye on the intruders. The installed cameras should monitor the activities of criminals inside and outside the factory premises round the clock. These cameras are to be connected with Close Circuit Television so as to ensure monitoring of activities of employees/non-employees in and around the factory without interruptions. Mentioned system would be fruitful for Walter Widget manufacturing plant to keep their business continue. The installed cameras and other accessories around the manufacturing plant will identify the person or persons, involved in stealing the company’s assets. The security system may have the benefit of clear footage to identify and nab the real culprits (Allen, 2005). RFID Tags RFID tags can be used as part and parcel of security plan devised for Walter Widget manufacturing plant. The mentioned tags are used in tracking the stealers. The cited tags set alarm if someone takes away the assets outside the premises of the factory. This is the best way to minimize/eliminate the chances of theft and damages to property (Allen, 2005). Sound Detectors The system so installed for the Walter Widget manufacturing plant has the capacity to detect unauthorized activities in and around the factory. The detectors are useful instrument to detect burglars who are attempting to steal plant and its associated accessories. The mentioned security system will deter the thieves and burglars and keep them away. The higher management should discuss security plan with the consultants, who will suggest the best security system that suits the requirement of the company’ ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Security Case Study Research Paper Example | Topics and Well Written Essays - 2500 words”, n.d.)
Retrieved from
(Security Case Study Research Paper Example | Topics and Well Written Essays - 2500 Words)
“Security Case Study Research Paper Example | Topics and Well Written Essays - 2500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Security protocols

...? School of Computing Module and 6CC513 Security Protocols Assignment No. and Security Report for EEC Assessment Shao Ying ZhuHand-In Deadline Date 08/05/2013 Abdallah Alkhanbashi 100181705 1 Introduction In this report, we will address security loop holes for EEC, as it is comprised of Birmingham, Glasgow and Derby. As per the scenario, Birmingham is considered to be the head office consisting of IT, Human Resource, Research and Development, Management, Marketing, Sales, operations and Finance. The other two branch sites have IT, sales, operations and manufacturing departments. Currently, all company servers (file, email, data, web, radius and FTP servers etc.) are located in the server...
12 Pages(3000 words)Case Study

Computer Network Security

...Computer Network Security 1 Introduction & Overview Network security is continuously evolving and becoming a challenging aspect for organizations maintaining highly sensitive and customer data. New technologies derive benefits as well as new risks that are not limited to logical threats, physical and human threats. Reports and surveys recorded by many organizations indicate a substantial rise in terms of security breaches year by year. Moreover, there are several reported cases in the year 2012 that are associated with information security breaches. Resultantly, organizations suffer massive revenue, reputation and customer confidence loss due to large amount of stolen...
5 Pages(1250 words)Case Study

Network security fundamentals, security threats, and issues

...?NETWORK SECURITY FUNDAMENTALS, SECURITY THREATS, AND ISSUES Network Security Fundamentals, Security Threats, and Issues Affiliation Date 3.1. Network Firewalls Security consists of tools, technologies, measures and laws used to ensure the safety of resources. At the present, security has become one of the biggest issues outlined by information technology firms and business organizations which connect their domestic Local Area Networks (LANs) and Wide Area Networks (WANs) to the Internet. In view of the fact that the Internet is a huge network of networks, as well as for the reason that of its basic design is intrinsically insecure and...
4 Pages(1000 words)Case Study


...? INFORMATION TECHNOLOGY SECURITY (Computer Sciences) of (affiliation) of Submission: Estimated word count: 1,937 Introduction The human experience today continues to be benefited and expanding at a very fast rate because of computer-related technologies which contribute greatly to modern conveniences. In the daily experience, people expect their lives to be safer, smoother, and easier due to computer technologies which if considered in the context of history, are a fairly recent phenomenon. It has contributed to the rapid expansion of data sets, new information, great incredible knowledge acquisition and hopefully, the enhancement of human wisdom. Computers had literally made the task of computing very fast and ultra...
6 Pages(1500 words)Case Study

Network Security

...? Case Study on Network Security Bryant Wiersema American Public Case Study on Network Security Introduction The Internet has become a staple of the business world today. It is because of this that a company should remain continually up to date with the latest and most efficient security measures. With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised. Vulnerabilities due to designs flaws, poor security management, incorrect implementation, and malicious...
3 Pages(750 words)Case Study

Security Program

...Running Head Security Program Security Program Security planning is one of most important risk management initiatives in modern organizations. Security planning must be seen in the context of wider organizational policies. Many aspects of security planning will be taken care of by, for example, the IT department or its equivalent. However, high level security provision on its own is not enough; the systems have to work in practice. The Data Protection Principle makes this clear, by requiring that security measures be 'technical and organizational'. Technical measures are relatively easy to provide: password systems, back-up systems for computers, locks on filing cabinets, and access control either to the building or to key parts... of it...
7 Pages(1750 words)Case Study

It security

...Security Policy al Affiliation) Company Overview DechTech Solutions is a medium sized Information Technology company which specializes in the provision of computer networking solutions, hardware and software maintenance, procurement and computers and their accessories including general ICT consultancy. With a head office located at the heart of Atlanta city, Georgia, it has several satellite offices across the country. The company has employee strength of about 500 including IT workgroup of 112 personnel. Given that DechTech Solutions is an IT company, most of its processes and functions are automated by a system which majorly runs on UNIX as main platform. It largely depends on IT infrastructural resources and assets for...
3 Pages(750 words)Case Study


...simple words with numbers to make the passwords more secure. This will make it easier for them to key in the passwords into the system. Increasing the number of password attempts will also go along way in reducing the number of times that the system locks itself. Also finding other means to reboot the system when it locks itself will go along way in reducing the time that is spent looking for the manager to reboot the system. About the time spent rebooting the system, it would be better to upgrade the systems processors and virtual memory to enable it rebuilt in a matter of seconds. To avoid all these problems with passwords, it will be a good idea to incorporate a proximity key card and its reader to the system (refer...
5 Pages(1250 words)Case Study

Homeland Security

...Homeland Security: Cybersecurity College: Introduction "Homeland security" refers to the consorted efforts by the nationaland federal government of preventing and averting attacks of terror to the people f the United States of America. These efforts are always put to minimize the attacks’ effects to the people and to work towards reducing the levels of vulnerability of the United States of America to terrorist attacks. The term Homeland security started in 2003 when there was a reorganization of the state agencies after the devastating September 11th attack, hence seeing the formation of the Department of Homeland Security. The actions of this department are what are amalgamated into the term Homeland security. The main focus... of this...
5 Pages(1250 words)Case Study

Aviation Security

...Aviation Security Number) May 14, (Faculty) Aviation Security Aviation security refers to all safety measures and regulations applied in airports to safeguard aircraft, airport staff and passengers from criminal activities, accidents and other threats. The aviation sector is of major economic and political importance in any country, due to the fact that it is the entry-point of goods and people to and fro the country. Due to the significance of this industry to a country, security is one of the primary concerns associated with aviation. Threats facing the aviation industry include terrorism, drug trafficking, accidents and general crime. The aviation industry has...
2 Pages(500 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Security Case Study for FREE!

Contact Us