StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Assessment Methodology - Essay Example

Cite this document
Summary
The paper "Security Assessment Methodology" discusses that there must be some crises management plans so that any mishaps there must minimize the damage and personal loss. For this comprehensive policies and actionable guidelines should be predefined…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Security Assessment Methodology
Read Text Preview

Extract of sample "Security Assessment Methodology"

Security Planning and Assessment The word security refers to safety. Security can be on anything for which someone pays too much care and attention. In assessment of security the assessor wants the full help and guidance from the organization that is being assessed. The organization gives assessor the full authority and provides him all facilities to access the system of organization. The benefit of assessment is to implement the security or improvement in secure system. An assessment is basically very beneficial and useful of all security tests. Methodology Following type of security assessment methodology is used for the powerful security methodology. Analysis the system and its basic needs Review the previous document Risk analysis Sort out the threats Analysis of instrument Report and briefing Let if these assessment is based on airport security then there are many technologies and functions are used to keep the security of airports. It can also say that the security related to aero plane from the hijacking and terrorism crimes. Airport is one of the large gathering places and there is high risk of terrorism there. Now days it is seem that there is high rate of attacks on aircrafts. The high rate of hijacked the aero plane as a lethal weapon target for terrorism. It is also considerable thing that the security of airport highly checks the weapons or bomb before sitting into aero plane. Basically airport security work for two reasons: To safe the airport To secure the aero plane Analysis the system and its needs The analysis can be done by the inspecting the things of system like inspect the airport. It can be done by review, observe study or analyze the previous assessment objects. These things facilitate understanding, clarification, or get evidence. These things are helpful for security control existence, functionality and potential for improvement. There is a local examination that included the information security methods; plans and processes; analyzing the system design documentation; view the system backup; observe the incident-response operation; review the security configuration settings; and user/administrator guides. The following ways are useful for conducting the analysis of security system. Interview Test the security configuration settings Start from unit to whole system Airport security in United States is done by the protection authority. These securities are done from the attacks and any type of terrorism. Security of airport means safe journey. The protection policy in United States is controlled at the state or local level. It can include that airport can be secure by: Police force A branch of local police unit stationed at the airport area Special members of police force Group of military of country Unit of airport protection service Police dogs service that mostly use for poison detection like drugs. The airport security of Canada is enforced by Canadian Airport Transport Security Authority (CASTA). Review the previous document CASTA is responsible for pre-board all persons screening. In this way they have contract with such service provider like Aeroguard Ltd Company. This company is responsible for train and guides the officer for screen test and its all methods and planning. These authorities are later privatized in 1990. Risk analysis The risk of any terror is remain although there is screening but there are many different methods from which the terrorist enter into the airport or they attempt to hijack the aero plane. The risk is every very high although the security measures have done. Sort out the threats In CASTA there are special trained officers that detect threats instead of that they completely rely on equipment to find threats. As aero plane perimeter for defenses get better at repelling the external attacks such as hijack, bombing or any data theft. But the criminals are ever engage to developing and creating new ways to break the securities and get the unauthorized access to system. Analysis of instrument CASTA uses x-ray machines to verify the contents of all carry-ones as well as detectors. Explosive trace detection (EDT) is a unit that searches the equipment and different physical glossaries of passenger. This is done pre-screening. More over CTX machines, high range of x-rays. EDT is used to checked bags. There is a high risk that the travelers have weapons or any other item that is dangerous for other so there is a quickly screening method is adopted which is done by metal detector. But there are now explosion machines that also used for screening. X-ray machines are also to speed this process of checking. Now days x-ray backscatter scanners are used to check the hidden weapons and explosives on travelers. This device basic need that the traveler stand very close to flat panel and it do the work on his whole body and then generate the high resolution image as shown in above picture. The place where screening is done called sterile area and referred to as airside. There is also a protection on airport that strictly use of plastic cutlery and paper cups instead of metal cutlery for the protection; the people can use metal cutlery as a weapon. Usually non-passengers are not allowed to meet the traveler in the inner gates of airport. Report and briefing Although there are many security policies for the protection but it is reported that round about 60% of fake bombs or components were missed by screeners. It is the need that he screening made more efficient for detecting the people. Those people who are threats and take short time for searching them. There should be searching trusted and on verifying the individual it can not take too much time and solve the problem in shortest time. There must be the accurate eye view on cameras place in airport that must detect any irregular physical movements of the people. The forces must be trained to handle with psychological pressure to the doubted person. Alarm system must so sensitive that the security alert in shortest time and detect the emergency as soon as possible. The government must take special attention to these sensitive areas and their security. The forces must be honest and devoted to their work. So that any leak with in the system can not be possible. Explosive detection machines must upgraded and imrove it working and detection. There must be regular focuing on the newest possiblities of terror. There must be some crises management plans so that any mishape there must be minimize the damage and personal loss. For this comprehensive policies and actionale guidelines should be predefined. Although there are many security measure and suggested measure for security but there is a risk of terror is resided. The need is to detect the terrorists and then give them non-fogetable punishment so that no body have dare to do this act again. References 1. http://en.wikipedia.org/wiki/Airport_security#Canada 2. http://www.processor.com/editorial/article.asparticle=articles%2Fp2808%2F30p08%2F30p08.asp 3. http://en.wikipedia.org/wiki/Information_Technology_Security_Assessment 4. http://www.internationalsos.com/en/governments_securityconsulting.htm 5. http://66.102.9.104/searchq=cache:mKNq1ptCiXcJ:csrc.nist.gov/publications/drafts/nistir-7328/NISTIR_7328-ipdraft.pdf+Conducting+Security+Assessment&hl=en&ct=clnk&cd=8&gl=pk Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Planning and Assessment - protection Essay”, n.d.)
Security Planning and Assessment - protection Essay. Retrieved from https://studentshare.org/miscellaneous/1517892-security-planning-and-assessment-protection
(Security Planning and Assessment - Protection Essay)
Security Planning and Assessment - Protection Essay. https://studentshare.org/miscellaneous/1517892-security-planning-and-assessment-protection.
“Security Planning and Assessment - Protection Essay”, n.d. https://studentshare.org/miscellaneous/1517892-security-planning-and-assessment-protection.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Assessment Methodology

Risk Assessment

The title of the paper is “Development of a Risk Assessment Analysis methodology for Nonprofit Organizations” and has been written by Steven F.... The title of the paper is “Development of a Risk Assessment Analysis methodology for Nonprofit Organizations” and has been written by Steven F.... The author of the chosen paper, Fox (2008) understands the constraint of limited budgets in non-profit organizations therefore devised the methodology that would not cause them any setbacks in their financial system....
2 Pages (500 words) Essay

Information Assurance Perspective on Cloud ERP Solution Implementation for Lesley Stowe Fine Foods (LSFF)

This paper evaluates the comprehensive concept of IA offered by the cloud ERP solution to ensure that IS serves LSFF's transactional needs like operational capability and transformational needs like rapid adaptation, innovation and knowledge management.... ... ... ... In LSFF, it is clear that the management is carefully considering monitoring mechanisms appropriate to the enterprise's prevailing conditions....
20 Pages (5000 words) Term Paper

Security Planning and Assessment

The author of the "Security Planning and Assessment" paper defines workplace violence, identifies to what degree workplace violence is a problem in the United States, and examines the most significant or important aspect of security assessment and planning.... ... ... ... Management must ensure that they recognize employees for the great things they do....
14 Pages (3500 words) Assignment

Risk Management Models

A detailed risk assessment model was designed and risk assessment sheets are also presented in this paper.... Law enforcement personnel may have skills and experience but the handling of offense risk assessment may prove to be challenging and unclear to them, conducting risk assessment may require skills and background information that is different from other investigations (Fein et al.... Risk assessment is a process that evaluates the likelihood of a given hazardous environment this may contribute to a particular disease or illness....
10 Pages (2500 words) Article

Designing a Secure Network Infrastructure for E-Commerce

For this reason, it is important for a company to develop an information security system.... The security system does not only protect the company's data from reaching unwanted people/personnel, but it also prevents the data from being destroyed by un-trusted programs and viruses.... PrefaceOne of the aims and benefits of a masters program in information security management is the focal point on technology and issues of implementation that are related to information security....
28 Pages (7000 words) Thesis

Security Threat and Security Risk Assessments

assessment of threat and risk is a fundamental strategy for the management of security organizations.... assessment of threat and risk is a fundamental strategy for the management of security organizations.... Almost all security organizations need some objective assessment of threats and risks as security controls must be selected centered on actual risks to the assets of the organization.... assessment of threat and risk is a fundamental strategy for the management of security organizations....
6 Pages (1500 words) Essay

Security Threat Assessment and Security Risk Assessment

The paper "Security Threat assessment and Security Risk assessment" highlights the importance of auditing in the security system, the process of risk assessment used to mitigate the consequences of risk, the vulnerability rating, and assess the action plan for the specific threat and risk.... According to Amoore, L (2013), security threat assessment is the process of identifying threats to a country, people, organization, or region....
12 Pages (3000 words) Literature review

Security Threat and Risk Assessment

In the heart of threat and risk assessment, there is an objective, repeatable methodology of gathering the inputs on organizational risks, vulnerabilities, threats, and the controls which are responsible for the production of risk magnitude that is discussable, reasonable, and treatable (Strachan-Morris, 2010).... The paper "Security Threat and Risk assessment" is an excellent example of an essay on management.... As a result, different institutions globally are relying on security and experts on risk assessment in assessing a wide range of security risks....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us