StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Providing Security for a Client - Essay Example

Cite this document
Summary
The paper "Providing Security for a Client" describes that providing security for a client can be a full-time job. You never know what situation may develop and that is why you must prepare for any possibility. The following is a detailed breakdown of a client’s protection plan…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Providing Security for a Client
Read Text Preview

Extract of sample "Providing Security for a Client"

The client may have to travel by car, train, and plane and attend a variety of functions, including meetings and invitations for meals at restaurants, and do personal activities such as recreation and errands. Over the day, the client will be exposed to a range of risk levels, ranging from higher risk (meeting and greeting members of the public at an outdoor rally) to low risk (dining at an exclusive, gated country club with high security).

Some planning for the day would have begun on previous days. Once the itinerary is known, one or more bodyguards will travel the route to the venues, to check the roads for unexpected changes (road work, detours, closed lanes) and to check the venue. The venue needs to be checked for bugs and the security of the facility (exits, entrances) needs to be inspected. As well, the bodyguards will want to know the names of the staff who will have contact with the client, so that a simple electronic background check can be run on these individuals.

An hour before leaving with the client to his first appointment, the driver-bodyguard, and another bodyguard remove the cars that will be used to transport the client from the locked garage and inspect them. There may be only one car for a lower-risk client. A higher-risk client will have additional cars to form a protective convoy of vehicles that can flank the client's vehicle. The vehicles are inspected before leaving.

Once the cars have been inspected and they are deemed to be ready for use, they are brought into position near the exit door where the client will leave the secure building. At least one driver-bodyguard stays with the cars while waiting because the now-searched cars cannot be left unattended. If the convoy is left unattended, an attacker could attach an IED or sabotage one or more of the cars. Then the bodyguard team flanks the client as he moves from the secure residence to his car.

The convoy then moves out towards the destination. The team will have chosen a route that avoids the most dangerous "choke points", such as one-lane bridges or tunnels because these routes have no way of escape and they are more vulnerable to ambush. In some cases. If the client has to travel by train, the bodyguards will inspect the rail car they are traveling in and the other cars he/she will use.

            When the convoy arrives at the location, one or more bodyguards will exit first to confirm that the location is secure and that the staff who were booked to work that day are the ones who are present. If the location is secure, these bodyguards signal that it is safe to bring in the client. The client is escorted into the building using a flanking procedure. If the client is attending a private meeting inside the building, and the building itself is secure (controlled entrances) the client will not need to have a bodyguard escort in the building. The bodyguards can then pull back to monitor his or her safety from a further distance. Bodyguards could monitor entrances and exits and the driver-bodyguard watches the cars.

If the client is moving about in a fairly controlled environment such as a private golf course, which has limited entrances and exits, the security detail may drop down to one or two bodyguards, with the other bodyguards monitoring the entrances to the facility, the cars, and remaining in contact with the bodyguards escorting the client. Throughout the day, as the client goes about his activities, the number of bodyguards escorting the client will increase or decrease according to the level of risk.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Protection Plan Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Protection Plan Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/people/1507053-protection-plan
(Protection Plan Essay Example | Topics and Well Written Essays - 750 Words)
Protection Plan Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/people/1507053-protection-plan.
“Protection Plan Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/people/1507053-protection-plan.
  • Cited: 0 times

CHECK THESE SAMPLES OF Providing Security for a Client

Cloud Security and Privacy Issues

Towards ensuring security for the users, Microsoft discovers and reports a variety of vulnerabilities to its users so that they can be aware of cyber criminals.... In order to be considered protected, data from one client are correctly separated from that of the other (Brandau & Tempest, 189).... This is a clear implication that the client does not require going to the extent of downloading and installing the application on the computer system, but all the procedures will be stored and managed under the cloud server....
9 Pages (2250 words) Research Paper

Thin Client Operating System Security

However the use of thin clients within Windows is essentially aimed at improving overall network security for specific functions and purposes.... This report "Thin client Operating System Security" discusses thin client as a term that is used to refer to a network computer or PCs which are used by businesses whose design makes them be managed centrally and their configuration makes them to lack CD/DVD players or expansion slots.... HIN client OPERATING SYSTEM SECURITY Thin client is a term which is used to refer to a network computer or PCs which are used by businesses whose design makes them to be managed centrally and their configuration makes them to lack CD/DVD players or expansion slots....
8 Pages (2000 words) Report

Summarizing how information security

However, various security issues with respect to accessing transactional record and information of a client by other external or unauthorized persons have been recorded.... It has been learnt that Citibank manages the personal data, records as well as information of each client in an appropriate manner and with the assistance of Citi Records Management Policy as well as Citi Data Management Policy.... Security Policies in Citibank Citibank ensures an effective and efficient form of security policy regarding maintaining and protecting data, information or record of its individual client....
3 Pages (750 words) Essay

Effectiveness of SSL and Certification Authentication to Protect Clients

While this might be an optional feature in many situations, such as a client to business environment, it has become essential and mandatory in most business to business environments.... Within this context, any SSL-enabled server software package can work to verify the validity of both a client's certificate and the public ID that they are working off of (Okyeon, 2014).... There are many times when a client will be sending their own private information via several different computers and servers....
14 Pages (3500 words) Research Paper

Client agreement letter

We intend to provide a solution that is tailored to satisfy the Essay: Computer Sciences and Information Technology client Agreement Letter Project Team Leader Organization Address To Recipient OrganizationAddressDateDear Sir / MadamRE: client ACCEPTANCEAs the project team, we confirm our acceptance to provide the required items to the client within the provided time frame.... n the client's part, the clients have accepted to provide the information relating to the GE contacts of the frequent suppliers....
2 Pages (500 words) Essay

Database Security Controls

End user security is also concerned with users and their access to the server which involve client applications and the access to read and write in the database (Rouse, 2014).... The personal information of the clients, is made available for 24 hours a day as it can be needed by the client at any time.... DATA security CONTROLS Database security Affiliation Data Introduction A database is a collection of data that is stored in large disks and units and can be accessed easily with the help of software....
12 Pages (3000 words) Literature review

The Security Mechanism for IEEE 802.11 Wireless Networks

ne of WEP limitations is that it can only be implemented on a client /server wireless network having an access point but cannot work on a peer-to-peer network. ... nce WEP is enabled, all the data is encrypted using the Ron Rivest code 4(RC4) to provide security for data to be transmitted.... The SSID acts as some form of password hence providing security (Alicia, 2001).... Access points are configured to broadcast the SSID hence any client can be able to receive it and hence access the access point....
10 Pages (2500 words) Case Study

Cloud Computing Security

n any computing environment whether, Cloud Computing or non-cloud computing network threats are security threats that provider and client have to contend with while using various services.... To control and improved data access, provider must develop strong authentication systems that will allow providers and their client to provide authentication and execute sanctions on users (Cloud Computing and Security 4).... The author of this paper "Cloud Computing security" offers a succinct comparison of Cloud Computing and non-cloud computing highlighting their difference....
13 Pages (3250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us