Free

Security Threats in Louisiana - Term Paper Example

Comments (0) Cite this document
Summary
This paper highlights that the Mall of Louisiana is one of the biggest commercial structures located in Bluebonnet Boulevard. With more than 175 retailers, the number of visitors and shoppers per day could be thousands. The most common threats come from clients, employees and suppliers…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful

Extract of sample "Security Threats in Louisiana"

 The Mall of Louisiana is one of the biggest commercial structures located in Bluebonnet Boulevard. With more than 175 retailers, the number of visitors and shoppers per day could be thousands. As identified in PSOS (2011), “on the day-to-day level, the most common threats come from clients, employees and suppliers. Potential terrorist or criminal acts pose a threat whose impact on human and material loss could be enormous” (par. 2). In this regard, the security system for the shopping mall should encompass the following areas: a preventative intelligence infrastructure; advanced technological means; security procedures; professionally trained personnel; and inspections, supervisions and exercises or simulations [PSO11].
In order to be prepared to address risks of a potential terrorist attack, shopping malls, like the Mall of Louisiana, should implement the following security measures: (1) conduct vulnerability assessments and develop emergency response plans; (2) guarding public access to ventilation systems and employee areas; (3) undertake surveillance techniques inside malls and in parking lots that can make security guards and CCTV cameras more visible to shoppers; (4) large or multiple-floor malls designate a floor captain on each level or wing of a complex where ach designee can serve as a point-of-contact during emergency situations; (5) front-line security officers be informed about any terror alerts; and (6) appropriate security threat training encompassing terrorist attacks must be regularly done and update [Rob11]
As the private security professional, one should respond to a terrorist attack with focus on the safety of the organizations’ resources and with appropriate knowledge of preparedness, You should also include how you would respond to a terrorist attack as the private security professional. Make sure you cite your sources using APA. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Threats in Louisiana Term Paper Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/sociology/1579432-see-below-cj-210-wk6
(Security Threats in Louisiana Term Paper Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/sociology/1579432-see-below-cj-210-wk6.
“Security Threats in Louisiana Term Paper Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/sociology/1579432-see-below-cj-210-wk6.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security Threats in Louisiana

Threats to Global Security

...of how wars are justified and “spun” to the electorate in the West, and how they are critically appraised in the media. The internet to a large degree has as influence on this as it relates decentralized knowledge sharing on alignment groups in ways that are quicker and less expensive than traditional print or mass-media related to centralized control. In “A Violent Peace,” Paul Rogers writes: “While nuclear and other weapons of mass destruction will be major features of the coming decades, the main methods by which the world’s powerful states, especially the United States, seek to maintain their control of international security are through the appropriate use of conventional forces. Threats are seen to...
14 Pages(3500 words)Essay

IT Security Threats and Countermeasures

...IT Security Threats and Countermeasures Introduction The technological advancement has leaped mankind to another level in terms of communication, business processes, acquisition of knowledge, management etc. The invention of internet has made the whole world come closer on the same platform. The emergence of e-learning has replaced the conventional forms of educational practices with online modes of acquisition of education and collaboration. The field of business has benefitted from the introduction of e-commerce and information management systems. Alongside all the advantages of IT, there exists an appalling consequence that compels the organizations to invest hefty amounts- IT...
8 Pages(2000 words)Research Paper

Network security fundamentals, security threats, and issues

...?NETWORK SECURITY FUNDAMENTALS, SECURITY THREATS, AND ISSUES Network Security Fundamentals, Security Threats, and Issues Affiliation Date 3.1. Network Firewalls Security consists of tools, technologies, measures and laws used to ensure the safety of resources. At the present, security has become one of the biggest issues outlined by information technology firms and business organizations which connect their domestic Local Area Networks (LANs) and Wide Area Networks (WANs) to the Internet. In view of the fact that the Internet is a huge network of networks, as well as for the reason that of its basic...
4 Pages(1000 words)Case Study

Common Information Security Threats

...? Common Information Security Threats Introduction The purpose of computers and other network systems is to facilitate information exchange; today, organizations are managed using computer network. This requires respective organizations to implement the use of password and user name; however, such mechanism creates channels for committing computer crimes. Attackers invent ways of hacking passwords, and steal information from different organizations. At the present, organizations face a number of security threats (Whitman, 2003), this paper explores the information security threats facing Apple Inc. Information Security...
3 Pages(750 words)Essay

Security: Threats and Security Analysis

...?Is Nuclear Disarmament Desirable and Feasible? Introduction When the Cold War was about to culminate, the world powers proclaimed a seemingly desirable, but somewhat impossible, vision—a world completely free from the threats of nuclear weapons. The value or purpose of nuclear weapons is rooted in global politics. Nuclear disarmament demands a collaborative model of international security. Cooperation between the power blocs is very important, as well as regional cooperation. Disarmament efforts should deal with the interests of developing nations and to the expectations, cynicism, and uncertainties of countries across the globe. To be successful, such efforts must be in harmony with continuing power...
10 Pages(2500 words)Essay

IT security threats

...IT security threats Affiliation: Discuss global IT security threats and potentialsolutions One of the threats to IT according to CERT (Computer Emergency Response Team) program is the insider threat (from employees, contractors or even business partners) since they are in a better position to access the information system of the organization without detection (http://www.cert.org/). The solutions to this are to enforce strict passwords and having account management practices as well as policies, responding quickly to suspicious and or disruptive behavior and especially on the information technology systems, enforcing stringent security access and controls and has less privileged access to users of the sensitive information systems... ...
1 Pages(250 words)Research Paper

Security Threats and Defenses

...Security threats and defenses Role of information system security The term social security in the context of organization is defined as the act in which, employees of an organization are manipulated by outsiders to rely key and confidential information details regarding an organization (Hadnagy, 2011). This information is sort by ill intentioned people for purposes of hacking computer systems or committing fraud. Social engineering is the newest form of crime in organizations and involves manipulation of the mind in hidden ways (Hadnagy, 2011). The successful operation of any organization is highly dependent on the performance of its work force. It is therefore the...
2 Pages(500 words)Essay

Security Threats and Defenses

...Security Threats and Defenses Need for security measures. Social engineering has caught on among many professionals. The techniques in use are based on cognitive biases, which are attributes of man decision making. Social engineers are aiming at exploiting these biases by creating attack techniques. Consequently, every company is at a risk of being attack by one of the many techniques in use. Preparing employees to recognize and respond to social engineering techniques will at help to protect the company in many ways, which include: 1. Use strong passwords. By using strong passwords in the computer network, they will protect the company from against unauthorized access to company’s confidential information and identity theft. 2... ...
1 Pages(250 words)Essay

Resp. Aircraft Operator Security Threats

...Aircraft Security Scenario one Regarding the case of airline baggage handler, he was not supposed to give the passenger his phone back directly because of security reasons. The main responsibilities of airline baggage handlers are different, but do not include any contact with passengers, because this would act as a loophole to insecurity from dishonest handlers. An airline baggage handler is supposed to be an operations agent. He makes sure that an aircraft carries the expected weight for a safe operation. He is also warehouse agent and processes inbound and outbound air freight. He also works as a ramp agent and makes sure that all loading bags are unloaded in time. It is also the role of the airline...
2 Pages(500 words)Essay

Threats to the Global Security

...Threats to the Global Security of the of the Introduction One of the leading sponsor of terrorism in the whole world is Iran through its financial and operational support for some groups like the Hamas, Hezbollah and many others. Through its military groups, Iran could potentially share its vast nuclear technology and expertise with extremist groups that are very much hostile to the U.S and even to the West as a whole1. A nuclear-armed Iran would promote the aggressiveness of the Iranian policy and as a result, a great confrontations erupted with the international community. Nuclear weapons that were highly accessible to the Iranian regime had a very severe repercussions for the security...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Security Threats in Louisiana for FREE!

Contact Us