Nobody downloaded yet

CJ 452 Security Planning and Assessment - Assignment Example

Comments (0) Cite this document
Summary
Risky materials in transportation are vulnerable to sabotage or misuse and in the wrong hands pose a significant security threat. The security of risky materials in transportation poses unique challenges as compared to security at fixed facilities because of the changing environment surrounding a moving vehicle…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
CJ 452 Security Planning and Assessment
Read TextPreview

Extract of sample
"CJ 452 Security Planning and Assessment"

Download file to see previous pages One of the most critical components of rulemaking for the department of transportation1 is the assessment of possible transportation security risks for covered shipments of risky materials. Many companies have implemented numerous security measures without examining the threats against their operations and their vulnerabilities to those threats. Threats are sources of danger and can include both criminals and terrorists and the attacks that they might initiate to achieve their objectives. Vulnerabilities are weaknesses that make us more susceptible to attack or injury.
When conducting a proper assessment of the threats to and vulnerabilities of the operation to a terrorist attack or terrorist activity, the types of information to consider include: (a) the type of risky material to transport, (b) the frequency and quantity of shipments, (c) the packaging type, and (d) the amount stored on-site. It is needed to identify and address the business practices (including relationships with external partners), such as the emergency response information that is available on site, and physical assets that are a part of the hazmat transportation activities.
It is needed to analyze the company's business practices that affect the transportation of the risky materials included in HM-232 to identify potential security vulnerabilities. Such business practices may include:
'Taking and proce...
relate to ensuring the trustworthiness of employees); Job descriptions, organization charts, and reporting structures for responsible management and decision making, security policies, and reporting (which all relate to who has access to information and who makes key decisions); Facility and building access policies and procedures; Qualification and selection of outside service providers (contractors) with access to hazmat handling areas; and Policies and procedures on distributing information related to hazmat shipments, including to business partners.'
It is better to analyze each physical asset (facility, terminal, etc.) used in the transportation of hazmat to identify potential security vulnerabilities. This analysis should consider, at a minimum, the following:
'Exterior surveillance and line-of-sight attack potential; Areas of concealment; Normal and potential vehicle and pedestrian paths; How congestion, choke points (where vehicles or pedestrians may get delayed during an evacuation), and other circumstances might reduce the effectiveness of the security measures; Immediate surroundings - assess the potential for layered protection or and the nature of potential nearby threats; Storage facilities, transfer, loading, and unloading areas; Business offices, storage of empty hazmat packaging; and Visitor, vendor, and employee parking.'
In addition, it is better to examine each configuration of transport vehicles for vulnerabilities based on use and the likely routes. Unlike many facilities, where the areas that are most in need of protection (such as critical operation centers) are separated from an outer fence by a considerable distance, there is no protective buffer surrounding vehicles on the road. Vehicles, therefore, can be more vulnerable. It is also ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CJ 452 Security Planning and Assessment Assignment”, n.d.)
CJ 452 Security Planning and Assessment Assignment. Retrieved from https://studentshare.org/technology/1503332-cj-452-security-planning-and-assessment
(CJ 452 Security Planning and Assessment Assignment)
CJ 452 Security Planning and Assessment Assignment. https://studentshare.org/technology/1503332-cj-452-security-planning-and-assessment.
“CJ 452 Security Planning and Assessment Assignment”, n.d. https://studentshare.org/technology/1503332-cj-452-security-planning-and-assessment.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Security Planning and Assessment Essay
...Security Planning and Assessment One of the most important, and often overlooked, aspects of security assessment and planning is the human impact that employees and other casual contacts have on the security of an organization. Security threats are often thought of as external, physical threats such as robbery or terrorism, but major organizational losses stem from the "misuse of equipment and facilities, careless handling of raw materials and finished goods, sloppy documentation and poor inventory controls" (ASIS International, 2008, p.2-III-1). The human element is significant for two major reasons....
5 Pages(1250 words)Essay
Security Planning and Assessment High School Essay
...Security Management, Planning, and Assessment In Today's Political Environment Security of a location or an individual is a direct function of the degree and type of security threat that it is exposed to. As the political and social landscape changes, the threats to security also change. Targets may take on new meaning to terrorists that are seeking to inflict harm on the greatest number of people possible. While law enforcement or other government agencies may respond to an attack, it is incumbent upon the corporation to provide their own private security. Cyber attacks may be directed at institutions such as banks and...
8 Pages(2000 words)Essay
Security Planning and Assessment
...Security Planning and Assessment 1. The most important aspect of security assessment and planning is its sustainability. According to the EDAW (1999), the welfare of the population depends upon the “quality of the environment and the availability of resources. The idea of sustainable planning in terms of the security will help us ensure that the kind of safe environment we are trying to reach at present will be the kind of safe environment the the future generation will have. Apart from other aspects of security assessment and planning such as being at...
7 Pages(1250 words)Essay
CJ452 Security Planning and assessment
...on the necessary information. Significant risk in security is marked by the color yellow. This time people should increase their surveillance in critical locations. They should also coordinate with the government agencies regarding the available emergency plans. They should also further assess and refine protective measures and implement, whenever appropriate, the contingency measures. When there is a high risk in security, colored orange, people should immediately coordinate security measures with armed forces or other law enforcement agencies. They should also need to increase their vigilance on public places and prepare to work at an alternate site...
4 Pages(1000 words)Essay
Security Planning and Assessment Assignment
...Security Planning and Assessment Question1) define workplace violence. To what degree is workplace violence a problem in the United s What factors contribute to it What, if anything, can be done to reduce the incidence of violent crime in the workplace Do private security organizations play a role in the solution Answer 1) Workplace violence is violence or the threat of violence against workers. It can occur at or outside the workplace and can range from threats and verbal abuse to physical assaults and homicide, one of the leading causes of job-related deaths. However it manifests itself, workplace violence is a growing concern for employers and employees nationwide. A very real, clear and present danger lurks just beyond... and...
15 Pages(3750 words)Assignment
Security Planning and Assessment - protection
...Security Planning and Assessment The word security refers to safety. Security can be on anything for which someone pays too much care and attention. In assessment of security the assessor wants the full help and guidance from the organization that is being assessed. The organization gives assessor the full authority and provides him all facilities to access the system of organization. The benefit of assessment is to implement the security or improvement in secure system. An assessment is basically very beneficial and useful of all...
6 Pages(1500 words)Essay
Security Planning and Assessment
...Information Security Issues intertwined with newer Technologies at Organizations Word Count: 2958 Contents of the Report: Introduction Security Issues Security Management Security management and Responsibilities Security AssessmentSecurity PlanningSecurity Implementation: Administrative Policies Summary of the Report. Introduction Information Technology is evolving at a fast pace. Information technology has set new trends in the generation of computers. This Trend has imbibed various technologies that improvise the life style and business aspects of every individual in accordance with technology. As the technology enhanced it brought in some technological issues such as Information Security Risk. The Security Risks involved... to be...
10 Pages(2500 words)Essay
Security Planning and Assessment Quiz
...Security Planning and Assessment Quiz Generally, should prerequisites for employment be different for security candi s than they are for public sector police candidates Why or why not The prerequisites for both positions should be the same. Both positions have the same physical and cognitive demands. Background integrity requirements should be the same, as they are both in a position of trust. The different and specialized knowledge that a police officer requires, such as arrest procedure, is typically taught as a part of the police training program. Private security should also make a greater effort to train security guards in regards to...
3 Pages(750 words)Essay
Security Planning and Assessment - terrorism
...This paper is a case study regarding Security Planning and Assessment in a POST Office, Security Planning and Assessment of University Abstract The threat from terrorism or any other kind is real and serious and we need to consider security planning. If we think our organization might be vulnerable or affected by an attack, we should carry out an impact assessment and apply appropriate protective security measures. This paper takes us through the process of how to prepare and what to do in the aftermath of an attack in a POST Office as a case...
5 Pages(1250 words)Essay
Security Planning
...of the of the of the Security Planning It is the aim of the Center for the Study of High Consequence Event Preparedness and Response to prepare the country to face high consequence issues. Security assessment has to encourage the development of sophisticated and creative technologies. This Center has to collaborate with the Department of Homeland Security Centers of Excellence. The various aspects of importance in this endeavor are preparedness, which entails governmental and first responder preparedness, community preparedness, national preparedness and private sector preparedness. Further, the preparedness of the nation as a whole in order to counter...
9 Pages(2250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Assignment on topic CJ 452 Security Planning and Assessment for FREE!
logo footer
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us