We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

CJ 452 Security Planning and Assessment - Assignment Example

Comments (0)
Risky materials in transportation are vulnerable to sabotage or misuse and in the wrong hands pose a significant security threat. The security of risky materials in transportation poses unique challenges as compared to security at fixed facilities because of the changing environment surrounding a moving vehicle…
Download full paper
CJ 452 Security Planning and Assessment
Read TextPreview

Extract of sample
CJ 452 Security Planning and Assessment

Download file to see previous pages... One of the most critical components of rulemaking for the department of transportation1 is the assessment of possible transportation security risks for covered shipments of risky materials. Many companies have implemented numerous security measures without examining the threats against their operations and their vulnerabilities to those threats. Threats are sources of danger and can include both criminals and terrorists and the attacks that they might initiate to achieve their objectives. Vulnerabilities are weaknesses that make us more susceptible to attack or injury.
When conducting a proper assessment of the threats to and vulnerabilities of the operation to a terrorist attack or terrorist activity, the types of information to consider include: (a) the type of risky material to transport, (b) the frequency and quantity of shipments, (c) the packaging type, and (d) the amount stored on-site. It is needed to identify and address the business practices (including relationships with external partners), such as the emergency response information that is available on site, and physical assets that are a part of the hazmat transportation activities.
It is needed to analyze the company's business practices that affect the transportation of the risky materials included in HM-232 to identify potential security vulnerabilities. Such business practices may include:
'Taking and proce...
relate to ensuring the trustworthiness of employees); Job descriptions, organization charts, and reporting structures for responsible management and decision making, security policies, and reporting (which all relate to who has access to information and who makes key decisions); Facility and building access policies and procedures; Qualification and selection of outside service providers (contractors) with access to hazmat handling areas; and Policies and procedures on distributing information related to hazmat shipments, including to business partners.'
It is better to analyze each physical asset (facility, terminal, etc.) used in the transportation of hazmat to identify potential security vulnerabilities. This analysis should consider, at a minimum, the following:
'Exterior surveillance and line-of-sight attack potential; Areas of concealment; Normal and potential vehicle and pedestrian paths; How congestion, choke points (where vehicles or pedestrians may get delayed during an evacuation), and other circumstances might reduce the effectiveness of the security measures; Immediate surroundings - assess the potential for layered protection or and the nature of potential nearby threats; Storage facilities, transfer, loading, and unloading areas; Business offices, storage of empty hazmat packaging; and Visitor, vendor, and employee parking.'
In addition, it is better to examine each configuration of transport vehicles for vulnerabilities based on use and the likely routes. Unlike many facilities, where the areas that are most in need of protection (such as critical operation centers) are separated from an outer fence by a considerable distance, there is no protective buffer surrounding vehicles on the road. Vehicles, therefore, can be more vulnerable. It is also ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
National Assessment of Educational Progress (NAEP) is one such tool that has been used for decades to assess students. Since it was initiated, the National Assessment Progress has monitored the national educational process through conducting periodic assessments in various subjects.
3 Pages(750 words)Assignment
It is worth mentioning in this similar concern that rapid advancement of technologies and advent of globalization are providing broad opportunities to other business firms in expanding or establishing themselves in the global market creating threats for Starbucks (The New York Times Company, 2013; Steverman, 2009).
4 Pages(1000 words)Assignment
Security Planning and Assessment Assignment
Answer 1) Workplace violence is violence or the threat of violence against workers. It can occur at or outside the workplace and can range from threats and verbal abuse to physical assaults and homicide, one of the leading causes of job-related deaths. However it manifests itself, workplace violence is a growing concern for employers and employees nationwide.
15 Pages(3750 words)Assignment
Security Planning and Assessment
As the technology enhanced it brought in some technological issues such as Information Security Risk. The Security Risks involved with the various information systems need to be addressed in order to better the performance of the organization in the dynamic global market.
10 Pages(2500 words)Essay
Security Assessment Report
The survey is based on all round security concerns the company is adopting. Some suggestions are given where ever necessary. The following are the various security departments the
3 Pages(750 words)Assignment
Discussion: Planning a Learning Needs Assessment
Focus groups: whereby small numbers of potential learners are brought together and a facilitator leads the discussion group asking questions which are meant to encourage detailed discussions (Bastable, 2008). Self Administered Questionnaires: The use of the
1 Pages(250 words)Assignment
Physical security assessment on the VA medical center

The author of the paper provides an interview with the institution’s security The institution was particularly under-staffed as pertains to security. The building’s design did not adhere to CPTED. There was sparse use of CCTV to enhance surveillance while there little to no barriers from an external barrage.

12 Pages(3000 words)Assignment
Network Security Planning
The determination and implementation of the best network design remains a daunting task for organizations that are not aware of the Cisco SAFE architecture guidelines to developing reliable and secure network
3 Pages(750 words)Assignment
ed a decrease in his functional ability as he reports that he no longer goes for walks like he initially did, and that he no longer volunteers in the kindergarten as a cook. Peter believes that he is just experiencing symptoms of old age and that everyone experiences them at
8 Pages(2000 words)Assignment
Consumer Care segment aims at providing consumers with personal, health and crop care products to make their lives better. Performance technologies, on the other had involve stat-of-art Home
16 Pages(4000 words)Assignment
Let us find you another Assignment on topic CJ 452 Security Planning and Assessment for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us