Premium Essay

Security Awareness Proposal

In: Computers and Technology

Submitted By tholmes
Words 368
Pages 2
Look at the deliverables for the final project; develop a plan to for effective communications, and increase security awareness in the organization. Please be sure to create this portion of the final proposal with all elements in mind as you prepare this portion.

Final Course Project Proposal (22%)
You have been hired as the new protection officer for ESL Inc. ESL Inc. has a large facility over 900 employees can be in at any given time. The organization has core hours from 8 AM to 6 PM but workers arrive at the organization as early as 6 AM and leave as late as 9 PM. The organization has 3 guards that work core hours only, posted at the front entrance to the building. Employees have badges that have their picture and key cards that let them in the building. The security guards open the door and check badges in the event a key card does not work. There is no security to prevent users from getting on the grounds, the front of the organization is off a major highway, and the back of the plant is backs up to acres of undeveloped woods. ESL Inc was just awarded a federal contract and after the site visit they were told they would lose the lucrative contract if they did not make their organization secure.
As the new protection officer, you are to create a comprehensive proposal to make the facility secure which includes the following elements:

* New adequate security staffing levels and shifts * Effective plan to increase communications * Plan to raise security awareness in the organization * Automation operations plan * A new patrol plan * A comprehensive Physical Security Plan * Access Control Plan * Fire and other hazard plan * Approach to prevent and mitigate workplace crime * Emergency response plan * Surveillance plan
This sounds like a great deal of information, but you should rely on the information in…...

Similar Documents

Premium Essay

Political Awareness

...Political Awareness Maria M. Arias Nur 587 May 21, 2012 Amy Buchart Political Awareness Today’s health care system changes frequently with the many political issues that affect patient outcomes and nursing. It is important for nurse leaders to maintain a certain awareness of the changes and be active participates in advocating and decision-making of the political issues that arise for the health care field and nursing, especially in their particular field of practice. Although there may be times that a nurse leader may need to advocate for other fields of nursing, politics, and policy making. Health care is affected by decisions made by the federal and state government. The persons in those seats are mainly political personal and not health care people. Because these people are not medical or nursing people, the decisions made may impact negatively the field or profession that is why it is important for nurse leaders and nurses to be aware of the decisions made about the profession and health care. Becoming a member of a professional organization will help nurse leaders increase their knowledge about the issues affecting the nursing profession and health care in the federal and state level of legislation. Nurse leaders should consider participating in professional organizations and political issues to provide feedback and input that affect the delivery of health care and the nursing profession. Facility policy and services provided may be affected by the......

Words: 510 - Pages: 3

Premium Essay

Proposal

...Sealed Bids vs. Competitive Proposals Strayer University Cost and Price Analysis – BUS 315 Sealed Bids vs. Competitive Proposals When the government has recognized a necessity for supply and services, they immediately conduct a market research, and find probable sources of supply. This information is then sent to the contracting officer for procurement. The contracting officer is solely responsible in determining if the procurement may be accomplished through sealed bidding or negotiation. Sealed bidding is the government method to make known of a need by a solicitation named Invitation for Bid (IFB). Negotiation as used in the acquisition process, means contracting through the use of competitive proposals and discussions, between the contracting officer and the contractor. These government solicitations for negotiation are called Request for Proposal (RFP). The solicitation process originates similar for sealed bids and competitive proposals. The contracting officer announces an IFB for sealed bids, and/or a RFP for a competitive proposal, in FedBizOpps. Most solicitations are accessible, and can be copied directly from the Internet. The contractor upon awareness of these solicitations replies by submitting a bid for the sealed bidding, and/or a proposal for the competitive proposal solicitation. Most contractors contemplate sealed bidding as the less pricey, fastest economical procurement method since no time is lost in negotiations. Bids are assessed......

Words: 531 - Pages: 3

Premium Essay

Security Awareness

...Information Security - Security Awareness Abstract: 3 Security Awareness 4 Regulatory Requirements for Awareness and Training 7 References 13 Abstract: Information security means protecting information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. A policy can be described as a set of principles intended to manage actions. An Information Security Policy (ISP) is a defined set of principles intended to protect information and information systems by controlling the actions allowed within an organization. There is not a single off the shelf approach to implement an ISP. The ISP is tailored to the specific organization and defined by the environment of the IS, the classification of the information, governance and compliance laws, and the levels of acceptable risk to the organization. An IPS has many areas to cover but the most prominent subject matter is risk management. Risk management addresses an organization's assets exposure to environmental risks. Since risk management is continuous and must be reevaluated whenever changes are introduced into the environment or when a breach of the policy has occurred so should the ISP. Policies must be useable, workable and realistic. In order to truly measure the effectiveness of an ISP measurements or metrics must be defined in order to grade or rate the effectives. ISPs that are not applicable,......

Words: 2691 - Pages: 11

Premium Essay

Employing Information Security Awareness to Minimize over-Exposure of Average Internet User on Social Networks

...International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 ISSN 2250-3153 1 Employing Information Security Awareness to Minimize Over-Exposure of Average Internet User on Social Networks WorawitBinden*, MaheedeenJormae**, ZakariaZain***, Jamaludin Ibrahim**** worawit.inter@gmail.com*, maheedeen@gmail.com**, zakariazain13@gmail.com***, jamal55@gmail.com**** Department of Information Systems, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia ABSTRACT-Use of Online Social Networking Sites (OSNs) has become ubiquitous nowadays. In the era of a million user social networking sites throughout the world, it becomes increasingly difficult for people to control what they are exposing to whom. In this paper we analyze the influence of social media interactivity features on the exposure of personal data of average Internet user and present techniques to implement information security awareness to minimize overexposure on OSNs. Index Terms-Online Social Networking, Information Security Awareness, Social Network Interactivity Features I. INTRODUCTION nformation is vital to communication and a critical resource for performing work in organizations. It is also important to individuals, and therefore the need to proper manage it well, is growing rapidly. Protecting data is as important as protecting cash as it is asset – and requires just as much care and planning. Now more than ever, people need...

Words: 4473 - Pages: 18

Premium Essay

Customer Awareness

...of the mandatory cover for Senior Citizens—Underwriting based on health status-Affordability -Recommendations. Chapter 8 - Expanding The Coverage Of Health Insurance Socio-economic scenario in India—Penetration of Health Insurance in India—Health insurance for the elderly—Reaching out to Senior Citizens; Reaching the Elderly through Family clinicsRecommendations. Chapter 9 - Procedural Aspects Chapter 10 - Government Intervention Chapter 11 - Role Of Insurance Regulatory And Development Authority Chapter 12 – Summary of Recommendations Chapter 13 - Terms Of Reference (TOR) And Methodology Adopted By The Committee Acknowledgements and List of Organisations and Individuals whose evidences were taken by the Committee Annexures Annexure A: Proposal For Uniform Treatment Of Pre-Existing Medical Condition Annexure B: Family Doctor Annexure C: The Family Practice Annexure D: Note on Third Party Administration in Health Insurance Annexure E: Health Insurance Data of the National Repository at TAC Annexure F: Is It Healthcare Or Sickness Care? Annexure G: Subsidized Health Insurance Schemes for Senior Citizens Annexure H: Why patient education should be made compulsory? Annexure I: Features Of A Few Health Insurance Products Marketed By Non-Life Insurers Annexure J: Features Of A Few Health Insurance Products Marketed By Life Insurers Annexure K: Health Insurance Pools Annexure L: The Health Sector in India: Key Stakeholders and the Need for Reform Subject Page 1 6 3. 9 4. ...

Words: 62829 - Pages: 252

Free Essay

It Security

...Organizational Overview The Re quest for Proposal is to change the old office phone system to a Voice over Internet Protocol (VoIP) service for a small company with approximately 50 employees with approximately over 700 accounts. The clients currently call in orders using the existing traditional public switched telephone network (PSTN). The Voice over Internet Protocol (VoIP) technology will have an established voice communication and multimedia sessions over Internet Protocol (IP) networks where the orders can be processed at a cost savings. Technology Description The group of technologies: IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, IP communications, and broadband phone service are terms commonly related to VoIP. The technology enables the end users to use voice, fax, SMS, voice messaging through the internet to conduct business. Proposal The Request for Proposal lists the instructions for a quote to be submitted timely by the respective vendors. In addition, the description of the project is included and the defined requirements that must be met for consideration. Lastly, the vendor responsibility is defined before and after completion of the project. Specifications The proposal is to switch to VoIP, a hosted phone system with a full set of enterprise features. The intent is to continue to upgrade the system via web browser to ensure the technology continues to remain competitive. The intent is to transition......

Words: 635 - Pages: 3

Premium Essay

Self-Awareness

...life | An exciting life | A sense of accomplishment | A world at peace | A world of beauty | Equality | Family security | Freedom | Happiness | Inner harmony | Mature love | National security | Pleasure | Salvation | Self-respect | Social recognition | True friendship | Wisdom | Six of these 18 values (listed by important order) that are most important to me are - Family security - True friendship - Happiness - Social Recognition - A sense of accomplishment - Self-respect A list of 6 values those are least important: - Salvation - An exciting life - A world of peace - A world of beauty - Mature love - National security Part II. Interpretation Paper As I mentioned above, in my point of view, six values which are the most important to my characteristic development and decision making are family security, true friendship, happiness, social recognition, a sense of accomplishment and self-respect. Otherwise, selecting six least important values is a complicated task because the list of 18 values is all what everyone desire to reach. Fortunately, the classification becomes much easier according to which factors I need to consider first to come decisions and how I define “success”. Salvation, an exciting life, a world of peace, a world of beauty, mature love and national security are 6 least critical factors when I have to make decisions. I believe that people’s surroundings create the......

Words: 2427 - Pages: 10

Premium Essay

Heart-Health Insurance Information Security Policy Proposal

...Heart-Health Insurance Information Security Policy Proposal A review of the current New Users and Password Requirements policies and the proposed changes to these policies with justifications are listed below. Current Policies: New Users “New Users are assigned access based on the content of an access request. The submitter must sign the request and indicate which systems the new user will need access to and what level of access will be needed. A manager’s approval is required to grant administrator level access.” Current Policies: Password Requirements “Passwords must be at least eight characters long and contain a combination of upper- and lowercase letters. Shared passwords are not permitted on any system that contains patient information. When resetting a password, users cannot reuse any of the previous six passwords that were used. Users entering an incorrect password more than three times will be locked out for at least 15 minutes before the password can be reset.” A: Revised Policies: New Users “New Users are assigned appropriated access based on their role within the organization and their need to access specific data and/or data stores. The user and supervisor must submit a signed request and indicate which systems (Roles) the new user will need access to and what level of access will be required. To grant administrator level access an additional signature from a manager is required. New Users are required training on workforce awareness, password management......

Words: 1042 - Pages: 5

Premium Essay

Network Security Proposal

...Joe Bailey ITS-2120 Network Security Proposal Introduction Fixem Orthopedic Therapy is a physical therapy facility that treats people who are recovering from various musculoskeletal surgeries. The company is based in Southern Maryland and consists of three separate offices: one in Brandywine, one in Indian Head, and an office that was recently built in Waldorf. These offices connect to each other through WAN links, and they are also capable of connecting to local doctors’ offices which allows patient records to be easily sent from a patient’s doctor to the facility that needs them. Fixem Orthopedic must ensure that only authorized individuals, mainly the receptionists and physical therapists, can have access to these sensitive records. These files contain information that malicious people can take advantage of such as Social Security numbers and credit card and billing information. The lack of a proper security policy can result in severe penalties for Fixem Orthopedic under the HIPAA Security Rule (“HIPAA Security Rule”). Measures must also be taken to protect the network from malware, including worms and viruses. These are very serious security threats that can slow or bring down the network as well as pose a threat to data stored on the computers. Finally, the employees can pose a risk to the network’s security if they have not been properly trained to handle social engineering tactics. Improvement The security of this business’s network is vital to its continued......

Words: 1725 - Pages: 7

Premium Essay

Banking Awareness

...Banking Awareness Study Material Shared by Rajesh Kumar and Bhavya Vadudevan www.Gr8AmbitionZ.com your A to Z competitive exam guide Page 1 Banking Awareness Study Material - powered by Gr8AmbitionZ.com Indian Banking Structure a) b) c) d) e) Central Bank (RBI) Specialised Banks Commercial Banks Development Banks Co-operative Banks Specialised Banks: NABARD: National Bank for Agriculture and Rural Development. This bank is meant for financing the agriculture as well as rural sector. It actually promotes research in agriculture and rural development. EXIM Bank: Export Import Bank of India. This bank gives loans to exporters and importers and also provides valuable information about the international market. If you want to set up a business for exporting products abroad or importing products from foreign countries for sale in our country, EXIM bank can provide you the required support and assistance. SIDBI: Small Industries Development Bank of India. This bank provides loans to set up the smallscale business unit / industry. SIDBI also finances, promotes and develops small-scale industries whereas IDBI (Industrial Development Bank of India) gives loans to big industries. Gr Commercial Banks: Normal banks are known as commercial banks, their main function is to accept deposits from the customer and on the basis of that they grant loans. (Loans could be short-term, mediumterm and long-term loans.) Commercial banks are further classified into three......

Words: 15906 - Pages: 64

Premium Essay

Security Awareness Training

...Security Awareness Training Jay Phillips GMGT/431 September 14, 2015 Shivie Bhagan Security Awareness Training With the ever increasing use of technology to be more productive and save on materials costs, more and more companies are converting their data electronically. Some data contains customer’s information while other data may contain confidential information about a company and how it operates. Just because data is sitting on a server somewhere in a locked data center or perhaps a company stores all their data in the cloud, it doesn’t necessarily mean that it is safe where it is at. This is why there is a demand for Security Awareness Training. According to Rouse (n.d.), security awareness training is a formal process for educating employees about computer security. Why would educating employees about computer security be so important? There are many different levels of end users and most do not know the first thing about protecting valuable data. Patton Fuller Hospital is an ideal candidate to implement security training with its employees. PFH has multiple sites, including Doctors who connect from home to review patient data. What kind of training should be implemented? General security training should cover topics such as the company’s policies and procedures, who to contact if an employee believes they have identified a security risk or threat, and rules for how to handle confidential information. General security training also has the potential of......

Words: 527 - Pages: 3

Premium Essay

Security Awareness Training

...Security Awareness Training Security Awareness Training Paper Patton-Fuller Community Hospital (PFCH) maintains strict confidentiality of their information via four different information systems. Accurate, reliable, and prompt information must be provided to those that need to make decisions based on several predetermine conditions. In a hospital environment, like PFCH, information is predominantly passed via computer systems. Management cannot have the luxury of minimizing the importance of systems security at all levels of their staff. The writer intends to provide a security awareness training plan for PFCH in the following paragraphs (Apollo Group Inc., 2013). Which employees should be trained, why, how, and when? All employees must be trained to protect the confidential information kept in the hospital. That means senior management, employees (regular or temporary), contractors, doctors, nurses, and anyone that has or could gain access to confidential information like partners and volunteers. Information like Personal Identifiable Information (PII), patient records, hospital financial information, staff payroll and personal records, to mention a few, must be protected against physical or electronic attacks. Making all personnel aware of potential threats, vulnerabilities, reporting security breaches and the PFCH security policies deters or makes it difficult for possible data hackers to acquire hospital confidential information (Gregory, 2010). The best......

Words: 607 - Pages: 3

Premium Essay

Communication Proposal

...Communications Proposal and Presentation Learning Team C ENG 135 October 12, 2015 Kimberley Holloway Technology is ever growing and Smith Systems must grow with it. There are many new ways to reach clientele and stay in touch with existing personnel. Our proposal will include options for immediate and consistent advertising, face to face meetings, and the ability to reach anyone no matter where they are in the world. To do this we will explain how the use of social media, video and satellite conferencing, and Internet meetings will place Smith Systems at the top of their class in communications. Social media can contribute to success and growth in all areas of Kudler Fine Foods by providing networks and new channels for your brand's voice and content. Social media offers the opportunity to increase your visibility and grow brand awareness. Utilizing social media allows your customers to connect and interact with your business on a more intimate level. Interacting with your customers regularly is a show of accountability and good-faith for other customers. The Kudler Fine Foods brand will be mentioned on social media, i.e. Facebook, Yelp, where people can go to compliment a product or service received by the company. The more talk that is created by the people on social media, the more valuable and authentic your brand will seem to new customers. Almost all social media sites are free to use. This means that your company will be in direct contact......

Words: 1225 - Pages: 5

Premium Essay

Security

...Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Systems Owners Have Security Responsibilities Outside Their Own......

Words: 93588 - Pages: 375

Free Essay

Nsa: Surveillance Awareness Project Proposal

...Surveillance Awareness Project A proposal prepared by Team Underachievers Shea Polansky Gabriela Cde Baca Jacob Nevarez Elliot Nicholas For Dr. Natasha Jones University of New Mexico 2014-10-21 Team Underachievers Memo TO:​​Dr. Natasha Jones FROM:​Team Underachievers DATE:​​2014-10-7 SUBJECT:​Proposal PURPOSE:​To acquaint you with our proposal Dear Dr. Jones, Edward Snowden’s leaks about the National Security Agency’s mass surveillance programs created a global debate about privacy, security, and safety. The NSA has the capability to read email, snoop on private social network conversations, observe phone call records, and track the physical locations of citizens not charged nor suspected of any crime, without so much as a warrant. Worse, the demographic most affected this level of snooping on our digital lives, the 18-24 year-old college crowd, is the least knowledgeable and most politically apathetic about the issue. This is a recipe for disaster, and this proposal seeks funding for an awareness campaign that will address it. This campaign will raise awareness about mass surveillance and the Snowden disclosures. We will use posters and flyers to dry attention to the issue. We will use the University of New Mexico as a testing ground, using before and after surveys to gauge effectiveness. If the campaign proves successful, we will recruit volunteers and raise a second round of funding to bring the campaign to college campuses......

Words: 3481 - Pages: 14

Moto: tuning, styling | Wildling | Kerjasama bisnis