cjs250_appendix_g - Axia College Material Appendix G...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Axia College Material Appendix G Security Assessment Directions Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat. Setting 1: Hospital THREAT RISK COUNTERMEASURE Probability Criticality Total Example: Information theft 4 7 11 Employee screening, limited computer access, and computer monitoring Information Theft 6 8 14 They could set up a thumb print scanner on each computer. The thumb print scanner would scan the print and if it is one it recognizes then it would allow access. If it
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/11/2010 for the course CRIMINAL J CJS250 taught by Professor King during the Spring '10 term at University of Phoenix.

Page1 / 3

cjs250_appendix_g - Axia College Material Appendix G...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online