cjs250_appendix_g - Axia College Material Appendix G...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Axia College Material Appendix G Security Assessment Directions Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat. Setting 1: Bank THREAT RISK COUNTERMEASURE Probability Criticality Total Example: Information theft 4 7 11 Employee screening, limited computer access, and computer monitoring Internal theft 7 8 15 Cameras everywhere so that the entire place is visible by a security camera. Robberies 3 3 6 Security guards, and bullet proof locking doors Check Fraud 9 9 18 Id customers to cash checks, track all checks to make sure they are legal tender, this can be
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/08/2011 for the course CJS 210 CJS 210 taught by Professor Garner during the Spring '10 term at University of Phoenix.

Page1 / 3

cjs250_appendix_g - Axia College Material Appendix G...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online