Implementing Countermeasures

Implementing Countermeasures - Implementing Countermeasures...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Implementing Countermeasures La’Karia Sam 10-29-09 Unit 6
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The first step in improving the security of your facility is to implement an effective risk assessment program; doing so will ensure that your security dollars are expended in the most cost effective manner. Understanding that security budgets are limited, Counter Measures lists only those improvements that are suited to the business and security objectives you identify - and ranks recommendations accordingly. To help you prioritize your spending, Counter Measures facilitates a cost-benefit analysis of each recommendation and identifies which are most beneficial per dollar spent to implement. The Department shall use technical surveillance countermeasures in conjunction with physical security, personnel security, communications security, and computer hardware, software and firmware security measures to protect classified information and other security interests in Department of Energy facilities or the facilities of its contractors.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/02/2011 for the course POLICING T 333 taught by Professor Crystaldickersonbynum during the Spring '11 term at University of Phoenix.

Page1 / 5

Implementing Countermeasures - Implementing Countermeasures...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online