Security Objective Components

Security Objective Components - Running head: SECURITY...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Running head: SECURITY OBJECTIVE COMPONENTS 1 Security Objective Components Tanita D. Wright CJS/250 February 10, 2012 Robert Clark
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
SECURITY OBJECTIVE COMPONENTS 2 Security Objective Components What component of the overall security objective deserves the most attention in the environments mentioned in the article? What components would be less pertinent for these particular environments during a vulnerability assessment? Why? Relative to the primary component you chose above, what are some countermeasures or possible solutions for the shooting, incidences of arson, and bombing? The component that deserves the most attention overall in the environment's from the article would be that of the physical security feature. The components less pertinent for these particular environments during a vulnerability assessment would be personnel security, information security, and interdepartmental dependencies. The reason for removing personnel security from the list is because of the minimal likelihood events like these would occur on a regular basis and pose a risk. Hiring security personnel or a law enforcement officer to monitor or guard a church during service is simply unrealistic and extremely cost-effective. Churches also maintain the majority of their order of operations with the assistance of donations from members of the church and normally these funds help pay for utilities, food, the salaries of priests, pastors and other religious leaders and also church events. Implementing an information security feature into these environments would also prove to be effective and non-cost efficient. Each scenario illustrates the criminals target was not intended for financial gain but was a
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/19/2012 for the course CJS 250 taught by Professor N/a during the Fall '10 term at University of Phoenix.

Page1 / 6

Security Objective Components - Running head: SECURITY...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online