In your opinion, what is the largest security threat posed by global terrorism to U.S. government
facilities (state-side or overseas)?
In my opinion the largest security threat posed by global terrorism to U.S. government facilities stateside
Identify and explain the five security levels within the US DOJ Vulnerability Assessment of Federal
After the Oklahoma City bombing President Bill Clinton ordered the Department of Justice to conduct a
vulnerability assessment of fede
Who: Islamic state group was said to be behind the attacks
What: Killed 32 people from around the world, injured 340 people
When: March 22, 2016
Where: Brussels Airport
Why: The Islamic state group was targeting Brussels because its the home to EU, NATO,
In your opinion, what threat do insiders who betray their positions of trust pose to the United
States, US interests, and US facilities throughout the world?
The threat that I feel insiders who betray their positions of trust pose a lot of harm to U.S. in
The U.S. Department of Justices Vulnerability Assessment of Federal Facilities was the first
government wide standard and the impact of it was tremendous. The reason behind this drastic change
was the bombing of the Oklahoma City federal building. Prior t
The access control that I chose to talk about for government facilities comes from HSPD 12. Just
a little background on HSPD 12 it was officially implemented in 2004, and is known as one of three major
personnel security programs. This directive was made
Explain the intent and purpose behind the creation of the Unified Facilities Criteria/DoD Minimum
Antiterrorism Standards for Buildings.
The purpose behind the creation of the UFC was for the Department of Defense to seek effective ways to
minimize the li
There will always be a need to protect U.S. Government Facilities. Discuss the challenges related to
building or retrofitting a facility for U.S. Government usage domestically or overseas (pick one). Write
your submission as if you are advising another (n
The topic of this weeks Physical Security Principles and Practices Discussion is Security Lighting. Find
and discuss an example of Security Lighting used in the protection any U.S. Government Facility.
Discuss the type of facility in which the lighting is
The security requirements for U.S. Government facilities can vary from agency to agency. Using open
source references and the Universitys online library, select one agency (non-DOD, DOE, or DHS) and
describe its security leadership structure and its secur
The security construction requirements for facilities on military installations and U.S. government
facilities can vary. Discuss from your experience and research, key differences between the two.
Security construction requirements for facilities on milit
Illustrate the concepts of Balanced Protection and Defense in Depth and give a specific example of
Balanced protection seeks the goal of detecting, delaying and responding to an intrusion. Security
systems are not meant to 100% stop intrusions, more
Describe, in detail, the structure (org chart so to speak) and positions of the ideal security department.
Also, write a brief job description for yourself as the Chief Security Officer of this security organization.
A Chief Security Officer is the indivi
Discuss employee discipline in detail. Why do some supervisors fail to discipline. What can management
do to correct this behavior? Describe the concept of progressive discipline and explain why it is, or is not,
effective. Discuss the potential for workp
Discuss why global experience is often a definite plus when considering applicants for a CSO position.
When first researching the requirements for a CSO there is no actual literature that says that global
experience is a requirement, it is more of a desir
DQ# 1.#2a - Compare and contrast the pros and cons of combining the IT and physical security
functions in a medium to large-size firm with complex IT system requirements and a global footprint.
It is easily argued from both sides that there is good and ba
In approximately 500-750 words, name and discuss three salient features of traditional physical
security and IT security respectively (a total of six points - 3 traditional physical security and three IT
When it comes to traditional physical se
assess the impact of the convergence of public and private sector security in the post-9/11 world. How
is it being accomplished?The convergence of the public and private sector of security in the post 9/11
world is being accomplished by both sectors settl
1 - Share with the class a particular incident in the news and discuss the manner of attack, prevention
measures, lessons learned, etc.
The recent VBIED attack that I chose to talk about in the recent news was a failed VBIED attack by ISIS
south of Mosul
In 500-750 words, measure the impact of the growing use of PMCs and PSCs in conflict zones. Select
two points each pro and con respectively for the purposes of your discussion.
When it comes to private military companies and private security companies the
How does the presence of college degree programs in security enhance the field? (CH 5 ,
The professionalization of the security field is mostly due to the academic self-development of
those individuals, organizations, and businesses involved in the fi
Why should a security professional have any interest in the historical development of the discipline?
(CH 1, critical thinking)
To answer this question, its important to analyze the purpose of security. This weeks reading made an
interesting remark statin
Review the attached document (also located inside the Resources tab/Student Resources
Folder/Forum 5): Fifty Terror Plots Foiled Since 9/11: The Homegrown Threat and the Long
War on Terrorism
Once you have reviewed Fifty Terror Plots Foiled Since 9/11, re
Counter Terrorism Dilemmas
Counter Terrorism Dilemmas wouldnt have to exist if it wasnt for a growing threat of
terrorism across the globe. With this being said the need for concentrated methods of counter
intelligence to prevent future terro
The protection of critical infrastructure has evolved for the better protection of goods and services.
Physical assets, functions and systems are called critical infrastructures.[Joh15] Some examples of these
would be, power plants and electric grids. The
The U.S. government policy towards the protection of facilities has evolved drastically since the
Oklahoma City bombing. It is still known as the most devastating act of domestic terrorism committed by
a U.S. citizen. [KUR15] In 1995, Timothy McVeigh park
CPTED- Utilization of design and environment that can reduce the possibility of a facility being targeted
for a crime
Natural Surveillance- The primary purpose is not to keep intruders from entering, but to put intruders
under observation. [WBD15]
1.8 Discuss the advantages and disadvantages of DBMSs.
The advantages of DBMS:
Controlling Data Redundancy -In non-database systems each application program has its own
private files. [Sil16] In this case, the duplicated copies of the same data are create
How does the level of training and regulation for security personnel compare with that of the
When it comes to the level of training and regulation for police officers, sheriffs and detectives
are public sector security employees. Their jobs are t