Kirstene J. Clark Theory and Practice of Justice, Law and Security
Many security measures must be taken to protect enterprise proprietary information. Threats can be posed to the physical premises as well as to intellectual properties. Internal and external sources can threaten enterprise security. Safeguards are not fail-proof thus effectiveness of processes and techniques must be continually assessed. As businesses grow and develop new products and technologies, security measures must be re-evaluated. Vigilant security officers must be aware of emerging trends used in safeguarding company assets, as well as emerging trends used by those who desire to bring harm to the enterprise.
Security Risk Analysis
There are several risk factors to be considered in order to protect proprietary information as relates to the new solar engine. Risk management is not fail-proof and will require consistent adherence. Lapse or breach will need to be fully addressed and remedied as such occur. The recommendations discussed below endeavor to mitigate potential threats and damages. Risk and security evaluation has been drawn “from the standpoint of a criminal … to detect and remedy any points of vulnerability that could be exploited by the same” (Shon Harris, CISSP Exam Guide, Fourth Edition, p403, 2008). Risks are divided into two categories, physical and cyber/information. Potential threats are divided into four sub-categories. Natural/environmental threats include the potential for events such as floods or tornados. Threats to supply systems such as power outages need to be considered and addressed. Irony aside, plans need to be in place to effectively manage any loss of electricity. Manmade threats are potentially the most destructive and include acts such as unauthorized access, collusion, sabotage and theft. The final threat category is political motivation which includes events such as riots, strikes or terrorist attacks. Each threat sub-category listed has the potential to pose great harm to the people, proprietary information and products of the R. James Corporation.
Physical risks to be addressed include surveying all areas of the premises, the buildings and the land, with additional consideration of properties adjacent to all locations. Installation and maintenance of interior and exterior closed-circuit TV (CCTV) is highly recommended.
Exterior lighting, signage and grounds should be on a regular maintenance schedule. Neatly groomed grounds are more than aesthetically pleasing. Clean, smooth parking and walk ways aid in preventing accidents. Well trimmed foliage safeguards against would-be criminals. Every effort should be made to avoid inadvertently creating hiding places behind shrubbery, walls or signs.
Physical security necessarily includes interior structural safeguards. Locks, doors, walls, ceilings and floors need to be of equal strength and durability. For example, it will do no good to install reinforced doors with subpar hinges and locks. It is imperative to ensure all locks and alarm systems are maintained in proper working order. Needless to say, ineffective locks and/or alarms do nothing to deter crime and alert emergency responses from appropriate authorities.
Drop ceilings should be avoided because it allows access to adjacent areas with little effort. Would-be intruders gain unauthorized access by simply lifting ceiling tiles and climbing over the separating partition. Reconstruction is required to resolve potential security breaches.
Location and construction of windows should also be considered. Installation of polycarbonate windows strengthens structural security. Such windows offer protection from fire, chemicals and breakage.
Establishing three specific zones will increase interior security: public, sensitive and restricted. CCTV will…