Organizational Security Plan Term Paper

Pages: 3 (1490 words)  ·  Bibliography Sources: ≈ 8  ·  File: .docx  ·  Level: College Junior  ·  Topic: Business

Organizational Security Plan

In the modern era, it is important that government from the federal to the local level have risk management plans in place for natural disasters, man-made issues and of course, terrorism or crime. Generally speaking, risk management helps identify, prioritize and put plans in place regarding areas of risk that can impact the community. The overall purpose of risk management is so that agencies can be proactive in their identification and implementing plans for disasters and risks since in the modern world these plans involve numerous agencies and complex coordination. Thankfully, standards have been developed that organize risk management by looking at six general paradigms: 1) Identifying risks in the context of the area (e.g. flood planning is less important in Arizona than in Louisiana); 2) Planning a process to mitigate the situation (who is in charge); 3) Mapping the objectives of stakeholders (who will be involved); 4) Developing a framework/map for different risks; 5) Assessing and putting into place analysis tools and communications protocols; and finally, 6) Putting a plan into place that uses the tools and personnel identified for specific types of disasters (Wan, 2009; Frenkel, et al., 2005).

Thus, every organization needs to identify threats and risks, analyze and prioritize those risks, and devise some sort of plan of action that will reduce the likelihood of those threats occurring that can be prevented (crime, etc.) and a mitigating plan for those that are out of control of the organization (weather, etc.).

Basic Physical ControlsBuy full Download Microsoft Word File paper
for $19.77

Most experts, in fact, suggest that one look at risk as a simple formula:

Risk Index = Impact of Risk Event(s) X Probability of Occurance

Term Paper on Organizational Security Plan in the Assignment

Of course, some of this is subjective in nature; management must decide how risky a credit decision is; weather can be variable (e.g. A 2-hour power outage vs. A week of inclimate weather). However, the point os assessing the severity of the risk is central to being able to find appropriate solutions to chart within a particular situation, and may, in fact, have a postive impact on any insurance claim made. Thus, creating a matrix under risk management allows modification and mitigation to occur easier -- even for smaller organizations (Crockford, 1986, p. 18). This type of form can be modified to fit almost any organization, and asks management to consider the probability of something happening vs. The actual impact this might have on the particular organization -- and perhaps move as many risks into more positive categories.

Perimeter Protection

Perimeter protection is necessary for a number of different organizations. It is vital for a construction site that must have access control, but allow millions of dollars of inventory, supplies and equipment to be stored within the location. Outdoor security must thus include windows, fencing, doors, and glass, particularly within the most vulnerable areas of the project. Access control to the building areas is the most common, and least expensive, but still powerful, way to secure a site. If individuals are controlled coming in and out of the site, the chances of theft are minimized during work hours, and if access points are well secured and patrolled, then during off hours they remain safer. Modern security experts suggest that the best practices in access control includes a combination of fencing, perimeter security, alarms, surveillance cameras, loud speakers, and different types of sensors. Temporary fencing must be robustly used, particularly if the project or site can afford small voltage electrical fencing to protect a needed perimeter. The key to perimeter protection is the logical use of appropriate levels of security tools that correspond to the potential threats, identified in the security plan. For instance, a small project with very few materials needs a different perimeter plan than a large, urban development project (Arta, 2006).

External Building Security

External building security is more than simply protection against attacks. For the external environment, outside of off hours, the nature of an access point or monitored access points are critical. This authenticates and authorizes those who belong in the building and those who do not. The Key principles change from one business type to the next, but require consistency, reliability and regularity. However, that being said, there should be back up systems so that if Guard A, for instance, is doing a 10pm sweep of the external building, Guard B. will be at the main control -- preventing any unnecessary diversions or lack of overlap. Confidentiality is another principle due to the number of… [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

Which Option Should I Choose?
1.  Buy full paper (3 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Security Plan Case Study

Enterprise Technical Infrastructure Security Plan Research Paper

Enterprise Security Plan Proposal Research Proposal

Security Policy Term Paper

Organizational Technology Plan for Dell Term Paper

View 200+ other related papers  >>

How to Cite "Organizational Security Plan" Term Paper in a Bibliography:

APA Style

Organizational Security Plan.  (2014, January 6).  Retrieved September 25, 2020, from

MLA Format

"Organizational Security Plan."  6 January 2014.  Web.  25 September 2020. <>.

Chicago Style

"Organizational Security Plan."  January 6, 2014.  Accessed September 25, 2020.