Project #88266 - project

The student will design a comprehensive Security Plan for:

  • a local public library. 
    • If the library is contained within another building or structure, then the Security Plan should address the structure in general, and the library in particular as the security target.
  • a full-service grocery store
    • Acceptable: national/regional food store chain (e.g., Giant, Kroger, Win-Dixie, military base commissary, etc.)
    • Not acceptable: local mini-mart (e.g., 7-Eleven, Wa-Wa, Highs, etc.)
  • A full-service department store
    • Acceptable: national/regional department store (e.g., Macys, Sears, Wal-Mart, military base PX,etc.)
  • A full-service hardware store
    • Acceptable: national/regional chain hardware/lumber retailer (e.g., Lowes, Home Depot, 84 Lumber, military base PX, etc.)

 NOTE: If ALL of these proposed sites are impossible, contact your instructor for an alternate project located in the "Instructor Only" area of the classroom .

Write an 1,600 (minimum) to 2.000 (maximum) word report that addresses the issues and problems listed. References must include the text and at least three (3) external (not class instructional material) scholarly sources that support the points made in the report. 

Address the following general topic areas:

· Physical plant intrusion (e.g., burglary)

· Property damage, interior and exterior (e.g., vandalism, theft, etc.)

· Personal security (e.g., assault, personal property loss/damage, etc.)

· Information/records security

· Emergency planning and response

· OSHA standards and violations

· Hiring practices

· Training practices

· Legal issues unique to the site

· Recommended policies and procedures (topics only)

You must also apply the risk management principles learned in class; namely,  identification of assets, identification of risks or threats, assessment of probability of individual threat occurrence and the criticality of those threats.  


Any comprehensive security plan should consider the least expensive strategy that effectively and efficiently addresses the identified need. 

Format Requirements

  • Include an introductory section that explains the purpose of the paper; provides brief summary of the facility being reviewed; and details the crime prevention and security measures currently in place.
  • Include your overview of security issues that will be addressed in your security plan
  • Paper should be a minimum of  1,600 to a maximum of 2,000 words in narrative  text
  • Include (upload) a minimum of 4 photographs or sketches capturing security concerns and references in the Security Plan
  • References must include the text and at least three (3) external scholarly sources (not course instructional material)
    • The best source for "scholarly" references in the UMUC Library ...see RESOURCES on our Classroom page.
  • Double space, 12 pt. font, 1” margins
  • Use American Psychology Association  (APA) content citation format for all sources
  • Include a reference page using APA format guidelines (not included in page count)


Additionally -

· Create a cover page for your assignment (not included in word count)

· Include your name

· Course title and number

· Project title

· Date of submission

 

 

Rubric Name: Project 3 Rubric 10-11-15

 
Criteria

 Content of the paper demonstrates acomprehensiveunderstanding of how the organization operates, its complexities, and identifies all organizational assets at risk to a variety of hazards.

 

Range  9.0 - 10.0

Content of the paper demonstrates a goodunderstanding of how the organization operates, its complexities, and identifies all organizational assets at risk to a variety of hazards. 

Range 8.0 - 8.9

Content of the paper demonstrates asuitableunderstanding of the organization/premises and identifies several organizational assets at risk to a variety of hazards.

Range 7.0 - 7.9

Content of the paper demonstrates no or little understandingof the organization/premises and identifies limited or no organizational assets at risk to a variety of hazards.

Range   D = 6.0 - 6.9   F = 0.0 - 5.9

Content of the paper identifies all the possible loss events and vulnerabilities.

Range  9.0 - 10.0

Content of the paper identifies most of the possible loss events and vulnerabilities

Range 8.0 - 8.9

Content of the paper describes severalpossible loss events and vulnerabilities.

Range 7.0 - 7.9

Content of the paper describes limited or no

possible loss events and vulnerabilities.

Range   D = 6.0 - 6.9   F = 0.0 - 5.9

Content of the paper assesses the probability and the impact of all loss risk events. 

Range  18.0 - 20.0

Content of the paper assesses the probability and the impact of most loss risk events.  

Range 16.0 - 17.9

 Content of the paper assesses the probability and the impact of several loss risk events.

Range 14.0 - 15.9

Content of the paper includes limited or noassessment of the probability and the impact of loss risk events. 

 

  Range   D = 12.0 - 13.9   F = 0.0 - 11.9

 Content of the paper assesses all the options to manage risks, including the potential security controls to be employed and the feasibility of implementing the options.

 

Points available: 18-20

 

Content of the paper assesses mostoptions to manage risks, including the potential security controls to be employed and the feasibility of implementing the options.

Range 16.0 - 17.9

Content of the paper assesses severaloptions to manage risks, including the potential security controls to be employed and the feasibility of implementing the options.

Range 14.0 -15.9

Content of the paper includes limited or noassessment of the options to manage risks, including the potential security controls to be employed and the feasibility of implementing the options.

Range   D = 12 - 13.9  

                F = 0.0 - 11.9

 

Content of the paper presents a comprehensivecost/benefit analysis of the proposed security program.

Range  9.0 - 10.0

 

Content of the paper presents a goodcost/benefit analysis of the proposed security program.

Range  8.0 - 8.9

 

Content of the paper presents a suitablecost/benefit analysis of the proposed security program.

Range   7.0 - 7.9

Content of the paper presents a limited or no cost/benefit analysis of the proposed security program.

Range   D= 6.0 - 6.9

              F= 0.0 - 5.9

Assignment is formatted exactly as required, all required citations and references are present and APA standards are followed in every respect. 

Range  13.5 - 15.0

Assignment is formatted as required with minor/ inconsequential deviations, resource requirements are met, citations and references are present and APA standards are followed. 

Range 12.0 - 13.4

Assignment mostly formatted as required but missing some required elements/ sources or some APA errors are evident.  

Range 10.5 - 11.9

Assignment is missing major elements, lacks required sources or APA is not followed however a different citation method is used correctly. 

Range   D = 9.0 - 10.4 

F = 0.0 - 8.9

No or minor English and grammar usage errors.  

Range  13.5 - 15.0

Only a  few minor/ inconsequential mistakes in English and grammar.  

Range 12.0 - 13.4

While there are some mistakes in English and grammar, they still do not interfere with understanding the student's response or comments

Range 10.5 - 11.9

Many mistakes evident in English/grammar usage.  

Range   D = 9.0 - 10.4   F = 0.0 - 9.9

Overall Score
     

Subject Computer
Due By (Pacific Time) 10/24/2015 12:00 am
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy