Comprehensive Security Plan for the Maryland Public Safety Education and Training Center Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

Security Plan for the Maryland Public Safety Education and Training Center

This paper will focus on a security plan designated for the Maryland Public Safety Education and Training Center. Here emphasis will be given on many things including facility assets that require protection, various threats which are directed towards the assets and the probability of loss. It is important to note that there are many complexes and facilities associated with the main training center and any plan offered should be a standard blueprint that can be applied at any of the facilities and all of them should be able to get interconnected with each other. Therefore, it is the purpose of this paper to focus on that blueprint.

Introduction with brief overview

The Maryland Public Safety Education and Training Center is situated in Sykesville, Maryland. The facility is generally divided in two main centers which totals to about seven hundred acres in area. The main facility is closely situated alongside Drivers Training Facility (DTF) and Firearms Training Facility (FTF). The main facility includes classrooms, driving simulator station and staff offices. The Academic and Administrative Complex (AAC) is associated with the Maryland state hospital and it includes computer labs, food preparation area, classrooms, video broadcasting and graphic arts studio, dining hall and maintenance shops. Two residential dorms are associated with the AAC that include a physical training center. The PT center here includes a standard basketball gym, offices, classrooms, swimming pool and weight training areas. Outside grounds have an obstacle course and a running track.

It is therefore in the best interest of this paper to give out the blueprint of a security plan which includes all the basic details that can be applied to every department mentioned above. This blueprint will hold many details such as budget issues, details about protective systems and access control, external building security, details about perimeter protection and a note on other related controls.

It is important to mention here that any security plan must meet up with the existing security threats that are faced by any organization and much of these threats come up from the existing cyber networks which includes hacking, virus attacks and so on. Therefore any security planner must emphasize greatly on the technological aspect of the security and put up a team of I.T experts to deal with such threats.

2. Organizational Security Plan

2.1 Basic controls

The basic physical controls generally include those items which are less advanced as compared to the other controls but they are still very effective as a unit of security. Regardless of what other sorts of controls would be used, the basic security mechanism will always have its relative importance for the business owners for many risky areas such as offices, equipment, labs, bathrooms or the dining areas. The most common type of controls include the usual keys and lock system, lighting, fencing for the outside and guards to serve on protective duty. In our case scenario, the basic controls are needed to be more efficient across the Drivers Training Facility and Firearms Training Facility areas which are near the Academic Center.

These basic systems are most efficient in dealing with threats such as physical plant intrusion, any sort of property damage either to the exterior or interior of the organization and also towards the personal security of the center itself with includes any sort of property loss, damage to the property, physical assault to any personnel working at the property and so on. Any usage of proper equipment is primarily more likely to keep the premises of the center secure. It is often seen that the traditional keys and locks could actually keep the organization much secure since the usage of locks would make it lengthy for any intruder to gain proper access to the premises of the protected area.

While the organization makes its basic security more difficult to be cracked by the intruders, it tends to make it easier for the firm itself to notice if anything is going wrong since the intruders are always looking for an easy point of access which should make their intrusion unseen by the security system.

The basic controls are known to be less costly as compared to the more complicated online security and other systems and they can be easily applied to any large areas, in our case it can be also applied at the main training center alongside the Academic and Administrative Complex, the residential dorms and other relative areas. The basic security apparatus is known to set up the stage for more advanced exterior and interior security mechanism. Keys and locks could be used internally but they can also be applied on fencing, here it should also be mentioned that lighting is a type of system that can be applied at various locations either interior or exterior and could target areas like dark corners, alley ways and parking lots.

Lighting is known to prevent many petty criminal activities such as break-ins or vandalism. It greatly increases the risk for the intruder to be seen by a security personnel or any other individual. The usage of fencing can make it much more difficult for any intruder to gain access and it is often responsible for lower levels of theft in organizations. Proper fencing includes barbed wire placed on top of the fences as well as electrical fences which can severely shock the intruders. These types of practices tend to scare the intruders in general and even make them forfeit their overall plan of intruding just by inspecting the security apparatus.

Regardless of the technology which is used at the organization, the presence of facility guards is known to be a basic security control mechanism which tends to greatly aid other physical security systems like alarms, sensors and other relative devices since guards on duty are foremost in taking action and taking care of any intrusion first hand. Some security staff can also take the assistance of the law enforcement agencies if their services are required and can neutralize the threat facing the organization in a much more efficient manner.

2.2 Perimeter protection

The center can have many different perimeters which can work together and in effect make the security model better. It can include the protection of personnel working at the center, technology and business information and the visitors to the center. In this sense the usage of computing technology has become more and more popular, here the center's database would contain the information of all the perimeters that are supposed to keep away the intruders like hackers from attaining any information. The basic controls are known to aid in the security efforts provided by the perimeters. Perimeter protection includes mechanisms such as security dogs, badges, smart cards and technical controls.

Perimeter protection are often applied in terms of layers to protect any organization, the usage of several layers assisting each other can make it extremely difficult for any unauthorized personnel to take hold of any information or data related to the organization and keep the working personnel at relative ease regarding the worries of security threats. The outside perimeter might use different sorts of characteristics for badges. On the perimeter gates the on-duty guards might ask for the mentioned identification units before allowing anyone proper access to the premises.

Smart cards tend to have information regarding individuals and also contain a special chip which is used for the identification of every individual. This sort of smart card can easily be placed at the ids and then be scanned at many different areas on the premises. Because of the many different levels regarding security threats the majority amount of smart cards might have only a limited amount of access.

Setting up a perimeter could easily mitigate and detect attacks, here any private database would use perimeters in order to control the overall ability to access the data as well as the database. The perimeter also includes protection mechanisms like anti-virus software or any hardware for computer database which can be used to track and catch threats before their occurrence. It can also be used to send the information to any other network. The perimeter protection could be applied both externally and internally.

It is important here to answer some important questions regarding the perimeter protection, firstly the question arises that should the whole perimeter protection system have one central command unit? The answer to this is yes, since any system is governed by a set of principles directed by a central authority therefore in the case of perimeter protection this authority is the central command unit. It is therefore the responsibility of the organization to put great emphasis on this command unit and make it as infallible as possible from any sorts of external and internal attacks.

Another important question often raised is regarding the smart cards, it consists of dealing with the validity of these cards and if they should be bounded by time or not? The answer to this is that…[continue]

Cite This Term Paper:

"Comprehensive Security Plan For The Maryland Public Safety Education And Training Center" (2013, May 10) Retrieved December 4, 2016, from

"Comprehensive Security Plan For The Maryland Public Safety Education And Training Center" 10 May 2013. Web.4 December. 2016. <>

"Comprehensive Security Plan For The Maryland Public Safety Education And Training Center", 10 May 2013, Accessed.4 December. 2016,

Other Documents Pertaining To This Topic

  • Security Plan for the Maryland Public Safety Education and Training...

    DPSCS Maryland Department of Public Safety and Correctional Services (DPSCS) This report will provide a comprehensive safety and security plan for the Maryland Public Safety Education and Training Center (PSETC). This security plan will be broken into different sections that contain information about different security factors that are security risks for the organization and its physical assets. The organization must use its budget in the most effective manner possible to ensure the

  • Security Plan the Maryland Public

    This is sensitive information that should be securely stored. The records contain confidential information that could be used in identity theft. The records should be securely stored either in soft copy or hard copy. Only authorized personnel should have access to these records. Audit trails should be installed to keep track of the personnel who access the records. The authorized personnel should be analyzed and background checks conducted. Strict

  • Virginia Public Health Care Economics

    One of the issues with this program is that it creates a great amount of legacy costs, in that public employees still get full benefits after they retire, but don't have to pay into it, With the implementation of the new Obama Health Care law the exact impact on Virginia will vary depending upon which course is taken and whether the federal reform proposal tries to cover the expenses or

  • Security Programs Implementation of Information Security Programs

    Security Programs Implementation of Information Security Programs Information Security Programs are significantly growing with the present reforms in the United States agencies, due to the insecurity involved in the handling of data in most corporate infrastructure systems. Cases such as independent hackers accessing company databases and computerized systems, computer service attacks, malicious software such as viruses that attack the operating systems and many other issues are among the many issues experienced

  • Distinction and Need for Governance at All Three Levels Corporate...

    Corporate governance, IT Governance and Information Security Governance IS 8310 Governance, Risk Management and Compliance Governance is the process of empowering leaders to implement rules that are enforceable and amendable. For comprehensive understanding of the term' governance' it is essential to identify the leaders and the set of rules, and various positions that leaders govern. Corporate governance, IT Governance and Information Security Governance embraces a linkage with certain acquiescence system while

  • Academic Profile of Home Schoolers a Case Study

    Academic Profile of Home Schooling - a Case Study Home Schooling vs. Traditional Educational Methods Home Schooling Methodology Focus of the Practicum Culture Area of Inquiry Subject/Topic Areas Home Schooling as an Alternative Curricula and Materials Used for Home Schooling The Success of Home Schooling Evaluation Design Conditions for Change Timeline Chronology Legislative Information: Maryland: A Legal Analysis State Laws and Regulations - Maryland Goulart and Travers vs. Calvert County Home-schooled Kids Find Social Growth" Home Schoolers in the Trenches" Home School Academic Advantage Increases Over Time" Home Schooling." ERIC Digest,

  • Air Traffic Has Continued to Increase and

    air traffic has continued to increase and it now constitutes a considerable proportion of the travelling public. The amount of long-hour flights has increased significantly. Based on the International Civil Aviation authority, air traffic can be anticipated to double amid till 2020. Airline travel, especially over longer distances, makes air travelers vulnerable to numerous facets that will impact their health and well-being. Particularly, the speed with which influenza spreads

Read Full Term Paper
Copyright 2016 . All Rights Reserved