Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from essay:
Maryland Department of Public Safety and Correctional Services (DPSCS)
This report will provide a comprehensive safety and security plan for the Maryland Public Safety Education and Training Center (PSETC). This security plan will be broken into different sections that contain information about different security factors that are security risks for the organization and its physical assets. The organization must use its budget in the most effective manner possible to ensure the safety of the organization and its facilities. It is critical to protect lives of students, faculty members, volunteers, employees and inmates from a potential threats that could emerge during the operations that take place at the facilities.
The Department of Public Safety and Correctional Services (DPSCS) is one of the largest agencies in Maryland state government, whose eleven thousand employees work as a team to protect the public and the offenders and arrestees under their supervision (Department of Public Safety & Correctional Services, N.d.). The Maryland Public Safety Education and Training Center (PSETC) is located in Sykesville, Maryland. The physical space is divided into two locations that are comprised of areas that are roughly 700 acres in size. The firearms Training Facility (FTF) and the Drivers Training Facility (DTF) are both on the same location that is about two miles from the Academic Center. Both of these training areas are open and have roads that connect them to various several residential communities however these communities are over twenty miles from this area.
Figure 1 - Map (DPSCS, N.d.)
The FTF facility has a set of unique challenges due to the use of firearms that serve as the locations primary training objective. This facility has staff offices, classrooms, armory, weapon cleaning area and outdoor firing ranges that are located about a quarter of a mile from that rest of the buildings. The Academic and Administrative Complex (AAC) also shares a location with the Maryland Springfield State (Mental) hospital. This hospital has accommodations for about four hundred mental patients. Within the AAC facility there are numerous offices and classrooms as well as computer labs, food preparation areas, dining halls, and even shops. There are two residential dorms in which guest or students can be housed overnight as well as a full gym that can be used for physical training.
Figure 2 - PSET Facility (DPSCS, N.d.)
PSETC has over a hundred staff members which also includes the DTF and the FTF. There is currently minimal security at best at the PSETC which is subject to concerns and the source of significant risk.
Physical Plant Intrusion
One of the security defenses that serves as a front line deterrent is the infrastructure that can prevent intrusion by unwanted individuals such as burglars or vandals. A physical plan is the first necessary for the PSETC as it can create environmental safeguards for controlling physical access to the grounds. Therefore the first line of defense is control unauthorized entry. The first step to this is to be able to know if someone has entered the building that does not have access. One simple step to this objective is to give authorized personnel a name tag badge that they wear on their clothing or around their neck. This provides the security team as well as the authorized visitors a quick visual clue as to who might not be authorized to be in the facilities.
In the event of an unauthorized entry, the person that discovers a possible breech in security should know exactly how to report the suspicious person. This will require that all employees, guests, and volunteers be trained in a reporting protocol. This will then allow the notification of a potential subject the security office who can start an investigation. The identification cards can also serve a dual purpose and be integrated with a security system. The cards can be used at doors of the building that allow authorized students and other personnel to access their respective areas. This would act as a significant deterrent to unauthorized visitors since it would be more difficult for them to enter the buildings.
To determine how much should be invested in a security system the benefits of the system as well as the cost should be balanced. An organization should implement only security countermeasures that affect its bottom line positively. It shouldn't spend more on a security problem than the problem is worth. Conversely, it shouldn't ignore problems that are costing it money when there are cheaper mitigation alternatives; a smart company needs to approach security as it would any other business decision: costs vs. benefits (Schneier, 2008).
The classic methodology is called annualized loss expectancy (ALE), and it's fairly straightforward and includes the calculation the cost of a security incident in both tangibles like time and money, and intangibles like reputation and competitive advantage (Schneier, 2008). However, some of the intangibles in this case also include the potential loss of human life so this provides a more complex than ordinary security system examples from the private sector. However, you can estimate some of the risks that the facility has which will provide insights as to how much should be spend to mitigate the risk. So, for example, if your store has a 10% chance of getting robbed and the cost of being robbed is $10,000, then you should spend $1,000 a year on security. Spend more than that, and you're wasting money. Spend less than that, and you're also wasting money (Schneier, 2008).
Property Damage, Interior and Exterior
The PSETC facility offices are vulnerable to theft and vandalism if the premises are left without effective security measures. To protect PSETC from malicious damage to training grounds or any of the buildings in the FTF and DTF facilities increasing the frequency of security patrols on the grounds and in buildings will increase the likelihood that a potential vandal will be seen. Vandalism is generally conducted by younger individuals who have too much unsupervised free time and get a kick out of damaging property. Although the proximity to the buildings from the residential communities is relatively large and provides somewhat of a barrier, security patrols and cameras to watch over the grounds and the buildings can be an effective tool to ensure that the grounds are protected.
The PSETC must provide measures that ensure the personal security for all the employees, volunteers, guests, and anyone else of the grounds. All persons on the premises should be free of any form of assault and they should feel safe at all times. To further the development of a personal security policy, the PSETC should position surveillance cameras, about the grounds and in key locations in the building. Having a surveillance system not only can monitor individuals on the grounds but it also provides a useful deterrent because people will be less likely to violate someone's personal security if they believe that they are being monitored. Surveillance equipment is scalable and there is a range of different expenses that can be associated with different systems based on the complexity. PSETC should implement the most comprehensive system that the budget allows as surveillance systems serve as a cornerstone of an effective
There should also be procedures in place to deal with any instances of assault; including sexual assault. There are different options for an incidence reporting procedure. Some facilities will have phones positioned at key locations that can connect them to the security office in the event of an emergency. Some more advanced systems also have text messaging and email alerts in case of an event that can spread a message to the entire organization as events unfold. Any and all incidences at PSETC will be investigated by security professionals and any violators will be punished to ensure the protection of employees, customers, and guests. Furthermore, the organization will not be responsible for personal property loss or damage; however the organization can provide lockers and other storage areas that are under surveillance to deter theft or personal property damage.
Information and information technology will be one of the key challenges of the security plan. It is vital that the organization take steps to control the security of both digital and paper records. Most of the records have been moving to digital forms over the course of the last several years. Each user of the network will have a unique login identity and password so that their activity on the network can be safeguarded and tracked if necessary. All computers in the facility will also be protected by firewalls and antivirus software at a minimum and should also be guarded by intrusion identification and protection software to monitor the network. The sensitive information stored on the organizations servers should also be backed up periodically to protect against data loss. The paper records should be protected by lock and key and only the relevant personnel be given access to these storage areas.
Emergency Planning and Response
Emergencies can occur without warning and at unpredictable times. There have been…[continue]
"Security Plan For The Maryland Public Safety Education And Training Center" (2013, November 04) Retrieved December 10, 2016, from http://www.paperdue.com/essay/security-plan-for-the-maryland-public-safety-126333
"Security Plan For The Maryland Public Safety Education And Training Center" 04 November 2013. Web.10 December. 2016. <http://www.paperdue.com/essay/security-plan-for-the-maryland-public-safety-126333>
"Security Plan For The Maryland Public Safety Education And Training Center", 04 November 2013, Accessed.10 December. 2016, http://www.paperdue.com/essay/security-plan-for-the-maryland-public-safety-126333
Security Plan for the Maryland Public Safety Education and Training Center This paper will focus on a security plan designated for the Maryland Public Safety Education and Training Center. Here emphasis will be given on many things including facility assets that require protection, various threats which are directed towards the assets and the probability of loss. It is important to note that there are many complexes and facilities associated with the
This is sensitive information that should be securely stored. The records contain confidential information that could be used in identity theft. The records should be securely stored either in soft copy or hard copy. Only authorized personnel should have access to these records. Audit trails should be installed to keep track of the personnel who access the records. The authorized personnel should be analyzed and background checks conducted. Strict
Based on the foregoing considerations, it is suggested that the DCMP restructure their existing training programs and administration so that a more unified and centralized plan is in place, as well as providing for better instructor qualifications, evaluation, learning retention and more efficient and effective use of resources which are by definition scarce. These broad general issues were refined for the purposes of this study into the research questions stated
One of the issues with this program is that it creates a great amount of legacy costs, in that public employees still get full benefits after they retire, but don't have to pay into it, With the implementation of the new Obama Health Care law the exact impact on Virginia will vary depending upon which course is taken and whether the federal reform proposal tries to cover the expenses or
Security Programs Implementation of Information Security Programs Information Security Programs are significantly growing with the present reforms in the United States agencies, due to the insecurity involved in the handling of data in most corporate infrastructure systems. Cases such as independent hackers accessing company databases and computerized systems, computer service attacks, malicious software such as viruses that attack the operating systems and many other issues are among the many issues experienced
Corporate governance, IT Governance and Information Security Governance IS 8310 Governance, Risk Management and Compliance Governance is the process of empowering leaders to implement rules that are enforceable and amendable. For comprehensive understanding of the term' governance' it is essential to identify the leaders and the set of rules, and various positions that leaders govern. Corporate governance, IT Governance and Information Security Governance embraces a linkage with certain acquiescence system while
Academic Profile of Home Schooling - a Case Study Home Schooling vs. Traditional Educational Methods Home Schooling Methodology Focus of the Practicum Culture Area of Inquiry Subject/Topic Areas Home Schooling as an Alternative Curricula and Materials Used for Home Schooling The Success of Home Schooling Evaluation Design Conditions for Change Timeline Chronology Legislative Information: Maryland: A Legal Analysis State Laws and Regulations - Maryland Goulart and Travers vs. Calvert County Home-schooled Kids Find Social Growth" Home Schoolers in the Trenches" Home School Academic Advantage Increases Over Time" Home Schooling." ERIC Digest,