Raytheon Company: Survey And Analysis Of Physical Security

PAGES
10
WORDS
3102
Cite

Physical Security Survey The following will be an overview of the Raytheon Company. Business information will be included as well as security issues the company might have. A physical security survey will be presented as well as an analysis of the results. Certain changes that are needed will be proposed.

Background on Raytheon

Raytheon Company is an innovation and technology pioneer with expertise in security defense, and civilian markets across the globe. With a background marked by development measuring 92 years, Raytheon produces advanced electronics, integrated mission frameworks and different abilities in the ranges of sensing; impacts; and charge, control, intelligence and communication frameworks; and services in mission support (Raytheon History).

Amongst the first technology companies, Raytheon was formed in Cambridge, Massachusetts., home of the Massachusetts Institute of Technology, on 7th July, 1922 as the American Appliance Company (Raytheon History). The founders were Vannevar Bush, who eventually became the dean at MIT's School of Engineering; engineer Laurence Marshall; and researcher Charles G. Smith, who worked in the field of electrical properties of gasses. Their innovative development was the S. gas rectifier tube, a gadget that replaced unwieldy batteries used to power the home radio still then (Raytheon History). The tube changed the radio into an economically viable sought after device that could be run by power through a wall socket and made the entire world accessible to Americans in the comfiture of their homes.

Raytheon soon took up leadership role in the electronics technology industry. World War II saw contributions from Raytheon workers. They supplied nearly eighty percent of the magnetron tubes utilized as a part of U.S. As well as radars made by the UK and created several parts for the all important fuse in shells aimed at antiaircraft weapons, amid other supplies (Raytheon History). Once the war was over, Raytheon started to offer regular citizen items, the microwave being among the most well-known. Raytheon engineer Percy Spencer found microwave cooking when, as he remained before a dynamic magnetron, a piece of candy in his pocket started to liquefy. Captivated, he conveyed for popcorns -- and they started to pop. With that, another machine soon took shape. In the following decades, Raytheon representatives would expand on the organization's zest for innovation and technological edge (Raytheon History). Today it maintains its position as a worldwide engineering pioneer particularly in HLS, defense and certain critical governmental markets.

RPS brings acts closely with customers taking up the role of a consultant over an extensive variety of businesses and worldwide markets. As one of the world's biggest and most appreciated development and training services provider, we offer services in more than 100 nations and 28 dialects. Our worldwide presence, strategic vitality, scale, and speed are the best in the business (Raytheon History).

Raytheon Company, that had an accrual of Twenty Four Billion dollars and a workforce exceeding Sixty three thousand spread worldwide, is an engineering and innovation pioneer having expertise in security, defense and common markets across the world (Raytheon History). With a background of development spread over 92 years, Raytheon provides for the best in integrated mission frameworks, electronics, and different capacities in the fields of sensing; impacts; and command and control, intelligence and communication frameworks, and also digital security world and an expansive range of services in mission support (Raytheon History). Riding on the diligent work and devotion of countless workers across the globe, Raytheon is decently prepared to address the needs of its clients in more than 80 nations -- presently and well into the 21st century.

Vulnerabilities

The on-site inspection threw up the following concerns (Vulnerabilities Document):

Boundary fencing not up to required standards

Perimeter fence is done by a wired roped which can't stop transgressors

Unable to install cameras, install sensors nor electrify or even commission lightings fixtures

Stairs:

Cameras are not present on each flight.

Compounds within the company premises do not have cameras

Inconsistent technology across entire campus

In the lobbies of certain buildings cameras are not installed

Cameras are placed only at the main gate, not at exits

Some entrance buildings have windows on the facing walls making it easy for break-ins. The two main cafeterias do not have security or any feature of security

Security background checks are too elaborate and tedious. This causes delays in hiring such personnel and raises operating costs. The actual practice here is that the guards have to pass through two security checks.

Access Control:

Some office areas do not adhere government regulations:

Legacy doors: not correct standard for doors

Absence of badge reader

Walls too thin which can allow overhear

. Required...

...

Secure state assesses all the physical security controls set up at areas that are in extension (Physical Security Assessment). For instance, our staff assesses access control frameworks, security monitors, CCTV cams, locks, access badges, fences, security lighting, and other significant features. The Physical Security Assessment is a non-obtrusive walkthrough evaluation that is guided by the customer's security staff on location. A Physical Attack & Penetration is an obtrusive appraisal in which secure state advisors endeavor to "break-in" to the site or office that is in extension (Physical Security Assessment). The Physical Security Assessment is matched superbly when in conjunction with a Physical Attack & Penetration Test.
Physical Security Assessments survey all the physical security controls of a building, or premises

Profiling Team parts have many years of experience in analyzing Physical Security Assessments for small and large organizations

Profiling Team parts are aware of most recent innovation, Physical Security controls and best practices in the Physical Security sector

A very many associations never assess the physical security controls that are set up at a building or area (Physical Security Assessment). Companies spend heavily on security arrangements but at times, the implementation may leave a lot to be desired. Secure state can demonstrate that improper physical controls are very easy to breach. Cams and alerts may not be in the right areas and can be effortlessly dodged, for example. Secure state utilizes an itemized customer guided methodology to assess the accessible controls and innovations to an organization set up for physical security (Physical Security Assessment).

The Security Assessment Process

Thus, what do you expect when we carry out Security Assessment at your office?

The accompanying is a short blueprint of the appraisal methodology:

Even before visiting your site, we will ask for various reports for our perusal needed for the assessment. These normally incorporate arrangements of the site and structures, documents of any current security approaches and methodology, various forms that you might be using for procedures, organization phone index, worker handbook, and other comparative things (Security Assessments). We just need what you have as of now; if there is something that is not accessible, it is not an issue.

We will work with you to pick out the staff members of your association that we might want to seek some information from; the objective thereto is to get a decent cross-representation of the majority of the real support and operating divisions in your enterprise (Security Assessments). Normally, this would incorporate those higher up in administration capacity (CEO, CFO, CIO, and so forth.), division and section heads, and personnel directly involved in and responsible for the security arrangements and implementation, like building receptionist's, security officers, and delivery/receipt staff. The average meeting session should take somewhere around 30 and 45 minutes (Security Assessments).

Our interview will begin by acquiring detailed information from the "security administrator" for the office. This may be an officially appointed security chief, or facility manager or other individual who deals in the capacity of security in-charge for the company (Security Assessments). This meeting session covers lots of points of relevance to security arrangements and implementation, and usually takes 2 to 3 hours. After this meeting, we ask this individual to provide for us a short guided walk through the premises.

We then start engaging in individual meeting sessions with each of the workers recognized above. Contingent upon the company size, this methodology could take one, two, or more days. Once we are done with the meetings and interviews, we will conduct thorough assessments of specific zones of the office and premises (Security Assessments). In a similar fashion the lobby, the loading/unloading and shipping areas will also be examined in detail, which might be needed to b watched closely and hence require more time. We would need to assess the light intensity and coverage during the evenings specifically in the parking area, the boundaries and open spaces, as also in some specific areas that need closer attention. (Security Assessments). We would also like to utilize this time to ascertain the general movement and activity in the afterhours and the security features at nightfall.

After the visit to your site, we will meet with you to provide for you the assessment according to the data collected during our visits and interviews to explain the future course to be implemented. At this stage, only…

Sources Used in Documents:

References"

1)

Raytheon: History. (n.d.). Retrieved January24, 2015 from http://www.raytheon.com/ourcompany/history/index.html

2)

Vulnerabilities Document
Physical Security Assessment. (2014, August 13). Retrieved January 25, 2015, from http://securitypln9.blogspot.com/2014/08/physical-security-assessment.html
Security Assessments. (n.d.). Retrieved January 25, 2015, from http://silvaconsultants.com/joomla1/index.php/security-assessments.htm
Robertson, S. (n.d.). Physical Security Assessment Checklist. Retrieved January 25, 2015, from http://www.ehow.com/info_8105489_physical-security-assessment-checklist.html
Donahue, A. (n.d.). About Wireless Security Cameras. Retrieved January 25, 2015, from http://www.ehow.com/about_4672784_wireless-security-cameras.html
Westlake, D. (n.d.). Types of Perimeter Fencing. Retrieved January 25, 2015, from http://www.ehow.com/list_6726801_types-perimeter-fencing.html
Dozier, L. (n.d.). What Are the Benefits of Contract Security Guards? Retrieved January 25, 2015, from http://www.ehow.com/list_6810932_benefits-contract-security-guards_.html
Martin, K. (n.d.). How to Hire a Security Guard. Retrieved January 25, 2015, from http://www.ehow.com/how_5903669_hire-security-guard.html


Cite this Document:

"Raytheon Company Survey And Analysis Of Physical Security" (2015, January 31) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/raytheon-company-survey-and-analysis-of-2147989

"Raytheon Company Survey And Analysis Of Physical Security" 31 January 2015. Web.25 April. 2024. <
https://www.paperdue.com/essay/raytheon-company-survey-and-analysis-of-2147989>

"Raytheon Company Survey And Analysis Of Physical Security", 31 January 2015, Accessed.25 April. 2024,
https://www.paperdue.com/essay/raytheon-company-survey-and-analysis-of-2147989

Related Documents

In the scenario of a college football game, the private security officers will provide several services to the college which is the premises to which they are assigned. The primary role of the private security officers is to detect, deter, observe and report any incidences at the stadium. First, they will be in charge of checking the bags belonging to all persons willing to enter the football field to

The Task Force Report suggested that both of these crime deterring institution work together rather than against one another (Craighead, 2003). The primary difference between public and private security are the roles of the policing personnel. For public security the purpose is to protect the public, be it property, people, or crimes against property or people. Private security personnel's role is slightly different in that they protect the organization or

Even perimeter security is in question. The GAO surmised that perimeter security at airports may be insufficient to provide effective security. The TSA has begun efforts to evaluate the effectiveness of security related technologies. These include items such as biometric identification systems, but the TSA still has failed to develop a plan that will guide airports when technology enhancements are developed. The TSA has pursued the procurement of checkpoint technologies

One big cause for the demand on modern hyper security is that a lot of cool stuffs are becoming easily available. Developments in computers have made programming robots easy for non-experts. Security systems can be toggled to holiday mode with a touch of a button to mechanically show the previous two weeks' lighting and curtain movements, showing the existence of owners. Paul Rose, director of U.K. based security firm

During times where they are not needed, this would be a waste of resources. Instead, a PMC is there when the military needs it, and when the mission is over, the military no longer has to spend resources to maintain their personnel. Another benefit, although this is also the source of many ethical challenges as will be discussed later, is a PMC's ability to operate more freely than a state's

And the applicant must successfully pass a pre-employment drug screen (Collins, Ricks and Van Meter, 2000). All private security officers must meet the applicable statutory requirements and any criteria that have been established by the employer. In looking at the requirements that have been set forth by the state of Louisiana, the following minimum requirements must be met in order for a person to become a private security officer: 1. The