Free Essay

Site Security Survey

In: Other Topics

Submitted By ajames10560
Words 3373
Pages 14
SITE SECURITY SURVEY

TABLE OF CONTENTS

SECURITY RECOMMENDATIONS: Page

1. Entry Barriers 3 2 Signs 5 3. Lighting 6 4. Windows 7 5. Equipment Near Street Level Windows 8 6. Interior Patrol Visibility 9 7. Burglary Resistant Glazing Materials 9 8. Shrubbery 10 9. Skylights 10 10. Vents 10 11. Air Conditioners 11 12. Grills and Gratings 11 13. Doors and Door Frames 12 14. Strikes 14 15. Key Control 15 16. Equipment Locks 15 17. Hinge Protection 16 18. Roof Accessibility 17 19. Fences 18 20. Vehicle Security 19 21. Padlocks 19 22. Hasps 20 23. Chains 20 24. Safes 21 25. Inventories and Engraving 21 26. Reporting Crimes 22 27. Employee Participation 22

|SECURITY RECOMMENDATION 1 |
|ENTRY BARRIERS |

|A. Normal business hours |
| | |
|1. |Place signs limiting access to "EMPLOYEES ONLY" to discourage people from entering an area. |
| | |
|2. |Have all visitors pass through a reception area. |
| | |
|3. |Always have at least one person in the reception area. If there is no one available to watch over the area, lock all entries to |
| |prevent unauthorized entry. |
| | |
|4. |Never leave one employee isolated in an unsecured area. |
| | |
|5. |Escort visitors in areas containing equipment and/or records not under constant surveillance. |
| | |
|6. |Employees should offer to escort visitors entering the facility. |
| | |
|7. |Have one employee and an alternate responsible for locking all doors, windows, gates, vehicles, and setting alarms in each work |
| |area. |
| | |
|8. |Post nonpublic areas and encourage employees to inquire about strangers in these areas. |
| | |
|9. |Encourage employees to keep doors closed, keep valuables out of sight, and to lock desks, files, and other storage compartments |
| |before leaving. |
| | |
| 10. |Lock inner office areas from the exterior side. |
| | |
|11. |Install an electrical access control system on the reception area door. |
| | |
|12. |Install a lockable entry gate at the reception area counter. |
| | |

|B. After-hours, weekends, holidays |
| | |
|1. |Employees should sign in and out after-hours. |
| | |
|2. |Keep doors locked and control entry to areas with 24-hour operation. |
| | |
|3. |Encourage employees to park in well lit areas close to their work stations. |
| | |
|C. Deliveries and pick ups |
| | |
|1. |Do not leave goods unattended on loading docks or by doors. |
| |Plan to have incoming goods stored immediately. |
| |Require identification from anyone removing goods from the premises. |
| | |
|2. |Keep delivery doors closed when NOT in use. |
| | |
|3. |Do not leave notes on delivery doors, allow locks to be taped open, or wedge doors ajar. |
| | |
|4. |Use physical barriers to separate shipping areas from receiving areas. |

|SECURITY RECOMMENDATION 2 |
|SIGNS |

|A. Office interior |
| | |
|1. |Use signs to restrict certain areas of the office to “AUTHORIZED PERSONNEL.” |
| | |
|2. |Use signs to direct the public to locations for service. In addition to improving security, this strategy will reduce foot traffic |
| |in nonpublic areas. |
| | |
|3. |Use color-coded floor stripping in conjunction with signs to channel and control public traffic. |
| | |
|4. |Label emergency exit doors with the words : |EMERGENCY EXIT ONLY |
| | |USE MAIN ENTRANCE DOOR TO EXIT |

|B. Parking lots and office exterior |

|1. |All doors providing public access to the office should have a |PUBLIC ENTRANCE |
| |conspicuous sign posted on the exterior side stating: | |
|2. |All doors not providing public access should be labeled: |NOT FOR PUBLIC ACCESS |

(Note: Keep nonpublic doors locked to prevent their use by unauthorized persons.)

|SECURITY RECOMMENDATION 3 |
|LIGHTING |

|A. Interior lighting |
| | |
|1. |Unless valuable equipment is visible from the outside, leave interior lighting on during the hours of darkness. |
| | |
|2. |To save energy use a timer or a light sensing device to control these lights. |
|3. |Unless valuable equipment is visible from the outside, lighting should be sufficient to allow passing police patrols to observe a |
| |person inside. |

|B. Exterior lighting |
| | |
|1. |Leave exterior lights on during the hours of darkness. |
|2. |To save energy use a timer or a light sensing device to control these lights. |
|3. |Lighting near access doors, around parking lots, and in |Sufficient to illuminate these areas to a constant level of 1 to 1.5 |
| |storage areas should be: |foot-candles at ground level. |
| | |High pressure sodium lighting, which is generally accepted as most |
| | |efficient for exterior security lighting. |

|SECURITY RECOMMENDATION 4 |
|WINDOWS |

|A. Sliding wood or metal frame windows |
| | |
|1. |Secure sliding wood or metal frame windows by pinning |a. Drill small holes at a downward angle, through the top and bottom of the |
| |from the building interior: |interior channel flange, and halfway through the window frame. |
| | |b. Insert a small hard metal pin in each hole. |
| | |c. Eliminate unnecessary play (movement up and down) by opening the window |
| | |and installing a thin plywood strip along the upper sliding channel so that |
| | |when you close the window it will just clear. |
| | |
|B. Louvered windows |
| | |
|1. |Although adequate locking devices are not available for|Remove and replace with another type window. |
| |louvered windows, there are three methods for securing |Install grills or gratings over them, preferably on the interior side. |
| |such windows: |Epoxy each louvered window to the frame. |
| |
|C. Double hung windows |
| | |
|1. |Secure double hung windows by pinning from the building |Drill holes at a downward angle through the inside window frame where top |
| |interior: |and bottom overlap. |
| | |Continue drilling halfway through the outside frame. |
| | |Insert hard metal pins. |

|D. Casement windows |
| | |
|1. |Secure casement windows with smooth-headed carriage |a. Drill holes, top and bottom, through the frame and window frame. |
| |bolts: |b. Insert carriage bolt, head outside, and secure with wing nut. |
| | |c. Strip the bolt threads or spot weld. |

|E. Transom windows |
| | | |
|1. |These windows should be permanently secured. If you need them for ventilation, use grills or gratings. |

|SECURITY RECOMMENDATION 5 |
|EQUIPMENT NEAR STREET LEVEL WINDOWS |

|Equipment located within reach of street level windows creates an attractive target for the window-smash burglar. One or more of the following|
|steps can discourage this type of crime. |
| | | |
|Move all equipment away from the window so it cannot be reached if window is broken. |
|Install a secondary barrier between the window and the equipment, such as grills and/or gratings. |
|Replace the present windows with burglary resistant glazing material. |
|Lock or bolt all portable equipment to desk or table surfaces. |
|Install security film on windows. |

|SECURITY RECOMMENDATION 6 |
|INTERIOR PATROL VISIBILITY |

|A clear view from the outside, when tempting equipment is not visible, can help police spot suspicious conditions or activities. |
| | | |
|1. |Unless valuable equipment is visible through your windows, keep drapes and blinds open at night to allow passing police patrols an |
| |unobstructed view of the interior of the facility. |
|2. |Keep windows clear of obstructions. |
|3. |Contact your local law enforcement agency, advising them of your regular procedure. |

|SECURITY RECOMMENDATION 7 |
|BURGLARY RESISTANT GLAZING MATERIALS |

|Two types of glazing deters the window-smash burglar: |
| | |
|LAMINATED GLASS comes in several thicknesses. The thicker the lamination, the better the resistance. Although this type of material will |
|break with sufficient force, it will take a burglar much longer to create a hole large enough to get through. |
|POLYCARBONATES are the best glazing materials currently available. While this material is expensive, it will not freeze, burn, or break. |

|SECURITY RECOMMENDATION 8 |
|SHRUBBERY |

|Untrimmed shrubbery offers the burglar an excellent hiding place, especially if it is near windows, doors, thin walls, or fences. Given |
|adequate time and concealment, burglars have been known to penetrate solid walls, including those made of heavy brick. |
| | |
|1. |Trim and thin shrubbery below the window line and away from doors and fences. |
|2. |Do NOT leave space between bushes or hedges and the walls of the building. |

|SECURITY RECOMMENDATION 9 |
|SKYLIGHTS |

|Skylights are prime targets for roof burglars. |
| | |
|1. |Secure skylights with grills or gratings fastened on the interior side. |
|2. |Include skylights in your alarm systems. |
| | |
|SECURITY RECOMMENDATION 10 |
|VENTS |

|Vents are a primary entry point for burglars |
| | |
|1. |Cover your vents with a grill or grate to prevent their use as an entry point. |

|SECURITY RECOMMENDATION 11 |
|AIR CONDITIONERS |
| |
|Small air conditioning units which have been installed either in the wall or a window should be permanently secured to prevent easy removal. |
| |
|A. Wall type |
| | |
|1. |The unit should be permanently secured to the wall, preferably with carriage bolts through the wall. |
|2. |Once the bolts are installed and the nuts tightened, strip the threads to prevent easy removal. |

|B. Window type |
| | |
|1. |Fill the space between the unit and the window frame with 2 inch thick wood secured to the window frame with carriage bolts. |
|2. |Secure the unit to the wood. |

|SECURITY RECOMMENDATION 12 |
|GRILLS AND GRATINGS |

|Grills and gratings provide additional security for windows and other openings, and can be installed in ways that enhance the looks of a |
|building. |
| | |
|1. |They must be installed on the inside of the opening and secured to make it difficult for intruders to get around them. |
| | |
|2. |The openings between grills and gratings should not exceed 6 inches. Where equipment is located near windows, you may need smaller |
| |openings, depending on the type and size of the equipment. |
|3. |Accordion and roll-down metal covers should be used for front windows. |
| | |
|4. |Fixed grills or gratings are used to cover rear windows, roof vents, air conditioning vents, and skylights. |
| | |
|5. |All grills and gratings should have a fire release from the interior. |

|SECURITY RECOMMENDATION 13 |
|DOORS AND DOOR FRAMES |

|A. Single swing |
| | |
|1. |Use material rated burglary resistant for glazing in or near doors. |
|2. |These doors must: |Contain a 1-1/2 inch laminated bolt, or, contain a 3/4 inch hooking bolt |
| | |with a ceramic insert. |
| | |Have double cylinders equipped with hardened steel cylinder guards. |
| | |Have a steel strike reinforcer. |

|B. Wood frame glass |
| | |
|1. |These doors must contain a 1 inch dead bolt with a hardened steel roller bearing insert and |
| |double cylinders equipped with hardened steel cylinder guards. |
|2. |If the door contains plate glass, you should protect it with a secondary barrier |
| |(grills and gratings) or replace the glass with burglary resistant rated glazing. |

|C. Glass in door |
| | |
|1. |Secure doors with small panes of glass in one of the |Replace the glass with a burglary resistant glazing material. |
| |following ways: |Replace the door with a solid wood or metal door. |
| | |Protect the glass with grills or gratings. |
|2. |If there is glass within 36 inches of the locking |Add a double cylinder dead bolt lock. |
| |mechanism: | |

|D. Solid wood |
| | |
|1. |Use at least a single cylinder 1-1/2 inch dead bolt equipped with a hardened steel roller bearing and cylinder guard. |

|E. Double doors |
| | | |
|1. |Secure stationary or inactive doors with a 1 inch hard |The bolt actuator should not be movable or accessible when doors are |
| |metal flush bolt on top and bottom. |closed. |
| | |The bolts must fit firmly into their strikes. |
| | |If the doors are metal with aluminum strike areas, the strikes should be |
| | |reinforced with steel. |
|2. |If the double doors are on a garage, shed, or storage room, consider a locking cross bar. |

|F. Dutch doors |
| | |
|1. |These doors must be handled as two separate doors and secured in the same manner as wood frame glass or solid wood doors. |
|2. |The doors can be replaced with a single solid core door. |
|3. |If you are going to install vertical cross bars, they should be metal. |

|G. Sliding doors |
| | |
|1. |Aluminum frame glass can only be adequately secured from the inside. |
|2. |Wood or metal sliding doors: |Secure in the same manner as sliding glass windows, or by a key operated |
| | |lock. |
| | |These doors must fit solidly in the upper and lower tracks. |
| | |Secure the door with an adequate hasp and padlock. |

|H. Door frames |
| | |
|1. |Reinforce door frames to prevent spreading of the frame by hammers, jacks, crowbars, or other implements. |

|I. Workmanship |
| | |
|1. |Poor workmanship is often the occasion for unwanted intrusions. |Excess space between the door and the frame and/or strikes |
| |Inspect your doors carefully for faults that could encourage forced |will invite burglars to place tools in these spaces and pry |
| |entry. |the door open. |

|SECURITY RECOMMENDATION 14 |
|STRIKES |

|A. Wood door frames | |
| | | |
|1. |You should reinforce the strike area of all door frames with steel strike plates. |
|2. |Anchor exterior door frames with not less than four screws at least 3-3/4 inches long. |

|B. Aluminum door frames | |
| | | |
|1. |Reinforce door frames with steel strike plates to prevent door jamb peeling. |
|2. |Reinforce the inactive aluminum double door frames with steel strike plates when double doors are in use. |
|3. |Protect strike areas by a strike guard or astragal extending at least 6 inches above and below the strike plate. |

|SECURITY RECOMMENDATION 15 |
|KEY CONTROL |
|A consistent key control program can reduce property loss and protect employees. |
| | | |
|1. |Have one person in charge of issuing keys and obtaining signed receipts from employees. |
|2. |Re-key your locks when a key is lost and recovery is unlikely. |
|3. |Review and update your key control system: |Issue only the minimum number of keys necessary. |
| | |Design the key system so that employees' keys will allow them |
| | |only into areas their duties require. |
| | |Be especially careful in issuing master keys. |
| | |Conduct an annual key inventory to assure employees still have|
| | |the keys they were originally issued. |
| | | |
|4. |Have one person responsible for having new keys made and have all |STATE OF CALIFORNIA |
| |keys clearly stamped: |DO NOT DUPLICATE |
|5. |Re-key your office every five years. If you have high employee turnover, re-key more frequently. |

|SECURITY RECOMMENDATION 16 |
|EQUIPMENT LOCKS |

|If your facility evaluation indicates a serious crime threat exists in your area, you may need to install equipment lock-down devices. |
| | | |
|1. |Contact a reputable office equipment supply store to obtain information on the various types of lock-down devices available. |
|2. |Regardless of the type of lock-down device used on your equipment, be sure that the machine is secured to a non-removable part of a |
| |desk, table, or bench. Never use a lock-down device on a mobile stand or cart. |

|SECURITY RECOMMENDATION 17 |
|HINGE PROTECTION |

|Exposed pins can be easily removed and the door opened from the hinge side. There are four ways to secure these hinge pins: |
| | | |
|1. |Remove the existing hinges and replace them with ones having non-removable hinge pins. |
|2. |Spot weld the hinge pin to the hinge. |
|3. |If the hinge screw holes opposite each other match: |a. Remove one screw from each leaf of the hinge opposite each other. |
| | |b. Insert a small round-headed screw or finishing nail, approximately 1 |
| | |inch long, into the leaf jamb, leaving 1/2 inch. |
| | |c. Drill out the opposite screw hole in the door frame leaf. |
| | |d. This should be done on each hinge. |
|4. |If the hinge screw holes do not match: |a. Drill a hole just above the hinge approximately 1/2 inch into the door. |
| | |b. Insert a 1 inch small round-headed screw or finishing nail, leaving 1/2 |
| | |inch. |
| | |c. Close the door until the screw (or nail) comes in contact with the door |
| | |frame. |
| | |d. Drill into the door frame 1/2 inch where the contact point is made. |
| | |Installation of a hinge pin(s) will create a dead bolt effect across the |
| | |back side of the door. |

|SECURITY RECOMMENDATION 18 |
|ROOF ACCESSIBILITY |

|Eliminate easy access to the roof |

|A. Permanent ladders attached to building |
| |
|Solid metal coverings should cover such ladders and should be secured with an adequate hasp and padlock. |
| |
|B. Extension ladders |
| |
|Secure ladders so they cannot be used by unauthorized persons. |
| |
|C. Utility poles |
| |
|Remove the climbing pegs within ten feet of the ground to prevent roof access. |
| |
|D. Trees |
| |
|Trim or remove trees to prevent roof access. |
| |
|E. Trash containers, boxes, lumber, and other objects |
| |
|Keep anything that may be used for climbing away from the building. |
| |
|F. Vehicles and mobile equipment |
| |
|Park vehicles and equipment away from the building. |

|SECURITY RECOMMENDATION 19 |
|FENCES |

|Fences |
| | | |
|1. |A fence surrounding the property will create the first line of defense, providing a psychological and physical deterrent to the |
| |intruder. |
| | | |
|2. |The maintenance of a fence is as important as the installation. Make periodic checks to detect any damage or weaknesses. |
| | | |
|3. |Pay attention to foliage near the fence: |a. Cut weeds and shrubs to ground level or remove them to |
| | |eliminate cover for potential intruders. |
| | |b. Thin or remove limbs and foliage from trees to a height two|
| | |feet above the fence top for maximum visibility. |
| | |c. Plant shrubbery that enhances security along a fence line. |
| | | |
|A. Y-Bar fence top protection |
| | | |
|If permitted by local ordinance, use this type of fence top in high risk areas.|It is comprised of a Y-mounting bar at the top of each fence |
| |post equipped with six strands of barbed wire, three angled |
| |inward and three outward. |
| | | |
|B. Concertina or razor ribbon wire |
| | | |
|Facilities with special security needs may require concertina or razor ribbon fence topping. (Check local ordinances before installation to |
|avoid possible conflict.) |

|SECURITY RECOMMENDATION 20 |
|VEHICLE SECURITY |

|Vehicles are often prime targets for theft, vandalism, and burglary. To reduce the likelihood of such incidents: |
| | | |
|Always lock stored or parked vehicles. |
|Keep storage/parking areas well lit, and park with engine compartments facing the street. |
|Install locking gas caps and hood locks to help prevent gasoline and battery thefts. |
|Try NOT to store equipment in vehicles. Inventory equipment stored in vehicles at least monthly. Park vehicles with extensive and/or high |
|value inventory inside. |
|Install hood security rails. |

|SECURITY RECOMMENDATION 21 |
|PADLOCKS |

|A. Padlock requirements |
| | | |
|Minimum 5/16 inch hardened steel shackle, locking heel and toe. |
|Minimum five pin tumbler operation. |
|Some padlock companies place a key code number on the bottom of their padlocks. Write this number down and remove it from the padlock. |

|SECURITY RECOMMENDATION 22 |
|HASPS |

|A. Minimum requirements |
| | | |
|1. |Minimum 5/16 inch hardened steel eye. |
|2. |Mounting the hasp: |a. Use carriage bolts, which should go completely through the door or |
| | |wall on which you are mounting the hasp. |
| | |b. Use a steel plate on the inside to reinforce the hasp. |
| | |c. After you have firmly tightened the nuts, either spot weld them or |
| | |strip the bolt threads. |

|SECURITY RECOMMENDATION 23 |
|CHAINS |

|A. Chain requirements |
| | |
|1. |Minimum 5/16 inch hardened steel alloy. |
|2. |Welded links. |

|SECURITY RECOMMENDATION 24 |
|SAFES |

|Safe Requirements |
| | | |
|1. |Locate safes in secure areas, out of public view. |
|2. |Securely anchor lightweight or portable safes to the floor. |
|3. |DO NOT leave your safes combinations in the building. Never record combinations on office desk calendars or in daily reminder |
| |books. |
|4. |Your safes should all meet UL specifications, and safes used to secure money should have a class "E" rating or higher. |

|SECURITY RECOMMENDATION 25 |
|INVENTORIES AND ENGRAVING |

|Maintaining current inventories, and attaching or engraving permanent numbers in a visible location on state equipment accomplishes two goals: |
| | | |
|Reduces the risk of theft: a thief is less likely to steal marked property. |
|Assists in locating the owner agency when property is recovered. |
| | | |
|Procedures: |
| | | |
|1. |Maintain an up-to-date inventory record in the immediate area and make annual inventories of all equipment. |
|2. |Check with your department property protection coordinator for guidelines on engraving |
| |equipment with your State Agency Identification Number (SAIN). |

|SECURITY RECOMMENDATION 26 |
|REPORTING CRIMES |

|The CHP must investigate crimes occurring on state-owned or state-leased property. All crimes must be reported to the CHP. |
| | | |
|1. |If your office is within the CHP designated service area, immediately report any crimes/incidents to the CHP via telephone. (Check |
| |your State Telephone Directory.) |
|2. |If your office is located outside CHP designated service area. |Report crimes/incidents on a Std. 99. |
| | |For emergency services call your local police department or |
| | |sheriff's office for immediate assistance. |

|SECURITY RECOMMENDATION 27 |
|EMPLOYEE PARTICIPATION |

|An active and informed workforce is the backbone of any crime prevention effort. |
| | | |
|1. |Emphasize employee responsibilities to help safeguard persons and property at employee orientations. |
|2. |Require employees to sign receipts for equipment issued and hold them accountable for any losses. Do not issue an employee's last |
| |payroll check until all property has been returned. |
|3. |Encourage employees to challenge strangers in your facility or at your work site. |
|4. |Encourage employees to engrave their personal items with their Driver License number. |…...

Similar Documents

Premium Essay

Survey of Justice and Security

...this age. Cyber-crime is defined as the disruption communication or electronic devices behavior as it relates to network mainframe, Internet, and telephone. Based on reports, individuals of different ages are committing cyber-crimes due to the accessibility of computers and the ease of committed the crime. The plethora of information on the internet has greatly increased the threat to national security. The 21st century internet, coupled with the social networks, has made it very easy for terrorist to communicate enabling them to commit cyber terrorism. Research conducted by the United States Institute of Peace concluded in 1998 approximately 15 terrorist organizations established websites on the internet. That numbered doubled in 2000 and more than quadrupled from 2003 to 2004. Although the research have overwhelmingly proved terrorist websites exit, those who would have an influence on regulating the websites have chosen to overlook them (Weimann, 2004). From 6 February through 14 March 2011, Norton by Symantec Corporation released a Cyber Crime Analysis Report based on an online survey of 19,636 respondents from 24 countries. The report revealed a total of over four-hundred million adults were victims of cyber-crime within a year of the study; which equated to fourteen victims per second; eight hundred twenty victims per minute; and close to fifty-thousand per hour (Charette, 8 Sep 2011). In an effort to combat cyber threats, Microsoft unveiled a Cyber Crime Center......

Words: 1160 - Pages: 5

Premium Essay

Organizational Security Survey

...Evaluation of Security Programs SECURITY SITE SURVEY REPORT THE DEVRY CENTER  9210 HIGHER EDUCATION DRIVE NEW YORK, NY 11747 OVERVIEW A security survey is the official procedure utilized to review specific applications, areas, or Processes of residence or a business to document security, risk vulnerabilities, and authenticate the program in place (Broder & Tucker, 2011). One could perform a survey from all the risk perspectives such as facility security, physical security, or life safety. An expert conducts a involving a pre-determined constraint of checklist as well as an official reporting system. A security survey is a significant element of the general risk and security program (Craighead, 2009). When carrying out a security survey one must set clear goals. The goals would also be extensive from reviewing the fitness of the whole security program to more summarizing goals, such as the value and effectiveness of the physical security of the programs (Luis, 1994). SITE DESCRIPTION The Devry center building is located in downtown New York City on a four-acre piece of land. The building is a thirty story high containing 1,250 underground garage parking spaces and a rooftop garden. The building has a maximum capacity of 2000 tenants, and the tenants occupy the 27th and 30th floor of the building. SCOPE I conducted the security survey at Devry Center on December 1, 2013 to December 5, 2013. This......

Words: 1939 - Pages: 8

Free Essay

It/241 Week 5 Site Survey Benefits

...connectivity. A site survey in a medium or large business required more physical work and time, a proper site survey interview should occur to both educate the customer and properly determine their needs. When a company is going to operate with cordless is necessary first to have a site survey, a good network wireless signal will provide the company the most powerful way to operate with portables devices. The prices of the installation will depends in the size of the building, for example a building of 75000 sq./ft. the price is around 100-150/hr. A site survey program can save significant amounts of time, money and any type of frustration when for the first installation or modifying an existing Wireless Local Network. The site survey will provide the necessary information that address coverage, interference sources, equipment placement, power consideration, wiring requirements. The site survey design requirements like the high availability, scalability, manageability, and interoperability. This site survey serves as a guide for network design and for the installation or verification of the wireless communication infrastructure. It is pretty important to create the correct questions during a site survey interview with the correct tools; this will help to make the site survey more productive. Some advantages of installing a site survey is the opportunity to have a wireless access point with reduce signal just covering inside of the building. A site survey......

Words: 542 - Pages: 3

Premium Essay

Physical Security Survey

...Physical Security Survey Report for: Magnolia Utility Citizens’ Cooperative Prepared for: Janet Garret, Director of Security By: Top Notch Security Specialist Jake Johnson Date of Survey: 6 January 2012 Introduction My company conducts physical security surveys and we were hired to perform an evaluation on Magnolia Utilities Citizens’ Cooperative. I was given access to many personnel throughout the organization and was able to receive tangible data to conduct a thorough survey. Mr. Gorsky was in charge of the security check point at the vehicle yard. Mr. Videtti is the warehouse supervisor. Mr. Williams is the tool and equipment distribution center supervisor. Interviewing these personnel gives me an inside look to the physical security layout. The Magnolia organization currently employees 32 personnel and business is conducted within two separate locations. Cash management area, Electric Way hours are conducted between 10AM to 12PM and 2PM to 5PM. Cash Management Area South Street functions are conducted between 8AM and 6PM. Warehouse tool and equipment distribution center is opened from 5Am to Midnight. The provided information and information gathered throughout the survey has led me to an evaluation which concentrates on areas that need improvement. After interviewing all employees it is evident that not all of them receive security training on a regular basis. In order to maintain a highly secure working environment all employees regardless of...

Words: 1217 - Pages: 5

Free Essay

Floor Plan Site Survey

...Appendix E Floor Plan Site Survey Data Sheet Use the tables to gather the data necessary to analyze each of the five floor plans in the Floor Plan Site Survey exercise. The information gathered in this assignment will assist you in your final project. Conference Center Explain the major features of this floor plan. For example, are there large open spaces, large walls, cubes, or offices? | A few of the main characteristics which this floor plan provides are a lift, a big meeting room, and many concrete walls. The southern portion of the floor plan also has a worker rest room with vending machines. At the west portion there are lavatories which are segregated with concrete wall. | Identify areas of this floor plan that may present issues when designing your network. Why will these areas present issues? For each area identified, what can you do to overcome the issue? | Some areas that may present issues when designing a network would be the large conference room and the break room. The large conference room is surrounded by concrete walls and the AP is at one corner of the floor plan surrounded by more concrete walls. The break room is also surrounded by walls and vending machines. This causes the signals to weaken because of the several walls and metal obstacles that are interfering. One way to fix the issue is to rearrange the AP to another place where there is less interference or in this case less walls. | According to your site survey, is the data......

Words: 1551 - Pages: 7

Free Essay

Devry Security Site Survey

...SECURITY SITE SURVEY DEVRY CORPORATE HEADQUARTERS – The Devry Center Jim Jones February 15, 2013 Eval of Security Systems Professor Semore Butts Overview This site survey was conducted by Jim Jones on February 15, 2013. This document is intended to detail the security survey and analysis for Devry Corporate headquarters. The report will detail the strengths and weaknesses of each of the operational areas. While it will detail an overview of staff and visitor procedures it will not be a personal evaluation of the staff’s readiness or ability to carry out those activities and responsibilities. The objective of the recommendations in this audit are to ensure that Devry Corporate headquarters complies with state, local, and federal regulations for the safety of its employees, the public, and visitors. It will also assist with recommendations that ensure Devry Corporation is free from any legal liabilities as a result of action or non action as it relates to security and safety (Garcia, 2008). Summary The Devry Corporate Headquarters is the central location for Devry Inc., which owns and operates fourteen educational institutions, their supporting both domestic and international operations. These Institutions are comprised of large scale educational facilities requiring sophisticated infrastructures. Each of the supported institutions must adhere to the Higher Education Act standards of security and safety. Those standards would not be applicable in the corporate...

Words: 2015 - Pages: 9

Free Essay

Site Survey

...Wireless Survey Research With wireless systems, it’s very difficult to predict the propagation of radio waves and detect the presence of interfering signals without the use of test equipment. Walls, doors, elevator shafts, people, and other obstacles offer varying degrees of attenuation, causing the RF radiation pattern to be irregular and unpredictable. As a result, it’s absolutely necessary to perform a wireless site survey to fully understand the behavior of radio waves within the operating environment before installing access points. The goal of a wireless site survey is to determine the number and placement of access points that provides adequate signal coverage throughout a facility. A wireless site survey also detects the presence of RF interference coming from other sources that could degrade the performance of the wireless LAN. Also keep in mind that the facility of the WLAN is highly impactful on the whether it requires a survey. For example a small room office may not require a site survey. With the given example a small office might only require an access point or a router located within the office to require adequate coverage. A larger facility is going to require a well scoped survey to be able to provide sufficient coverage to all areas, and if a larger facility isn’t properly surveyed other areas in the facility might be affected by poor coverage or no coverage. Example of these areas would be airports, hospitals, colleges. When conducting a site survey......

Words: 657 - Pages: 3

Premium Essay

Floor Plan Site Survey Assignment.Doc

...Axia College Material Appendix D Floor Plan Site Survey Data Sheet The following tables will help you gather the data necessary for analyzing each of the five floor plans in the Floor Plan Site Survey exercise. As you go through the exercise, complete the information in each table. The information gathered in this assignment will assist you in your final project. Conference Center |Explain the major features of this floor plan. For example, are there large open spaces, large walls, cubes, or offices?| |Within this plan there are a lot of walls. This plan also has a lot of offices. | |Identify areas of this floor plan that may present issues when designing your network. Why will these areas present | |issues? For each area identified, what can you do to overcome the issue? | |The areas what I see that may present a problem would be the back hall way because it does not have any signal strength.| |I believe this happened because of all of the walls in between the access point and the back offices. One thing that | |can be done for this is to install another access point on the other end of the building or move the access point that | |already exists. | |Based on your site survey, do you think that placing the wireless access point in the data center is an ideal......

Words: 1232 - Pages: 5

Free Essay

Survey

...Summary This report summarizes a plan to conduct a wireless site survey, also called a radio frequency (RF) survey, at Orchard Street Art Center. This survey will generate recommendations for maximizing network security, coverage, and capacity. Expert Advice Earlier this year, the board of directors of Orchard Street Art Center asked me to propose a plan to improve wireless coverage throughout the center’s public areas, offices, classrooms, music studios and indoor and outdoor theaters. To make sure I proposed the most effective plan possible, I decided to seek the advice of experts. Fortunately, one of the area’s top experts in wireless networking, Jamie Brookstone, president of Brookstone Network Consulting, offered the services of his staff pro bono. Thanks to his offer, I was able to meet several times with the following consultants: Lyn Luzerne Our conversations focused on ways to improve network connections for the center’s staff and patrons. I also studied information obtained from leading hardware manufacturers and software distributors. This research suggests that our first step is to conduct a site survey of our entire facility. Final Recommendation A high availability, secure wireless network is crucial to our mission at Orchard Street Art Center. Lighting and sound systems in our two theaters increasingly rely on wireless signaling, as do our classroom facilities. Furthermore, patrons and instructors now consider a secure wireless network essential for a......

Words: 806 - Pages: 4

Free Essay

Site Survey Report

...Wireless Site Survey Recommendation Wireless Site Survey Recommendation Orchard Street Art Center Orchard Street Art Center Summary This report summarizes a plan to conduct a wireless site survey, also called a radio frequency (RF) survey, at Orchard Street Art Center. This survey will generate recommendations for maximizing network security, coverage, and capacity. Expert Advice Earlier this year, the board of directors of Orchard Street Art Center asked me to propose a plan to improve wireless coverage throughout the center’s public areas, offices, classrooms, music studios and indoor and outdoor theaters. To make sure I proposed the most effective plan possible, I decided to seek the advice of experts. Fortunately, one of the area’s top experts in wireless networking, Jamie Brookstone, president of Brookstone Network Consulting, offered the services of his staff pro bono. Thanks to his offer, I was able to meet several times with the following consultants: Lyn Luzerne Associate Engineer Dean Armstrong Senior Engineer Suzanne j. Sheffield-Harper Project Manager Our conversations focused on ways to improve network connections for the center’s staff and patrons. I also studied information obtained from leading hardware manufacturers and software distributors. This research suggests that our first step is to conduct a site survey of our entire facility. What Is a Wireless Site Survey? A wireless site survey is an analysis of a facility’s wireless......

Words: 896 - Pages: 4

Premium Essay

Term Paper -Mercy Securities Corp -Survey Report

...Term paper -Mercy Securities Corp -Survey Report Click Link Below To Buy: http://hwcampus.com/shop/term-paper-mercy-securities-corp-survey-report/ Each student will prepare both a 5 -7 page written report. Outline Background: You have recently been hired as part of annual class of trainees at a major brokerage firm, Mercy Securities Corp. After a few days of orientation, you begin its trainee “rotation” through several departments across the firm. The first unit you are assigned to is the ___________________ Department where, as an initial project, you are asked to research and study the processes and controls of that department. Your job is to fully explain how that department works and what controls are or should be in place. Your manager wants you to prepare a written report analyzing the chosen department. In addition, he asks you to give him an oral presentation of your findings and conclusions once you have completed your analysis. Selection of the Department: Each student will choose a department of interest from within a brokerage firm. Research will show dozens of potential departments. The students may choose any department that interests them. Format for Written Report: The written report should be organized in the following order: Section I: Executive Summary (1 page) Section II: Detailed Analysis (4 to 6 pages) Section III: Attached Addenda (bibliography, copy of financial statements, comparisons, charts,......

Words: 303 - Pages: 2

Premium Essay

Site Survey

...ITNT 1700 | Site Survey Project | CWNA | | Name | 12/13/2010 | | Requirements Summary Business Requirements * Wireless Connection * The organization would like to provide GHSIA in the hotel and conference center * The business requires a high level of mobility for Wireless VOIP throughout hotel and conference center * Our equipment will be compatible with the existing equipment * Wireless Coverage * Covering the Hilton Hotel customers in their rooms, bedside and at their writing stations * Covering the Hilton management team in their offices with a dedicated wired connection and support for a wireless connection * Coverage in all meeting rooms, lounge area, pavilion, and pool side * Coverage in University Conference room for approximately 100 client stations * Optional coverage for kitchens, break rooms, and rest rooms User Requirements * Hilton hotel guests to receive unlimited guest access upon checking in and will expire upon checkout * Hilton guests to connect via Wi-Fi connection in meeting rooms, lounge area, pavilion and pool side * Hilton 12 managers to connect wireless with laptop and have a dedicated wired connection in offices Functional Requirements * Wireless PoS Access * Provide Hilton Hotel with 6 PoS stations to have WPA 2 with AES encryption * Shall be isolated to the PoS VLAN and separate from the GHSIA * Shall be PCI compliant *......

Words: 952 - Pages: 4

Free Essay

Site to Site

...Site to Site Connectivity Scenario With the two site taking long to replicate or not replicating at all I would first check the time that is set to replicate and if there is even a connection at all. Open the console and service site link and note how long this configuration is set for replication. Then I would try and duplication the problem. Create a new object in the Active Directory and replicate. Compare the time it took to the time set on the configuration. There are many other ways you could troubleshoot this issue. Open command prompt and run repadmin /?. This will show you many helpful commands you can run to troubleshoot this issue. In repadmin /showrepl command helps you understand the replication topology and replication failures. It reports status for each source domain controller from which the destination has an inbound connection object. The status report is categorized by directory partition. Use the /repsto parameter to display outbound partners. The /replicate command tests replication success after you remove suspected fault conditions without waiting for the replication schedule to open /replsummary will Identifies domain controllers that are failing inbound replication or outbound replication, and summarizes the results in a report. Like I noted before there are many options to troubleshoot this another tool I would like to leave you with is a command line tool DCDiag. This will analyze the state of one or all domain controllers in the forest and......

Words: 300 - Pages: 2

Premium Essay

Site Survey Memo

...Penultimatum, Inc. To: Helen Gibbs From: Harvey Miller CC: Amy Collins Date: 6/24/2011 Re: Site Survey for Requested Wireless Network In regards to the requested wireless network project, it is very important that we are given a sufficient amount of time and adequate resources to conduct a site survey prior to installing the network. A site survey will help us to determine whether there are other wireless networks in the area and which band is needed to ensure minimal interference and optimal performance. Purchasing network devices that support multiple bands will cost more than purchasing devices that support a single band and will also increase the time needed to configure each device on the network. By taking the time to do a site survey, you will also help make planning the network more efficient and cost effective by helping to determine what channels and signal strengths are needed in relation to the other wireless networks in the area. This should help avoid the inevitable time cost of having multiple configuration changes due to not knowing which channels and configurations will work best within the environment. The survey will also help us determine whether the buildings are well suited for wireless networks or not. If we move forward the assuming that a wireless network will perform according to expectations and find out after purchasing and installing the equipment that a building with plaster walls has a metal frame that does not permit wireless......

Words: 306 - Pages: 2

Premium Essay

Social Media Networking Sites Survey

...Usage of Social Media Networking Sites Survey By participating in this survey you are assisting our study in providing data about the usage of Social Media Websites by employees during their work environment. Please respond to the questions honestly and to the best of you knowledge. All of the information gained by these surveys will remain confidential and anonymous. 1. Are you currently employed? (Circle) YES NO 2. Do you have internet access at your current job? (Circle) YES NO 3. Does your Cell-Phone or other portable device have access to Social Media Networking Sites? (Circle.) YES NO 4. Please rank (1 being the most and 5 being the least) your means of accessing social networking Sites? ( ) Personal Computer ( ) Work Computer ( ) Cell Phone ( ) School Computer ( ) Other Form: ________________________________ 5. On average, how many times a day do you check or use social media networking sites while at work? (Check answer.) ( ) 0 ( ) 1-2 ( ) 3-5 ( ) 6-10 ( ) 10 & Over 6. How many social media networking sites/communities are you a member of? (Check answer.) ( ) 0 ( ) 1-2 ( ) 3-4 ( ) 5-6 ( ) 7-8 ( ) 8 or more 7. Do you think it is essential to use social media networking sites while at work? (Circle.) YES NO Indicate the extent to which you agree with the following statements as they relate to your CURRENT usage of......

Words: 908 - Pages: 4