100% found this document useful (1 vote)
1K views

Comprehensive Security Master Plan

Individual Assignment: Comprehensive Security Master Plan · Resources: All assessments from previous weeks · Compile all assessments from previous weeks and synthesize them into a 7,000- to 10,000-word comprehensive organizational security plan. Include an introduction and conclusion, as well as the final budget. The following content areas are required: o Introduction: Vision and mission; may include purpose, philosophy, goals, objectives, code of ethics, and other management-related communications o Risk assessment o Security strategy o Preparedness, prevention, response, and recovery o Organizational behavior and management o Finalized budget o Conclusion · Format your paper according to APA standards. · Prepare a 15- to 20- slide Microsoft® PowerPoint® presentation outlining your complete organizational security plan.

Uploaded by

Brenda Anderson
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views

Comprehensive Security Master Plan

Individual Assignment: Comprehensive Security Master Plan · Resources: All assessments from previous weeks · Compile all assessments from previous weeks and synthesize them into a 7,000- to 10,000-word comprehensive organizational security plan. Include an introduction and conclusion, as well as the final budget. The following content areas are required: o Introduction: Vision and mission; may include purpose, philosophy, goals, objectives, code of ethics, and other management-related communications o Risk assessment o Security strategy o Preparedness, prevention, response, and recovery o Organizational behavior and management o Finalized budget o Conclusion · Format your paper according to APA standards. · Prepare a 15- to 20- slide Microsoft® PowerPoint® presentation outlining your complete organizational security plan.

Uploaded by

Brenda Anderson
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Name Class Date Professor

Risk assessment Security strategy Preparedness, prevention, response, and recovery Organizational behavior and management Budget

Provide Citizens with Electricity Develop New and Innovative Approaches to Energy Safeguard Energy

Values: Safety, Justice, Fairness, Respect Goals: Safety, Performance, Value Strives for Reliability in Electric Transmissions Nurture Strong Relationships with Local Businesses Strong Code of Ethics Transformational Leaders

Physical Threats: Criminals, Terrorists, Natural Hazards IT Threats Personal Threats

Attacks to Cripple Energy Output Workplace Shooters Criminal Threats Cyber Criminals: Hackers, Malware, Unauthorized Users Natural Disasters Terrorist Attacks

#1 Needs Immediate Action: Physically Securing the Perimeter, Secure People, and Secure Information Systems #2 When Funds Come Available: Additional Security Measures #3 Long Term Planning: Establishing Written Security Policies and Training the Employees

Evacuation Routes Training Drills PA System Warnings Emergency Exits

Reduce Impact of Security Breach Prevent Security Breach Physical Security Measures Cyber Prevention Measures Establish Prevention Policies

Security Plan Contact First Responders Evacuate Facilities Following Safety Protocol

Search and Rescue Rebuild Coordinated Effort to Reestablish Operations Fix Structural Damage

Physical Security IT Security Personal Security

Total: $250,000 Physical Security budget $150,000 Fences around power stations security guards Video Cameras Keyless entry Security Alarms

IT Security $30,000 Antiviral software Encryption Software IT Security Policies Passwords Authorized Users

Personal Security $50,000 Lighting in parking garage Security Guards Video Cameras Organizational Training $20,000 IT Security Polices Emergency Preparedness Security Plan

Physical, Personal, and IT Security Organizational Behavior Risk Assessment Comprehensive Security Plan

Center for Disease Control. (2005). Preparing for a Bombing: A Common Sense Approach. Retrieved August 14, 2013 from http://emergency.cdc.gov/masscasualties/preparingterroristbombing.asp Gofin, R. (2005). Preparedness and response to terrorism: A framework for public health action. European Journal of Public Health, 15(1): pp. 100-104 IBM Corporation. (2012). Best practices for cyber security in the electric power sector. Retrieved July 21, 2013 from http://public.dhe.ibm.com/common/ssi/ecm/en/euw03064usen/EUW03064USEN.P DF Panda Energy. (2012). About Us. Retrieved July 21, 2013 from http://www.pandaenergy.com/Home/tabid/36/Default.aspx McGinnis, S. (2010). Organizational Behavior and Management Thinking. Retrieved August 8, 2013 from http://www.jblearning.com/samples/076373473x/3473x_ch03_4759.pdf Teller, T. (2013). The Biggest Cyber Security Threats of 2013. Retrieved July 21, 2013 from http://www.forbes.com/sites/ciocentral/2012/12/05/the-biggest-cybersecuritythreats-of-2013

You might also like