Threat and Vulnerability Management

SEC/401 Threat and Vulnerability Management

Copyright ©2018 by University of Phoenix. All rights reserved.

SYLLABUS

Course Description This course highlights a methodical approach to security management. Students will learn the steps necessary to carrying out a comprehensive security risk assessment with consideration for physical facilities, personnel, equipment, and operating systems. Students will evaluate techniques and current trends for identifying and managing security risks and vulnerabilities associated with potential threats.

Course Dates Aug 14, 2018 – Sep 17, 2018

Faculty Information

• Academic Policies • Instructor Policies University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.

Academic Resources • Student Program Handbook

Instructions Review the Student Program Handbook.

• Learning Team Toolkit Instructions Review the Learning Team Toolkit.

• Web Links Library Instructions View the Web Links Library.

Get Ready for Class • Familiarize yourself with the textbooks used in this course.

Instructions Broder, J. F., & Tucker, E. (2012). Risk analysis and the Security Survey (4th ed.). Waltham, MA: Elsevier. White, John M. (2014). Security Risk Assessment: Managing Physical and Operational Security (1st ed.). Butterworth- Heinemann.

Course Materials All electronic materials are available on your student website.

Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents (both located on your student website):

Policies

George Gallitano, PhD (PRIMARY)Name : Email Address : Phone Number : (781) 854-1659

Week1 Aug, 14 – Aug, 20 Threat and Risk Assessment

Tasks

1.1 Evaluate the process and various steps of a security risk assessment. 1.2 Identify types of assets and loss implications. 1.3 Identify methods of collecting intelligence and identifying potential threats. 1.4 Determine general and specific types of threats to which businesses, facilities, organizations or individuals might be exposed. 1.5 Estimate the probability and criticality of threats to determine risk. 1.6 Identify the value of prioritizing threats based on risk.

Objectives/Competencies

Required Learning Activities • Week One Watch Me First

Watch the Week One Watch me First. Instructions

• Risk Analysis and the Security Survey, Ch. 2

• Risk Analysis and the Security Survey, Ch. 4

• Security Risk Assessment, Ch. 1

• Security Risk Assessment, Ch. 5

• Week One Electronic Reserve Readings

Read this week’s Electronic Reserve Readings. Instructions

• Courtroom Security

Watch the “Courtroom Security? What Every Cop Should Know: In the Line of Duty” video. Instructions

Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts.

Title Type Due Points

Week One Participation Instructions: Participate in class discussion.

Individual Aug 20, 2018 11:59 PM 4

• Getting Started with VitalSource

Threat and Vulnerability Assessment Instructions: Select an organization in your area that you feel is in need of additional security. You will use this organization for the individual assignments in Week One, Two, and Three. Complete the Week One section of the Security Assessment Worksheet. Apply the principles of threat and risk assessment to the organization. Write a 700- to 1,050-word paper discussing how security officials determine natural, human-made, and technological threats and risks. Include the following in your paper:

• Types of assets and their characterizations including loss implications • General and specific types of interior and exterior threats • The completed Week One section of the Security Assessment Worksheet, submitted as an appendix in the paper Format your paper consistent with APA guidelines. Click the Assignment Files tab to submit your assignment.

Individual Aug 20, 2018 11:59 PM 8

Week2 Aug, 21 – Aug, 27 Vulnerability Assessment

2.1 Research and evaluate physical security measures in the greater area, surrounding area, on a facility premises and within an organization’s area of responsibility. 2.2 Evaluate internal security risks and vulnerabilities. 2.3 Identify vulnerabilities associated with information systems, technology, and cyber threats. 2.4 Research and determine vulnerabilities related to physical terrain or geographic location. 2.5 Assess security measures used by businesses, facilities, organizations, or individuals. 2.6 Determine risks and vulnerability associated with work behaviors.

Objectives/Competencies

Required Learning Activities • Week Two Watch Me First

Watch the Week Two Watch me First. Instructions

• Risk Analysis and the Security Survey, Ch. 10

• Security Risk Assessment, Ch. 6

• Security Risk Assessment, Ch. 9

• Security Risk Assessment, Ch. 11

• Week Two Electronic Reserve Readings

Read this week’s Electronic Reserve Readings. Instructions

• Peter Jennings Reporting

Watch the “Peter Jennings Reporting? No Place to Hide” video. Instructions

Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts.

Title Type Due Points

Week Two Participation Instructions: Participate in class discussion.

Individual Aug 27, 2018 11:59 PM 4

Learning Team Charter Instructions: Submit the Learning Team Charter.

Learning team

Aug 27, 2018 11:59 PM 2

Vulnerabilities Assessment Instructions: Use the organization you selected in Week One. Complete the Week Two section of the Security Assessment Worksheet. Write a 1,050- to 1,400-word paper that discusses how security officials determine vulnerabilities to natural, human-made, and technological threats. Include the following in your paper:

• Vulnerabilities associated with informational, technological, natural, and human-made threats • Vulnerabilities associated with personnel and work behaviors • Transportation vulnerabilities • Socio-economic and criminal activity factors associated with the environment surrounding the area • Vulnerabilities associated with neighboring businesses • The completed Week Two section of the Security Assessment Worksheet, submitted as an appendix in the paper Format your paper consistent with APA guidelines. Click the Assignment Files tab to submit your assignment.

Individual Aug 27, 2018 11:59 PM 10

Week3 Aug, 28 – Sep, 03 Managing Vulnerabilities and Applying Countermeasures

3.1 Examine risk management options for security. 3.2 Create plans for countermeasures, recovery, and operational back-up. 3.3 Evaluate the pros and cons of working from a floor plan for security application. 3.4 Examine the application of countermeasures for physical, personal, and information security threats. 3.5 Recall testing and measurement methods, reliability, and validity for meeting security goals, objectives, and metrics. 3.6 Evaluate the effectiveness of physical, personal, and information security systems. 3.7 Assess overall strengths and weakness of a comprehensive security system. 3.8 Perform a cost-benefit analysis to include actual benefits as well as estimated benefits through deterrence.

Objectives/Competencies

Required Learning Activities • Week Three Watch Me First

Watch the Week Three Watch me First. Instructions

• Risk Analysis and the Security Survey, Ch. 5

• Risk Analysis and the Security Survey, Ch. 8

• Risk Analysis and the Security Survey, Ch. 16

• Risk Analysis and the Security Survey, Ch. 19

• Security Risk Assessment, Ch. 4

• Security Risk Assessment, Ch. 15

• Week Three Electronic Reserve Readings

Read this week’s Electronic Reserve Readings. Instructions

Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts.

Title Type Due Points

Week Three Participation Instructions: Participate in class discussion.

Individual Sep 03, 2018 11:59 PM 4

Countermeasures’ Strengths and Weaknesses Instructions: Review Category 4 in the Security Assessment Checklist. Research modern security countermeasures associated with Category 4: Physical Security. Create a 5- to 7-slide presentation summarizing the strengths and weaknesses associated with the modern physical security countermeasures found in your research. Format your presentation consistent with APA guidelines. Click the Assignment Files tab to submit your assignment.

Learning team

Sep 03, 2018 11:59 PM 5

Managing Vulnerability Instructions: Resource: University of Phoenix Material: Floor Plan Use the organization you selected in Week One. Complete the Week Three sections of the Security Assessment Worksheet. Write a 1,050- 1,400-word paper that discusses how security officials manage identified vulnerabilities regarding natural, man-made, and technological threats. Include the following in your paper:

• The role and effectiveness of on-site security personnel • Appropriate countermeasures based on risk and vulnerabilities • How to communicate priorities effectively to stakeholders • A cost estimate and a description of the benefit in relation to the selection of countermeasures • Risk management options • Recovery and operational backup plans • How to evaluate the effectiveness of the security program • The completed Week Three section of the Security Assessment Worksheet, submitted as an appendix in the paper Create a representation of the organization’s floor plan that includes the current security countermeasures. Include this representation as an appendix to your paper. Format your paper consistent with APA guidelines. Click the Assignment Files tab to submit your assignment.

Individual Sep 03, 2018 11:59 PM 15

Week4 Sep, 04 – Sep, 10 Criminal Activity and Terrorism

4.1 Assess the deterrent effect on crime and terrorist activity associated with the application of a methodical and comprehensive security plan. 4.2 Analyze case studies involving crimes against property. 4.3 Evaluate case studies involving crimes against persons. 4.4 Analyze incidents of terrorist activity and assess vulnerabilities associated with each target or asset. 4.5 Compare the benefits and limitations of prevention vs. enforcement.

Objectives/Competencies

Required Learning Activities • Week Four Watch Me First

Watch the Week Four Watch me First. Instructions

• Risk Analysis and the Security Survey, Ch. 6

• Risk Analysis and the Security Survey, Ch. 18

• Security Risk Assessment, Ch. 10

• Security Risk Assessment, Ch. 14

• Week Four Electronic Reserve Readings

Read this week’s Electronic Reserve Readings. Instructions

• The Interrogator

Watch the “The Interrogator” video. Instructions

Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts.

Title Type Due Points

Week Four Participation Instructions: Participate in class discussion.

Individual Sep 10, 2018 11:59 PM 4

Security Assessment Instructions: Choose one of the following organizations for this assignment:

• Bank • Hospital • Prison • Industrial complex • Retail shopping center Conduct a security assessment of the organization. Write a 700- to 1,050-word assessment of threats, estimated risk, and vulnerabilities. Include at least two threats associated with terrorism, two threats associated with crime, and two nature-made threats. Format your paper consistent with APA guidelines. Click the Assignment Files tab to submit your assignment.

Learning team

Sep 10, 2018 11:59 PM 5

Terrorism and Criminal Activity Instructions: For this assignment, you will choose from the following options:

• Option 1: Terrorism and Criminal Activity Paper • Option 2: Terrorism and Criminal Activity Presentation Read the instructions in the University of Phoenix Material: Terrorism and Criminal Activity and select one option to complete the assignment. Click the Assignment Files tab to submit your assignment.

Individual Sep 10, 2018 11:59 PM 10

Week5 Sep, 11 – Sep, 17 Principles of Emergency Management

5.1 Examine the concept of preparedness and describe the symbiotic relationship this has with effective security management. 5.2 Evaluate potential risks and emergency management countermeasures for nature-made incidents. 5.3 Evaluate potential risks and emergency management countermeasures for human-made incidents. 5.4 Identify key personnel and describe the benefits of an emergency management team. 5.5 Identify the various elements required for an emergency management plan. 5.6 Determine what human and tangible resources are needed and available for emergency response contingencies. 5.7 Evaluate the issues and vulnerabilities associated with emergency response to include training, resource allocation, and supervision. 5.8 Assess the elements of a comprehensive evaluation process for an emergency management plan and describe how after-action reports can affect the security assessment process.

Objectives/Competencies

Required Learning Activities • Week Five Watch Me First

Watch the Week Five Watch me First. Instructions

• A Message from the Instructional Designer

Watch the “A Message from the Instructional Designer” video. Instructions

• Risk Analysis and the Security Survey, Ch. 12

• Risk Analysis and the Security Survey, Ch. 13

• Security Risk Assessment, Ch. 8

• Security Risk Assessment, Ch. 13

• Week Five Electronic Reserve Readings

Read this week’s Electronic Reserve Readings. Instructions

• Preparing for Emergencies

Watch the “Preparing for Emergencies: Cutting Edge Communications Comedy Series” video. Instructions

Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts.

Title Type Due Points

Week Five Participation Instructions: Participate in class discussion.

Individual Sep 17, 2018 11:59 PM 4

Emergency Management Plan Instructions: Apply the Security Assessment Checklist to the organization your team selected in Week Four. Prepare a comprehensive emergency management plan based on actions to mitigate security threats. Identify preventative and mitigating actions that will reduce loss. Create a 15- to 20- slide presentation detailing an emergency management plan that will be presented to management. Address the following questions in your plan:

• What are the strengths and weaknesses of the organization? • Who are key personnel and what are the duties associated with incident response and recovery? • What improvements would you make to reduce loss? • What is the estimated cost for preventing and mitigating threats? • What are the estimated savings from applying the emergency management plan? • What is the total cost analysis? Format your presentation consistent with APA guidelines. Click the Assignment Files tab to submit your assignment.

Learning team

Sep 17, 2018 11:59 PM 25

All trademarks are property of their respective owners. University of Phoenix® is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft®, Windows®, and PowerPoint® are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation.

Trademark