Contact Information
- 15800 Progress, Mora, MN, 55051
- info@preessays.com
- +1-786-220-3368
Browse our Free Essay examples and check out our Writing tools to get your assignments done.
5-2ianl Project Milestone Two: Threat
Assessment
Student’s Name
Institution
Course Name/Number
Instructor
Due Date
5-2ianl
Project Milestone Two: Threat Assessment
Nature
of threat
The
area is experiencing insecurity threats, which is notified for the first time
by the breakage into the builder Inc. inventory store, and the thugs get away
with 2000 pounds of T-N-T. Johnson claims that even though they have strong
access security, some of the staff's cards have been and the thieves have tried
to gain access into the Box Station, Inc. several times though in vain since
they lack personalized pin, which is an additional requirement for one to gain
the authorized access. The letter sent to the box Station by an individual who
identified himself with the company supports American business people's law to
buy domestically threaten to destroy the warehouses for the companies that will
not comply with such orders. It has been aired by the bar in the local town
strange people start asking suspicious questions when they get the drug.
Sanchez argues that a drunkard person askes a waiting staff the location of Box
Station. In another instance, a few are seen asking the card used to gain
access to the box station.
The
vulnerability of the potential target
The potential target of this investigation report are the people owning businesses in the United States of America. They are very prone to attack by the terrorist because even if they have a chain link surrounding the distribution warehouse, they appropriate workforce to maintain the assets' security. For instance, the guard shark is manned by one security officer who is not armed. The availability of an unarmed officer in guard sharks, 24 hours 7days, does not mean the warehouses are safe because if thugs happen to come, they cannot manage to contain them without a weapon. Many idle people pretend to be harvesting fishes from the river, which is suspected to be not the case because none have a hook with them. The targeted group is also vulnerable because even if they have maintained strong access security, the camera surveillance to monitor and capture...