Security Focus

Improved Essays
Ensuring the safety of your customers, employees and assets are immensely important as a retail store owner. As shoplifting is on the rise it is reasonable for you to consider effective theft prevention methods. Security Focus is delighted to propose a plan to help you equip your store effectively by learning what security technologies and techniques are superior in theft prevention, so that you can improve your store’s security status.

Background and Goals

Shoplifting is a major problem that occurs in retail stores throughout the world. Statistics show that $13 billion worth of merchandise is shoplifted from retail businesses in America every year. Additionally, one out of every eleven people are proven to shoplift at some point during their
…show more content…
Because we do our best to provide customer satisfaction, I have assigned your project to Robert Smith who is our security specialist. Mr. Smith has been working for Security Focus for over twenty years after graduating from Georgia Tech University and graduating with a degree in Engineering.

Also assigned to your project will be a security specialist team led by Amanda Russo that is provided to assist Mr. Smith on whatever he needs in order to meet your needs. Amanda also graduated with a Bachelors Degree in Engineering from Florida State University. Before coming to Security Focus, she previously worked for AT&T in the home security department.

Budget

Estimated Hours Rate Total
Professional Installation Time
Camera models:
Bullet 1 for 4 cameras $78 per hour $78
Dome 2 for 4 cameras $96 per hour

Related Documents

  • Improved Essays

    The lock should require multi-factor authentication, such as a card swipe and an access PIN, or a biometric id check and a PIN. Preferably, the PIN entry keypad would randomize the position of the digits for each PIN entry attempt. The system should be connected to the network, be centrally configured and record all access attempts in a log. c) Video Surveillance System: In order to keep records of who is physically accessing critical areas and devices, video monitoring cameras should be installed with good views of those areas. At a minimum, cameras should have a view of the inside of the wiring closet / server room, the entry point to the wiring closet / server room, and the main entrance to the company…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Working alone, I immersed myself in this environment and worked toward removing inefficiencies, security oversights, and business continuity issues. As I hope you’ll see, the high-security, HIPAA-compliant environments that I’ve worked in have exposed me to policies, products, and procedures that I can bring to your organization to help strengthen your information security program. Additionally, my expertise in securing iOS and Android mobile devices means that I can help mitigate threats to this increasingly significant portion of your computing…

    • 320 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    A1: Business Objective: Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals. A2: Security Principle The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    “The vision of Tim Hoffman & Associates, LLC is to protect the world’s data and overall quality of life one customer at a time by providing the best quality service in the areas of cybersecurity, education, and consulting. Moreover, our aspiration is to keep the confidentially, integrity, and availability of our patron’s information as a central focus.”…

    • 57 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Each branch is equipped with a variety of security devices designed and implemented to safeguard our staff, our facilities, and our assets. It is important that each employee is aware of these devices and know how to operate them. Bait Money Bait money is a term to describe a series of bill that have been recorded as belonging specifically to CTFCU and are only to be given out during a robbery. The sole purpose and intent of having bait is to assist law enforcement officers in convicting a CTFCU robber. If a robber is caught and it can be proven that the money in their possession was in fact taken from the credit union, the prosecution of the robber is much easier.…

    • 411 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    EDUCATION • Capella University: Bachelor of Science Degree: IT Information /MIS Technology • Philadelphia Wireless Technical Institute: Electronics Security Engineering • St. Joseph University Beginning studies for the MBA in Business Management • Cambridge University External Campus Certification. England (UK). PROFESSIONAL RSA ARCHER: RSA Archer trained and educated/Authentication Manager SIX SIGMA YELLOW BELT Project Management certified ISACA: Membership: (CISSP) CISSP trained and educated CHECKPOINT: (CCSA) Certified Checkpoint Security Administrator CISCO (CCNA)…

    • 292 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The Michigan Incident Crime Reporting (MICR) Section has listed that Michigan’s auto thefts have risen 28% from 2015 to 2016. Reasons for current theft increases may include the following: 1. Anti-theft technologies have driven thieves to become more proficient in falsified paper crimes such as identity theft or false titles and documents used in the fraudulent purchases of an automobile. False identification is used in car rental companies where the thief acquires a vehicle and fails to return it. 2.…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Patriot Act Benefits

    • 305 Words
    • 2 Pages

    There are many benefits to the Patriot Act. The act has given authorities the tools they need to combat and prevent terrorism. It has also given a lot of protection. A large number of potential terrorist plots have been avoided and terrorist convicted due to the use of the Patriot Act enablement. Lastly, it has given protection of Constitutional Rights.…

    • 305 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Child Abuse Case Study

    • 542 Words
    • 3 Pages

    On 04/01/2016, at approximately 1920 hours, Officer Bowman and your affiant were requested to respond to the Family Dollar to speak with an individual whose purse had been stolen. Officers arrived on scene and spoke with the 11 year old female victim. The victim placed her purse in a designated area for book bags which is a policy of the store to deter and lower the amount of thefts. The victim placed her purse there believing she was following the rules and proceeded to shop for diapers for her younger sibling at the request of her mother. The storage location to place book bags is located at the front of the building between the entrance and cash register/check out.…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Is There Really Privacy with Cameras In the article, “Smile, You’re on Camera” By John Mcelhenny, there are surveillance cameras watching all around us, but are you comfortable with no privacy. In Boston “Selevitch says there are parts of Boston where nearly all of the streets and sidewalks are covered by video cameras.” These cameras help police, transportation areas, and preventing theft. However there are issue wondering what the governments use of surveillance cameras.…

    • 409 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Thesis: Using the principle of least privilege and roles to help secure a government network system. In high security government network systems with Department of Homeland Security, the use of roles and least privilege is necessary to help secure systems. It is essential to define an employee’s job role and provide the tools that are needed to perform their job. However, using the principle of least privilege is crucial in providing the employee access to only resources absolutely needed to execute the essential roles.…

    • 293 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Studies show that shoplifting is most prevalent among adolescents. Survey results suggest that consumers ' ethical judgments are related to both attitudes toward shoplifting and intentions to shoplift positively, and that highly ethical judgments of shoplifting may represent consumers ' attempts to rationalize the behavior (Babin, Robin, and Pike 1994). Below is my ethical analysis as to whether I should have reported the shoplifting incident or not.…

    • 773 Words
    • 4 Pages
    Improved Essays
  • Brilliant Essays

    Compared to a book source in this bibliography the article is significantly short; however it provides news tips and effectively reiterates similar tips. Overall the goal of this article is to inform readers that cameras are important in theft prevention, therefore, install them properly and do not cut cost that can result in poor quality…

    • 899 Words
    • 4 Pages
    Brilliant Essays