Vulnerability Assessment – Swift Service Company
A vulnerability assessment is basically a systematic method of identifying areas in a system that are or could be used to an attacker’s advantage. This paper presents the case of Swift Service Company, a company that has been operating as a mid-sized company dealing in services such as logistics and transportation. Serving various customer segments with a wide range of automobiles and backed up by strong IT environments, it is critical to protect tangible and intangible assets. This vulnerability assessment seeks to identify potential gaps in the business organization’s operations, particularly in natural surveillance, territoriality, access control, and maintenance measures in order to improve security in Swift Service Company (Steventon, 2011). Such procedures are a prerequisite of the four principal strategies used in crime prevention through environmental design.
Natural Surveillance
Natural surveillance at Swift Service Company involves measures put in place to maximize the perceived ease of observation with regard to specific areas in order to discourage any unauthorized persons from accessing such areas and to facilitate the observation of these areas by security personnel. This, in turn, creates a situation where probable attackers feel uncomfortable and, thus, do not venture into executing attacks (Fennelly & Perry, 2017).
Visibility of Critical Systems and Infrastructure
Key IT components such as servers, network equipment, and other vital IT parts are sited in areas visible to the staff. The critical systems should not be located in concealed or obscure regions as this creates blind spots, which hinders the monitoring of suspicious activities (Coe, 2005). By placing these assets in more conspicuous locations, the staff are in a better position to identify any suspicious activity or attempts.
Monitoring of User Activity
Swift Service Company has implemented effective logging and monitoring solutions. These tools help the organization monitor access and the usage of systems, networks, and applications by the users. Since users’ activities are closely observed, it is likely that security personnel would quickly identify some irregularities in activities that could be a sign that a vulnerability is being exploited or that malware is active, among other things. This way, there is early identification of threats, and an effective response is launched to avert them.
Visibility of Entry and Exit Points
Another aspect of natural surveillance that is examined concerns various access points, including hallways, doors, and stairwells of the secure areas that are visible to the workers in the facility. Again, areas of obscurity and/or limited vision must be kept to a minimum for optimal sight-line control across the IT terrain. This makes it possible for employees to see who is accessing and who is leaving the restricted areas, and also see who is loitering around the areas they are unauthorized to access. It can also challenge potential invaders and respond to compromising conditions as soon as possible because of the presence of visibility.
Territorial Reinforcement
Territorial reinforcement is a key principle of Crime Prevention Through Environmental Design (CPTED) that creates a feeling of possession and protection of a certain area to discourage people with ill intentions (Steventon, 2011). Territorial reinforcement at Swift Service Company provides object clarifications of whose territory belongs to whom, and this way, controls the organization’s premises.
Clearly Defined Physical Boundaries
In some restricted areas, the company uses fences, locked doors, walls, and other structures to prevent physical access. The company also has signs showing restricted areas and conveying that those areas are well-monitored, private areas (Environmental & Guidebook, n.d.). In the design of the Swift Service Company layout, physical barriers such as doors and gates are used, meaning that the management communicates that intrusion is prohibited. These boundaries reduce the accessibility to the intruders if the territorial control is made evident.
Personalization of Workspaces
The subordinate staff are allowed to adapt or bring personal items into their working environment. If employees engage with the area assigned to them and emotionally own the place, there will be a stronger impulse. This makes it easier for the monitoring agency to easily note the presence of individuals who are not supposed to be in that particular area.
Secure Storage of Sensitive Materials
Documents, media, and other equipment belonging to Swift Service Company are properly secured by being stored in locked cabinets and safe or exclusively secured storage rooms. Since these are sensitive documents, and storage areas are marked ‘Private’ and ‘Do Not Enter’, the organization makes sure that no one touches what is in there. This controlled ownership of the space and its contents still deters potential attackers from trying to intrude more into the organization’s security perimeter.
Access Control
Access control at Swift Service Company is a critical security measure that regulates who has the right to enter a physical space or access digital resources. The access control in place protects the company’s systems, data, and infrastructure from unauthorized access and potential threats (Jajoriya et al., 2023).
Strict Authentication Requirements
Swift Service Company requires users and employees to provide strong, complex passwords, as well as leverage additional security controls like multi-factor authentication (MFA). MFA introduces another level of authentication, for instance, by entering a code that is delivered once to a user’s mobile device to ensure the user is who they portray to be online. This lowers the risks of unauthorized access, even if login credentials are compromised.
Granular Access Privileges
At Swift Service Company, the principle of least privilege holds. This means that all users are provided with the lowest level of privilege they need to conduct their business and not the highest or global privilege. Additionally, avoiding giving many administrative rights while disintegrating duties is a mechanism that keeps off privileges that may be exploited.
Visitor Management Procedures
There are standard procedures in place for visitor management to control access to secure areas within the company. There is a formal process for registering, escorting, and monitoring visitors. Everyone should be able to distinguish visitors; for instance, visitors should wear visitor IDs and should only have the right to access certain areas and items in the organization.
Maintenance
At Swift Service Company, regular maintenance is done to ensure the continuous effectiveness of security controls. This helps prevent vulnerabilities from developing over time. Key maintenance tasks assessed are as follows:
Patch Management
The IT team ensures all the software and systems are patched with the latest secure versions. The absence of patches implies that basic weaknesses in the systems can be pointed out by incoming attackers seeking to obtain unauthorized access. The patch management is comprehensive to routinely scan for the missing patches and prioritize the most important patches.
Configuration Management
Swift Service Company consistently secures configurations across systems. Configuration management is put in place to detail how secure configurations will be implemented and enforced on all the systems, applications, and network devices.
Backup and Recovery
The company has implemented effective backup plans. The backup plans are meant to protect against data loss and enable quick recovery if a security incident, system failure, or other disaster occurs. Backup reliability is regularly checked. The system is backed up, and tests are conducted to ensure they can be recovered when necessary.
References
Coe, M. (2005). CPTED Audit & Site Assessment Checklists. 1–13. https://www.cmap.illinois.gov/documents/10180/113513/CPTED-Audit-Checklist.pdf/8adf9ae4-1649-41ed-88ca-39c3dff3d2fb
Environmental, T., & Guidebook, D. (n.d.). VISIO We work in partnership.
Fennelly, L. J., & Perry, M. A. (2017). Crime and crime prevention techniques. In Physical Security: 150 Things You Should Know (pp. 97–113). Elsevier. https://doi.org/10.1016/b978-0-12-809487-7.00003-6
Jajoriya, S., Singh, P., Shubham Jajoriya, A., & Singh, A. P. (2023). Natural surveillance and natural access control: Implementation strategies for enhancing safety in Indian neighborhoods. Qeios, 1–12. https://doi.org/10.32388/43TW5L.2
Steventon, G. (2011). Crime prevention through environmental design. International Encyclopedia of Housing and Home, 280–284. https://doi.org/10.1016/B978-0-08-047163-1.00559-2
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area, make sure you inform the Security Manager to get permission for what you are doing. If you live in a gated community, inform the security guard of your activities.
Vulnerability Assessment – Swift Service Company
Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).
For this assignment, the 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once complete, name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and submit to this dropbox.
Review the Risk Management Series Reference Manual from FEMA and the additional files attached for more information.