Premium Essay

Hanser Security Inc.

In: Business and Management

Submitted By hanser256
Words 1743
Pages 7
RUNNING HEAD: DRAFT REQUEST FOR PROPOSAL 1

Hanser T. Whitfield
Strayer University
Draft Request for Proposal

Government Contract Law 505
Professor Pino
May 5, 2013

RUNNING HEAD: DRAFT REQUEST FOR PROPOSAL 2
Apply the appropriate FAR clauses to meet compliance in contract formulation and award.
In my position of Contracting Officer for the Department of Homeland Security (DHS), a determination has been made that an open bid for Security Guards is needed. The objective of this solicitation of Request for Proposal (RFP) is from, Federal Protective Services (FPS), to contract security guards that will provide security and law enforcement coverage to all Government Security Administration (GSA) owned and operated federal property. Security Guards employed under this contract responsibility include: federal access building control, employee and visitor identification checks, security equipment monitoring and roving patrols of the interior and exterior of federal property. (Congressional Research Service, 2009). The solicitation will require security guards at several GSA building and properties to protect homeland and manage risk to ensure the continuity of our national critical infrastructure, the nation’s federal facilities and their occupants. To ensure further protection of our building and federal employees security guard services will provide other task order that require firearm protection, specific guard post locations, the hours and days of the week each post is to be staffed armed or not there still need to be guards established at each post (Congressional Research Services, 2009). An acquisition team has been assembled to ensure that the proposal and requirements…...

Similar Documents

Premium Essay

Finance 560 Securities Analysis Course Project: Stock Analysis – Cisco Systems, Inc. (Csco)

...Finance 560 Securities Analysis Course Project: Stock Analysis – Cisco Systems, Inc. (CSCO) Company’s Summary Cisco Systems, Inc. designs, manufactures, and sells Internet protocol (IP)-based networking and other products related to the communications and information technology industry worldwide. It offers routers that interconnects public and private IP networks for mobile, data, voice, and video applications; switching products, which provide connectivity to end users, workstations, IP phones, access points, and servers; application networking services; and home networking products, such as adapters, gateways, modems, and home network management software. The company also offers security products comprising span firewall, intrusion prevention, remote access, virtual private network, unified client, Web, and email security and network security products; storage area networking products for data center environments that deliver connectivity between servers and storage systems; collaboration products to integrate voice, video, data, and mobile applications on fixed and mobile networks; video connected home products, including digital video distribution systems and digital interactive set-top boxes; and wireless systems. In addition, it provides optical networking products, Cisco TelePresence systems, Cisco Unified Computing Systems, physical security and video surveillances, and digital media systems. Further, the company offers technical support services; and responsive...

Words: 1105 - Pages: 5

Premium Essay

Global Distribution, Inc (Cdi) Security Policy

...The implementation of security controls for an organization IT security policy is an important task that can have major implications on the operations of an organization as well as the interest of individuals. Security controls are the management, operational, and technical safeguards or countermeasures employed within an organizational information system to protect the confidentiality, integrity, and availability of the system and its information. This paper defines the elements and recommendations for use by the organization in protecting the information systems employed in conjunction with and as part of a well-defined and documented information security policy program. It is of importance that responsible officials understand the risks and other factors that could adversely affect organizational operations and assets, individuals and other organizations. These officials must also understand the current status of their security programs and the security controls plans are in place to protect their information and systems in order to make informed judgments at a an acceptable level. The ultimate objective is to conduct the day-to-day operations of the organization and to accomplish business functions with what Global Distribution, Inc defines as security balanced with limited results from unauthorized access, use, disclosure, disruption, modification, or destruction of information. Global Distribution, Inc (CDI) Security Policy The purpose of this......

Words: 1408 - Pages: 6

Premium Essay

Security

...Michigan Technological University Information Security Plan The Information Security Plan establishes and states the policies governing Michigan Tech’s IT standards and practices. These policies define the University’s objectives for managing operations and controlling activities. These top-level policies represent the plans or protocols for achieving and maintaining internal control over information systems as well as compliance with the requirements imposed on the University. INFORMATION SECURITY PLAN Approval by Information Security Board of Review Members Information Security Plan Rev: 3 – 10/13/2011 Page 1 Information Security Plan Table of Contents 1 2 3 4 5 6 7 8 EXECUTIVE SUMMARY ................................................................................................................. 4 PURPOSE............................................................................................................................................. 4 SCOPE .................................................................................................................................................. 5 DEFINITIONS ..................................................................................................................................... 5 IT GOVERNANCE COMMITMENTS & RESPONSIBILITIES .................................................. 6 UNIVERSITY POLICY STATEMENT .........................................................................................

Words: 10423 - Pages: 42

Free Essay

It Security

...penetration tools that can be used in this scenario to perform a Vulnerability Assessment (VA) are; Backtrack, Core Impact Pro, and Sword&Shield Enterprise Security solutions. Each product provides a number or penetration techniques such as scanning, enumeration, network mapping, packet sniffing, and password cracking. Each product requires a different level of user and/or contractor knowledge to perform the VA. Backtrack is a LINUX distribution that requires the Information Technology (IT) department to install and perform in house testing. This product is very low cost but requires extensive hours to learn and perform testing using the applications provided in this distribution. Backtrack provides the full range of tests; network, mapping, enumeration, sniffing, and cracking. When used in a Microsoft Windows environment can go undetected by most security appliances internal to the network. Backtrack can be used both as an external penetration tool and an internal (client side) vulnerability scanner. Many Hacker tools are built in to Backtrack and additional plugins make this a powerful tool for penetration testing (PENtest). Core Impact Pro (CIP) provides a software solution that automates the penetration testing process. Core can provide technical assistance and/or perform independent PENtest services. (Core Security Technologies. (2011)) CIP provides extensive automated penetration database research and professional VA reports based on preformed tests. Core provides a......

Words: 362 - Pages: 2

Premium Essay

Security

...White Paper IT Security Risk Management By Mark Gerschefske Risk Analysis How do you predict the total cost of a threat? Is it only the cost to restore the comprised system and lost productivity? Or does it include lost revenue, customer confidence, and trust of investors? This paper provides an overview of the risk management process and its benefits. Risk management is a much talked about, but little understood area of the IT Security industry. While risk management has been practiced by other industries for hundreds of years, little historical data exists to support qualitative analysis in the IT environment.1 The industry approach has been to buy technology without really understanding the potential underlying risks. To further complicate matters, new government regulations create additional pressure to ensure sensitive data is protected from compromise and disclosure. Processes need to be developed that not only identify the sensitive data, but also identify the level of risk posed due to noncompliance of corporate security policies. Verizon has developed security procedures based on industry standards that evaluate and mitigate areas deemed not compliant to internal security policies and standards. Through the use of quantitative analysis, Verizon is able to determine areas that present the greatest risk, which allows for identification and prioritization of security investments. Risk Mitigation Process The Risk Mitigation Process (RMP) is a part of risk......

Words: 2021 - Pages: 9

Premium Essay

Security

...Security Students Name Institutions Name How to resolve a security issue in a situation where the need for security is great but the available funds are limited Community participation is a very important aspect in enhancing security. Through the community’s leaders individuals can be sensitized on the need to protect each other and also help them to create a ‘we’ feeling in the management of the important resources in a region. This will enable the community members to identify with the resources and wealth of a region and hence strive to protect it by all means. Governments and administrative officials should also involve the locals in making of decisions that are of utmost importance to the people’s welfare (Bakari, Magnusson, Tarimo, & Yngström, 2006). The benefits if personnel in security management develop skills as educators for their organization's security Having high skilled employees who are given the potential to grow their expertise is a great benefit to any organization. An organizations success can often be attributed to individual expertise and skills of its employees. The benefits are as follows: 1. Cuts on the costs of hiring external consultants; many organizations spend a lot of money in hiring third party consultants to cover essential tasks within the organization such as periodic network vulnerability scans and developing security programs. The cost of sending employees to the requisite training may be relatively cheaper (McCoy &......

Words: 1066 - Pages: 5

Premium Essay

Peachtree Securities, Inc

...Executive Summary Peachtree Securities, Inc. is a 20-year-old regional brokerage house located in Atlanta, GA. Jack Taylor, the firm’s founder and president, has found prosperity by providing quality personal brokerage services to small investors. A recent trend of the firm’s customers is a shift from individual stocks and bonds to mutual funds. Although the number of customers is increasing, the transactions per customer is decreasing, causing sales figures to lag. With the belief that this trend will continue, Taylor has expanded the services his firm offers to include trust and portfolio management. The main customers of trusts for the firm are retirees. They are interested in bonds and high-yield stocks that produce high current income instead of capital gains. The stocks of choice for the firm are in electric utilities. With the cost of research increasing, Taylor decided to hire a security analyst. He hired Laura Donahue in January 1993. Her first task was to conduct a seminar for a group of Peachtree customers on stock investments; she was to include how various securities effect portfolio management. Donahue began by asking herself a few questions that she thought would help the customers understand the stock valuation process and their effects on portfolios1. Case 3: Peachtree Securities, Inc. (A) The Atlanta regional brokerage firm, Peachtree Securities, Inc., has expanded its services to include trusts and portfolio management. To meet the needs of providing...

Words: 3079 - Pages: 13

Premium Essay

Security

...Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization. As noted by the Institute for Security and Open Methodologies (ISECOM) in the OSSTMM 3, security provides "a form of protection where a separation is created between the assets and the threat." These separations are generically called "controls," and sometimes include changes to the asset or the threat.[1] Perception of security may be poorly mapped to measureable objective security. For example, the fear of earthquakes has been reported to be more common than the fear of slipping on the bathroom floor although the latter kills many more people than the former.[2] Similarly, the perceived effectiveness of security measures is sometimes different from the actual security provided by those measures. The presence of security protections may even be taken for security itself. For example, two computer security programs could be interfering with each other and even cancelling each other's effect, while the owner believes s/he is getting double the protection. Security theater is a critical term for deployment of measures primarily aimed at raising subjective security without a genuine or commensurate concern for the effects of that measure on objective security. For example, some consider the screening of airline passengers based on static databases to have been Security Theater and Computer......

Words: 436 - Pages: 2

Premium Essay

Security

...Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Systems Owners Have Security Responsibilities Outside Their Own......

Words: 93588 - Pages: 375

Premium Essay

Peachtree Securities, Inc a

...plots of returns on individual stocks versus returns on the market are called “characteristic lines.” The horizontal plot is the T-bond’s characteristic line, the upward sloping line is TECO’s characteristic line, and the downward sloping line is Gold Hill’s characteristic line. The slope of each line follows: The slope is a measure of the volatility of the stock vis-a-vis the market. Positive slopes mean that the stock goes up when the market goes up, and the greater the slope, the greater the movement of the stock price in response to a given movement in the market. A zero slope indicates that returns on the security are independent of returns on the market, while a negative slope indicates a negative correlation. The slope of the characteristic line is the security’s beta coefficient, which is the measure of its market risk and the key input in the Security Market Line. The distance of the points from the regression line indicates the security’s diversifiable risk—the farther the points from the line, the greater the diversifiable risk. Thus, the T-bonds have no diversifiable risk, TECO’s stock has some diversifiable risk, and Gold Hill’s stock has a great deal of such risk. Question 8 See Figure 3 for a plot of the SML. From Table 1 in the case, we see that the risk-free rate is 8.0 percent and the required return on the market is 15.0 percent. Using Value Line’s beta estimate of 0.6, we find that TECO’s required tate of return is 12.2......

Words: 2607 - Pages: 11

Premium Essay

It Security

...Information Security Policy University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Mark Cherry Date: 03/11/2012 * Table of Contents 1. Executive Summary 1 2. Introduction 1 3. Disaster Recovery Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3 Executive Summary This plan seeks to provide the best security available while keeping cost at a minimum. The security plan will implement the best software available along with other security measures to keep all information as secure as possible. The plan should be able to provide top notch security measures with the least amount of monitoring and maintenance. The plan should be fully active and available in the least amount of time with the least amount of disruption from day to day business. Project constraints will be mostly likely be in the cost sector, this may delay certain implantation of security measures but should not delay......

Words: 2076 - Pages: 9

Free Essay

Securities

...Rule of Law: Securities and Exchange Act of 1934 17 C.F.R. § 240.10b-5 Employment of manipulative and deceptive devices. It shall be unlawful for any person, directly or indirectly, by the use of any means or instrumentality of interstate commerce, or of the mails or of any facility of any national securities exchange,(a) To employ any device, scheme, or artifice to defraud,(b) To make any untrue statement of a material fact or to omit to state a material fact necessary in order to make the statements made, in the light of the circumstances under which they were made, not misleading, or(c) To engage in any act, practice, or course of business which operates or would operate as a fraud or deceit upon any person, in connection with the purchase or sale of any security. SEC v. Antar, 15 F. Supp. 2d 477 (D.N.J. 1998) dealt with whether corporate insiders traded in the securities of his corporation on the basis of material and nonpublic information. The defendants participated in multifaceted fraud schemes for the purpose of artificially inflating the price of stock, selling their substantial stock holdings to an unwitting public, and profiting in excess of $20 million. The court stated that shareholders of a corporation and those insiders who obtain confidential information by reason of their position with the corporation have a relationship of trust and confidence and that trading on such information qualifies as a "deceptive device" under § 10(b). The Securities Act was......

Words: 835 - Pages: 4

Premium Essay

Security

...Security is an intentional process of securing anything from expected jeopardy. It is a condition in result of various protective measures. There are different aspects of security that ranges from personal life to national security. This is a separate department in large managements.   This is a condition that prevents unauthorized information or people from having access to confidential or personal areas. Writing on this subject matter might not be difficult but writing well is surely. It’s not simple to comprehend a professional paper on such a diverse subject. It has various categories and concepts which need to be researched and studied properly to write an ample document.   Our company has been writing security term papers since long and it has experienced writers who know their job very well. Physical security, information security, computing security, financial security, human security or food security, writers at our company are skilled enough to produce highly authentic term papers on any one of these categories of security. No matter how difficult topic you have for your term paper we guarantee you quality in any case.   Writers at our company follow your given specifications keenly to produce desired papers. With us you don’t need to worry about the quality of your term paper because excellence is never compromised at our company. Just place your order with us and experience it yourself.   Services provided by our company include:   ...

Words: 295 - Pages: 2

Premium Essay

Security

...above to submit your assignment. Term Paper: Chief Security Officer Due Week 10 and worth 200 points You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that all information and data assets are not compromised. Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders. Write a 8-10 page paper in which you: Research the Internet for recent computer hacker attacks or other crimes that have been committed against higher educational institutions. Analyze the processes put in place by other higher education institutions in order to prevent these crimes from reoccurring. Recommend processes, methodologies, or technology that can be purchased to lower computer crime threats. Include specifics on pricing and the level of support and maintenance that would be required. Research the Internet for current laws and government agencies that exist in your region that address the threat of computer cyber-crimes. Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your security operations. Research the internet for......

Words: 317 - Pages: 2

Premium Essay

Security

...was ideal for travelers who were leaving and entering the United States. They reiterated that this was essential for national security. Border screening systems were to be consolidated with United States Visitor and Immigrant Status Indicator Technology (Haddal, 2010). This was supposed to streamline border inspections. Legislations were instituted that were geared towards enhancing airline security, visa border security, and maritime security. The Aviation and Security Act of November 2001, the PATRIOTIC Act, and Border Security and Visa Entry Reform Act of May 2002 were geared towards enhancing homeland security (Haddal, 2010). The Homeland Security Act of 2002 merged border and interior enforcement functions of Department of Agriculture, the INS, and the U.S. Customs service to form Directorate of Border and Transportation Security within the Department of Homeland Security (Haddal, 2010). Free sharing of information and resources was made possible between USBP and CBP. The land, rail, and transportation network became secure save for Transport Security Administration. Alternative strategies that can be used to enhance border security can be effective collection, use, and sharing of intelligence by exploiting networked intelligence. This should be done by sharing both biographic and biometric information between the departments of Homeland Security (Willis, Predd, Davis, & Brown, 2010). Unmanned aerial reconnaissance cannot be an alternative to “boots on the ground”...

Words: 668 - Pages: 3