CJS 250 Syllabus 10-09

23
Course Syllabus CJS250 Introduction To Security Course Start Date: 09/20/2010 Course End Date: 11/21/2010 Please print a copy of this syllabus for handy reference. Whenever there is a question about what assignments are due, please remember this syllabus is considered the ruling document. Copyright Copyright ©2009 by University of Phoenix. All rights reserved. University of Phoenix© is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft©, Windows©, and Windows NT© are registered trademarks of Microsoft Corporation in the

Transcript of CJS 250 Syllabus 10-09

Page 1: CJS 250 Syllabus 10-09

Course SyllabusCJS250Introduction To Security

Course Start Date: 09/20/2010Course End Date: 11/21/2010

 

 

 

 

 

 

 

 

 

Please print a copy of this syllabus for handy reference.

Whenever there is a question about what assignments are due, please remember this syllabus is considered the ruling document.

Copyright

Copyright ©2009 by University of Phoenix. All rights reserved.

University of Phoenix© is a registered trademark of Apollo Group, Inc. in the United States and/or other countries.

Microsoft©, Windows©, and Windows NT© are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation.

Edited in accordance with University of Phoenix© editorial standards and practices.

Page 2: CJS 250 Syllabus 10-09

Facilitator   Information                                                                                                                                                                                                            

Richard S. Teresi [email protected] (University of Phoenix)[email protected] (Personal)773-671-7424 (Central)

Facilitator Availability

I am available from 9 a.m.-9 p.m. Central Time on most days, but I attempt to reserve Sunday for my family. During the week, I am online most of the time during that 9 a.m.-9 p.m. time frame.

On Saturdays, I tend to be online in the morning only. If these times are not convenient for you, please let me know. I will be happy to accommodate your schedule, if possible. I provide you with these times to make it easier to communicate with me, and not to limit our contact.

I want you to know that, should you need to contact me outside these time frames, you should not hesitate to do so.

For emergencies, when you are not able to gain access to messages on the Online Learning System (OLS), please send a message to my personal email address. In the event a third party needs to contact me, please direct them to my contact information listed under "facilitator information." No third party should use your login credentials to gain access to the classroom.

Where to Go to Class                                                                                                                                                                                                              

Main: This is the main forum for the class and is where discussion is conducted. It has read-and-write access for everyone.

Chat-Room: This is a read-and-write access forum. It is designed as a place to discuss issues not related to the course content. This is the forum to which we will send our bios.

Course-Materials: This is a read-only forum, which means you can read messages here but cannot send any. This is where I will post the course syllabus and materials.

Individual Forum: You will see one forum with your name on it. This is a private forum, shared only by you and me, the facilitator. Your classmates will not have access to this forum. This is where you will post your individual assignments, and where I will post your feedback. You can also ask questions here. However, if you have general questions about instructions of assignments, please post those in the Main forum, since other students may benefit by that exchange as well.

Policies                                                                                                                                                                                                                                                          

For class policies, please see the Policies link on the left side of the Materials page for the course on eCampus. Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within that link. University policies are subject to change so please be sure to read them at the beginning of each class as it may have changed since your last class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities it is important you read the policies governing your current class modality.

Technical Support                                                                                                                                                                                                                      

Technical Support is available 24 hours a day, 365 days a year. Call 1-877-832-4867, or use the e-mail support form.

Page 3: CJS 250 Syllabus 10-09

Answers to the most common issues are found in the Knowledge Base by clicking Help, found at the top of every student Web site.

Feedback                                                                                                                                                                                                                                                    

Each week, I will provide grades or scores and comments on your assignments. I will send feedback to your Individual forum.

Grading Formula

Points Grade

95+ A

90-94 A-

87-89 B+

84-86 B

80-83 B-

77-79 C+

74-76 C

70-73 C-

67-69 D+

64-66 D

60-63 D-

<59 F

Course Description

See eCampus.

Course Topics & Objectives                                                                                                                                                                                      

See eCampus.

Course Materials

See eCampus.

Page 4: CJS 250 Syllabus 10-09

Point Values for Course Assignments                                                                           

ASSIGNMENTS Points

Individual (100%)  

Check Point: Historical Laws and Security (Week 1) 30

Assignment: Biography of Allan Pinkerton (Week 1) 100

Check Point: Threat and Risk Assessment (Week 2) 30

Check Point: Risk Management (Week 3) 20

Exercise: Interview Scheduling (Week 3) 10

Assignment: Security Objective Components (Week 3) 100

Check Point: Models of Physical Security (Week 4) 30

Check Point: Evaluating Safe Working Conditions (Week 5)

25

Check Point: Floor Plan (Week 5) 25

Assignment: Security Manager Interview (Week 5) 100

Check Point: Security Assessment (Week 6) 25

 Check Point: Public Relations and Professionalism (Week 7)

25

 Assignment: Relationship between Private and Public Police (Week 7)

100

 Check Point: Law and Legal Issues  25

 Check Point: Capstone  25

Final Project: The Security Plan   250

Discussion and Participation (20 points per week) 80

Total 1000

Page 5: CJS 250 Syllabus 10-09

Week One

History of Private Security

Explain the development of laws to protect citizenry. Recognize the impact of Allan Pinkerton. Describe the overlap between public and private security.

Course Assignments

1. Course Preparation

Read the course description and objectives. Read the facilitator’s biography and post your own.

2. Readings

Read Appendix A. Read Ch. 1 in Identifying and Exploring Security Essentials. Read this week’s Electronic Reserve Readings.

3. CheckPoint: Historical Laws and Security

Write a brief description in your own words of the following laws, including where and when each law originated:

o The Code of Hammurabi o Draco’s law o Law of the Twelve Tables o Justinian Code o Magna Carta o Statute of Westminster

Answer the following questions:

o How have these laws led to the historical development of security forces, both private and public?

o Why do you think the need for both private and public security still exists?

4. Assignment: Biography of Allan Pinkerton

No study of the private security industry would be complete without mention of Allan Pinkerton and the Pinkerton Detective Agency. Pinkerton made many contributions both to private security and to national law enforcement, and the Pinkerton Detective Agency was the forerunner to modern private security and detective agencies.

Write a 500- to 700-word biography of Allan Pinkerton focusing on the overlap between private and public security in the career of Pinkerton and the development of the Pinkerton Detective Agency. Include the following:

o A history of Pinkerton’s career as a law enforcement official o The major events involving the Pinkerton Detective Agency during Pinkerton’s lifetime

Page 6: CJS 250 Syllabus 10-09

o The impact of the Agency’s innovations on law enforcement and the private security industry

Format your paper according to APA guidelines. Cite at least three sources. Post your paper as an attachment.

Weekly Reminders

Discussion Questions

Discussion question responses will count towards the class participation requirement.

Only posts in the Main classroom forum will count towards your class participation score.

Summary of Week 1 Deliverables

Assignment Location Due

Enter assignment in this rowEnter forum name where assignment will be posted in this row

Enter day due in this row

 CheckPoint: Historical Laws and Security

 Personal  Day 4

 Assignment: Biography of Allan Pinkerton

 Personal  Day 7

Page 7: CJS 250 Syllabus 10-09

Week Two

Security Basics

Recognize security as an ongoing process. Differentiate between threats and risk. Recognize vulnerability gaps. Propose countermeasures for specific threats.

Course Assignments

1. Readings

Read Ch. 2–4 in Identifying and Exploring Security Essentials. Read this week’s Electronic Reserve Readings.

2. CheckPoint: Threat and Risk Assessment

Review Ch. 3 of the text. Complete Appendix B.

3. Discussion Questions

Consider the definition of security given on pp. 71–72 of the text. Can any target environment ever be perfectly stable or predictable? Why or why not? Why does the author stress that security efforts for any target environment are a “never-ending process” and that security objectives change over time? How can complacency pose a problem for security professionals?

Consider several locations—private or public, residential or commercial—you are currently familiar with. Do any of these places have what you would consider obvious vulnerability gaps? Briefly explain. What steps would you take to address these vulnerabilities?

Weekly Reminders

Discussion Questions

Discussion question responses will count towards the class participation requirement.

Only posts in the Main classroom forum will count towards your class participation score.

Page 8: CJS 250 Syllabus 10-09

Summary of Week 2 Deliverables

Assignment Location Due

Enter assignment in this rowEnter forum name where assignment will be posted in this row

Enter day due in this row

DQ 1  Main  Day 2

DQ 2  Main  Day 4

 CheckPoint: Threat and Risk Assessment

 Personal  Day 5

Page 9: CJS 250 Syllabus 10-09

Week Three

Security as a System and an Objective

Identify types of risk management options. Identify the five components of the overall security objective.

Course Assignments

1. CheckPoint: Risk Management

Read the Risk Management scenario presented in Appendix C. Complete the table in Part I. Answer the questions in Part II.

2. Exercise: Interview Scheduling

Contact a manager or security personnel and schedule a meeting for an interview to be completed by Week Five.

Post the name and title of the person you plan to interview with the date and time of the interview as a message to your facilitator.

3. Assignment: Security Objective Components

Read the article on p. 109 and review pp. 113–115 of the text. Address the following points in a 700- to 1,050-word response:

o What component of the overall security objective deserves the most attention in the environments mentioned in the article? What components would be less pertinent for these particular environments during a vulnerability assessment? Why?

o Relative to the primary component you chose above, what are some countermeasures or possible solutions for the shootings, incidences of arson, and bombing?

o What components of the overall security objective would be more pertinent had these events occurred at a mall? Would these components present alternative countermeasures or solutions to those you have already listed? Explain your answers.

Cite two sources other than the text. Format your paper according to APA guidelines. Post your paper as an attachment.

Weekly Reminders

Discussion Questions

Discussion question responses will count towards the class participation requirement.

Only posts in the Main classroom forum will count towards your class participation score.

Page 10: CJS 250 Syllabus 10-09

Summary of Week 3 Deliverables

Assignment Location Due

Enter assignment in this rowEnter forum name where assignment will be posted in this row

Enter day due in this row

 CheckPoint: Risk Management  Personal  Day 4

 Exercise: Interview Scheduling  Personal  Day 4

 Assignment: Security Objective Components

 Personal  Day 7

Page 11: CJS 250 Syllabus 10-09

Week Four

Physical Security

Describe the three models of physical security. Assess the effectiveness of physical security features in a target environment. Discuss the use of technology in physical security.

Course Assignments

1. Readings

Read Ch. 5 & 7 in Identifying and Exploring Security Essentials. Read this week’s Electronic Reserve Readings.

2. CheckPoint: Models of Physical Security

Complete Appendix D.

3. Discussion Questions

What are the most common features of physical security? What are the least common? How can extant features of a target environment be adapted for security purposes (such as for detection or asset protection)? Provide specific examples.

While it may be ideal for security planners to utilize or install the latest technology, it may not always be practical. How can a security professional balance limitations such as budget or space with the need to keep abreast of the latest industry technology and trends? How much technological knowledge should security professionals have? How broad or detailed should that knowledge be?

Weekly Reminders

Discussion Questions

Discussion question responses will count towards the class participation requirement.

Only posts in the Main classroom forum will count towards your class participation score.

Page 12: CJS 250 Syllabus 10-09

Summary of Week 4 Deliverables

Assignment Location Due

Enter assignment in this rowEnter forum name where assignment will be posted in this row

Enter day due in this row

 DQ 1  Main  Day 2

 DQ 2  Main  Day 4

 CheckPoint: Models of Physical Security

 Personal  Day 5

Page 13: CJS 250 Syllabus 10-09

Week Five

Personnel and Security Management

Explain the role of policies and procedures in security management. Evaluate safe working conditions. Describe the responsibilities of security managers.

Course Assignments

1. CheckPoint: Evaluating Safe Working Conditions

Read the summaries in Appendix E. Answer the questions following each summary in 100 words or more. Post as an attachment.

2. CheckPoint: Floor Plan

Create a description of the target environment to be used for your final project. The environment can be imaginary or real, but the description must include the following:

o The title, purpose, or function of the environment (“Bank,” for example, or “Convenience Store”)

o A basic floor plan o The current security features in place

3. Assignment: Security Manager Interview

Interview a manager of security personnel.

Use the questionnaire provided in Appendix F to record responses in detail. Space has been provided for additional questions, but be sure to record any additional questions as well as the responses.

Complete Part II once all answers have been recorded.

Weekly Reminders

Discussion Questions

Discussion question responses will count towards the class participation requirement.

Only posts in the Main classroom forum will count towards your class participation score.

Page 14: CJS 250 Syllabus 10-09

Summary of Week 5 Deliverables

Assignment Location Due

Enter assignment in this rowEnter forum name where assignment will be posted in this row

Enter day due in this row

 CheckPoint: Evaluating Safe Working Conditions

Personal  Day 4

 CheckPoint: Floor plan Personal  Day 5

 Assignment: Security Manager Interview

Personal  Day 7

Page 15: CJS 250 Syllabus 10-09

Week Six

Integration and Target Environments

Discuss the implications of security component integration. Compare and contrast security considerations for different environments. Assess security in specific settings.

Course Assignments

1. Readings

Read Ch. 8–10 in Identifying and Exploring Security Essentials. Read this week’s Electronic Reserve Readings.

2. CheckPoint: Security Assessment

Choose two of the four settings from Ch. 9 and carefully review the accompanying summaries, bullet points, and floor plans.

Complete a security assessment for each setting using Appendix G. Provide at least two countermeasures specific to physical security and one countermeasure

specific to personnel or security management for each setting. Explain your choices.

3. Discussion Questions

Read the section on the Walt Disney Corporation’s security operations in Orlando on pp. 206–209 of the text. How are the Walt Disney Corporation’s security operations integrated into the overall business operations? How are non-security personnel and environmental features used for security purposes and how do security personnel contribute to the overall mission of the business operations? Why is the integration of individual security components into the overall security design and the overall business mission important?

Knowing that environment is important for security, what security factors would you consider for two rival high school football teams that are set to play in two weeks on a Friday evening? How would these considerations alter for an apartment building that had experienced a rash of burglaries? Explain you answers.

Weekly Reminders

Discussion Questions

Discussion question responses will count towards the class participation requirement.

Only posts in the Main classroom forum will count towards your class participation score.

Page 16: CJS 250 Syllabus 10-09

Summary of Week 6 Deliverables

Assignment Location Due

Enter assignment in this row

Enter forum name where assignment will be posted in this row

Enter day due in this row

 DQ 1  Main  Day 2

 DQ 2  Main  Day 4

 CheckPoint: Security Assessment

 Personal  Day 5

Page 17: CJS 250 Syllabus 10-09

Week Seven

Private Security and Law Enforcement

Examine the relationship between private and public police. Compare and contrast private and public space. Explain the role of public relations and professionalism in the security industry.

Course Assignments

1. CheckPoint: Public Relations and Professionalism

Resource: “The Private Arm of the Law” article at http://www.washingtonpost.com/wp-dyn/content/article/2007/01/01/AR2007010100665.html

Write a 250- to 300-word response discussing the public relations image and professionalism of the private security industry. What are some examples from the article concerning the importance of private security industry members having the same level of professionalism as public law enforcement officers? How can a negative image impact the security of a community? How can this image be improved?

2. Assignment: Relationship Between Private and Public Police

Write a 750- to 1,050-word paper discussing the relationship between private and public police. Is this relationship positive or negative? Provide specific examples to support your opinion.

Discuss how the conflict regarding the definition of public and private space influences the relationship between private and public police.

Suggest ways this relationship can be maintained or improved.

Cite at least three sources other than the text.

Format your paper according to APA guidelines.

Post your paper as an attachment.

Weekly Reminders

Discussion Questions

Discussion question responses will count towards the class participation requirement.

Only posts in the Main classroom forum will count towards your class participation score.

Page 18: CJS 250 Syllabus 10-09

Summary of Week 7 Deliverables

Assignment Location Due

Enter assignment in this rowEnter forum name where assignment will be posted in this row

Enter day due in this row

 CheckPoint: Public Relations and Professionalism

 Personal  Day 4

 Assignment: Relationship between Private and Public Police

 Personal  Day 7

Page 19: CJS 250 Syllabus 10-09

Week Eight

Legal and Liability Issues

Distinguish between criminal, civil, and administrative law. Describe the range and limitations of criminal procedure for the security professional. Explain tort law. Discuss the role of personnel in emergency response plans.

Course Assignments

1. Readings

Read Ch. 11 & 12 in Identifying and Exploring Security Essentials. Read this week’s Electronic Reserve Readings.

2. CheckPoint: Law and Legal Issues

Imagine you are responsible for training newly-hired security personnel. You must deliver a presentation to the new recruits on criminal procedure and legal issues as they pertain to security professionals.

Create a 5- to 7-slide Microsoft® PowerPoint®

presentation on law and legal issues as they apply specifically to private security professionals.

Outline the basic organization of law (criminal, civil, and administrative). Explain basic crime classifications. Define the two types of tort law, particularly as they impact security professionals. Provide detailed speaker’s notes.

3. Discussion Questions

Security professionals have similar functions and duties as the police but do not share the same level of authority in criminal procedure. What are the differences between private and public police in their level of authority? What are the limitations security professionals must recognize?

What role should non-security personnel play in an emergency plan and disaster response? Should these roles be included in a procedures manual? Why or why not? How can a company or organization balance safety and liability issues with the use of non-security personnel during a disaster or emergency? Explain your answer.

Weekly Reminders

Discussion Questions

Discussion question responses will count towards the class participation requirement.

Only posts in the Main classroom forum will count towards your class participation score.

Page 20: CJS 250 Syllabus 10-09

Summary of Week 8 Deliverables

Assignment Location Due

Enter assignment in this rowEnter forum name where assignment will be posted in this row

Enter day due in this row

 DQ 1  Main  Day 2

 DQ 2  Main  Day 4

 CheckPoint: Law and Legal Issues

 Personal  Day 5

Page 21: CJS 250 Syllabus 10-09

Week Nine

The Security Plan

Prepare an integrated security plan for a specific target environment.

Course Assignments

1. Capstone CheckPoint

Each target environment has unique security needs and offers security professionals distinct challenges and opportunities. In a 200- to 300-word response, answer the following questions:

o Why is it important for a security professional to know specifics about the particular target environment to which they are assigned?

o How can experienced security professionals prepare themselves for challenges and opportunities they have never encountered before?

o Is it possible that experience with only one type of environment can actually be a drawback for security professionals approaching a new environment? If so, how?

2. Final Project: The Security Plan

Create a 1,400- to 1,750-word comprehensive security plan for the target environment you submitted in Week Five. In your plan, include the following items:

o The floor plan of the target environment o A list of threats o A risk assessment for each threat o Current vulnerability gaps o Countermeasures that take each of the following components of the overall security

objective into account:

Physical security Information security Personnel security Liability issues Departmental dependencies

o Emergency plan and disaster response for the following:

Bomb threat Fire

o A summary justifying each of your choices as well as the overall design

Reference the text and at least two other sources.

Weekly Reminders

Discussion Questions

Page 22: CJS 250 Syllabus 10-09

Discussion question responses will count towards the class participation requirement.

Only posts in the Main classroom forum will count towards your class participation score.

Summary of Week 9 Deliverables

Assignment Location Due

Enter assignment in this row

Enter forum name where assignment will be posted in this row

Enter day due in this row

 Capstone CheckPoint  Personal  Day 4

 Final Project: The Security Plan

 Personal  Day 7