StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Operations Management Practicum - Assignment Example

Cite this document
Summary
This paper "Security Operations Management Practicum" focuses on the adjudicative process which is cross-examination and careful weighing of a person’s correct and reliable information either about his or her past or present life. The adjudicator should thoroughly examine the available information.  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Security Operations Management Practicum
Read Text Preview

Extract of sample "Security Operations Management Practicum"

Security Operations Management PracticumPART 1 Adjudicative process is cross examination and careful weighing of a person’s correct and reliable information either about his or her past or present life (Herbig 12). The adjudicator should thoroughly examine the available information in reaching a determination. The research in this paper explores some case scenarios on how to apply adjudication guidelines to two individuals (Ronald James Smith and Susan Julia Kidwell) requesting access to classified information based on the results of their background investigations.

If I was an adjudicator and considering the investigative report done by the Special Agent, FBI, on Smith Ronald James Smith DPOB: 2/5/1976, I would have not granted her the security clearance request According to the investigative report gathered, the credit agencies had no unfavorable financial information on Smith. He was born in Davenport, Iowa, in 1976, on his security form it; he indicated that he had been arrested in high school over alleged smoking of marijuana. According to guideline regarding drug involvement, drug abuse is a condition that can raise a security concern and thus disqualifies an individual from been granted security clearance.

By definition, drug abuse is the illegal use a drug in a manner that deviates from the correctly approved medical direction. Accordion to the Controlled Substance Act of 1970, Marijuana or Cannabis is classified as an illegal drug (Herbig 12). Further, a review of State Department travel records indicated that Smith had traveled outside the country in four different occasions. However, the date he indicated on his security form regarding his tour to Moscow did not match with the date on indicated in the State Department travel record.

As if that was not enough, on his security form, he failed to indicate his tour to Rome, Italy. In the travel state department it is clearly indicated that he travelled to he traveled to Rome, Italy on September 15, 1988 and returned on October 15, 1988. According to the Guideline E, personal conduct, dishonesty and questionable judgment is a concern that can result to unfavorable action for clearance eligibility (Herbig 12). However, smith could have mitigated the security concerns if in good faith efforts he corrected the falsification of the dates before he was confronted with the facts.

Other the other hand, if I was an adjudicator and considering the investigative report done by the Special Agent, FBI, on Susan Julia Kidwell, DPOB: 7/5/1986, I would have granted her the security clearance request. The aggravating factor that I would consider first is that kidwel profoundly admitted that she owed the credit card debt and after discovering this, she filed for bankruptcy. Moreover, she gives a valid reason for not listing the credit problems or bankruptcy; it was necessitated because she was afraid that she might not get the position which she desperately needed.

Notably, she later cleared all her outstanding debts and she had no current outstanding financial obligations. In line with Guideline F regarding Financial Considerations, if a behavior (financial debt) happens in a circumstance that is unlikely to recur and does not cast doubt on individual’s current reliability, good judgment or trustworthiness, such a condition could lead to mitigating a security concern (Herbig12). Such is a similar case surrounding Susan Julia Kidwell, DPOB: 7/5/1986.PART 2 The Defense Security Service in the administration of the National Industrial Security Program is mandated with many tasks.

They receive and investigate incident reports, assign security representatives, provide valuable on-going oversight, guidance and control. Also, they are mandated with the role of conducting preliminary and annual security reviews. To obtain a facility security clearance, a civilian contractor who has been awarded a classified government contract must first request entry for the private entity. Secondly, twenty, contactor or the firm must have good reputation with undisputed integrity and lawful conduct.

Finally, the contractor should ensure that he or she is not under any foreign influence or control. If my company received a U.S Government contract to design an aircraft prototype that is classified as top secret. As the company Facility Security Officer, I would brief the employees about framework that would be used to supervise and direct security measures. Works CitedHerbig, Katherine L. The Evolution of Adjudicative Guidelines in the Department of Defense. , 2011. Internet resource.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Operations Management Practicum Assignment”, n.d.)
Security Operations Management Practicum Assignment. Retrieved from https://studentshare.org/law/1857060-writers-choice-fahad
(Security Operations Management Practicum Assignment)
Security Operations Management Practicum Assignment. https://studentshare.org/law/1857060-writers-choice-fahad.
“Security Operations Management Practicum Assignment”, n.d. https://studentshare.org/law/1857060-writers-choice-fahad.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Operations Management Practicum

Air Transport Management and Operations

Air Transport management and Operations A dissertation submitted to For the degree of By Candidate's Name 2011 FACULTY OF BUSINESS ADMINISTRATION Copyright Abstract The air transport system has become an essential part of human existence in the present day and age, with the global aviation industry presenting a virtually continuous growth since the Second World War.... Thus, strategic and operational management in the air transport sector now presents complex challenges....
15 Pages (3750 words) Dissertation

Operations security and production controls

The organization that I work for has well defined rules to regulate operational security and production controls.... … The concept of security should encompass both the concepts of physical as well as intangible materials like information which can be orally compromised.... The operational security in the firm is maintained by both uniformed personnel members of the staff who are directly associated with ongoing projects.... One of the most important instructions that the security personnel adhere to, is that access to specific areas of the company is need based rather than designation based....
4 Pages (1000 words) Essay

Information Security Management of BS 7799

This paper "Information Security management of BS 7799" focuses on the fact that BS 7799 is the most influential globally recognised standard for information security management systems around the world.... BS7799, which now has the international number ISO 27001:2005, is the international best practice information security management standard, defining and guiding Information Security management System development.... Part 1 (the original Code of Practice) of the revised BS7799 standard was re-titled "Code of Practice for Information Security management" and provides guidance on best practices in information security management....
6 Pages (1500 words) Case Study

Information Security Managment

It will also help in guaranteeing that all the operations of the organization are protected and would ensure the organization of achievement and change in its execution inside the business and in this manner an ascent in the change and proficiency of an associations operation inside the organization1.... In addition, the likelihood of the of a number of susceptibilities within the company are also effectively addressed so that the operations can take place smoothly5....
20 Pages (5000 words) Essay

Information Security Management

Notably, management of data comprises different activities that include documentation, handling, storage and planning along with analysis that help in preserving high quality and reliable data.... Ineffective management of data might lead to the loss of relevant information, which in turn can affect the overall performance of an organisation (Protiviti Inc, 2013; Sikich, 2003).... In this context, organisations implementing the above discussed data management techniques and tools are recognised to make...
5 Pages (1250 words) Research Paper

Operational Security

Information "Security management Handbook.... The operations security process seeks to analyze information and assess any form of potential threats (Tipton & Krause, 2003).... The bureau has operations Security Provide an example of a law enforcement agency in the United s that has implemented effective operational security (OPSEC) procedures since 9/11?... operations security (OPSEC) is a term that traces its origin from the jargons used in the US military....
2 Pages (500 words) Assignment

Twohands Corporation Network Security Policy

The paper "Twohands Corporation Network Security Policy" states that The security framework in place is subjected to all the users in the system to ensure proper running of the corporation's operations and keeping the potential threats and risks at a bare minimum.... Before the internet was integrated into its operations, its factory had a single computer that managed all the information about the factory likewise to the warehouses.... Most of these operations were remote and had not kept in touch with the growth in information technology....
6 Pages (1500 words) Case Study

Project Management for Security, Facility Managers

Project management demands a distinct set of technical skills such that it must be adoption as a separate function of management, aside of normal business operations management.... … Project management for Security/Facility ManagersIntroductionThis essay paper starts by reviewing the available literature on the discipline of project management today.... In doing this, an assessment of project management as a feasible tool for Project management for Security/Facility ManagersIntroductionThis essay paper starts by reviewing the available literature on the discipline of project management today....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us