Urgent help needed with these questions related information security ! :) Descri
ID: 3601201 • Letter: U
Question
Urgent help needed with these questions related information security ! :)
Describing a Boundary:
1. Choose a retail store or a public building (Bank, hospital, university, café, registrar office
etc..) provide your assessment of the boundary defined for the location you choose.
2. Describe the three strategies people often use to make security decisions.
3. Describe the six steps in NIST’s risk management framework
4. Describe the four steps in the proprietor’s risk management framework
5. Describe the relationship between assets, boundaries, threat agents, vulnerabilities,
attacks, and defenses.
Explanation / Answer
Q1: Choose a retail store or a public building (Bank, hospital, university, café, registrar office
etc..) provide your assessment of the boundary defined for the location you choose.
ANS:
Store is place, where the shoppers come to buy goods and services. The sales transaction occurs at this junction. Location of retail business has a significant impact on its survival. In fact, selection of the wrong location may lead to business failure.
Thus, before choosing retail store locations, following things are to be kept in mind:
Who are the customers?
What will be the infrastructure?
What products are to be sold?
How much retail space, storage area, or the size of the office will berequired?
Without the answers to these basic questions, it will be difficult to find the perfect location for generating the profit for a retail store.
Store Location
Store is place real or virtual, where the shopper comes to buy goods and services. The sales transaction occurs at this junction. The location of retail store is considered very important in retailing. Retailers desire to set up their outlets in the best possible locations. The optimum store location for a retailer is based on many factors like the type of industry, the product category being sold, and the degree of competition. Retail stores are located where the opportunities offered by the market are at a maximum.
Retailers usually go through four step process to select a store location:
a) Analyzing alternate trade areas;
b) Determining the most beneficial type of location;
c) Selecting a general site and;
d) Selecting a specific site.
Importance of Store Location
Most of the retailers are selling from retail store space. Some of these retailers are very small single-store operators, and some are huge superstore discounters. Each location selected resulted from an effort to satisfy the needs of the particular market each was designed to serve. Many factors together like, customer’s need for convenience, their desire to do comparison-shopping, and the extent of the purchasing power in a market area, of the transportation facilities available etc. led to the development of different kinds of retail locations. There is an old saying that three things determine the value of real estate: location, location, and location. Nowhere is that more the case than with stores. Retail stores should be located where market opportunities are best. After a country, region city or trade area, and neighborhood have been identified as satisfactory; a specific site must be chosen that will best serve the desired target market. Site selection can be the difference between success and failure. A through study of customers and their shopping behavior should be made before a location is chosen. The finest Notes 5 store in the world will not live up to it potential if it is located where customers cannot or will not travel to shop. The primary role of the retail store or center is to attract the shopper to the location. Alternatively, retailers must take the store to where the people are, either at home or in crowds. Examples of taking the store to where the crowds are include airport location, theme parks and vending machines. Every retail store strives for its competitive advantage. For some stores, it is price. For others, it is promotional expertise of the special services that are offered. Despite any differences among the various stores that may be competing for the shopper’s rupees, location offers a unique asset for all stores because once a site is selected; it cannot be occupied by another store. This advantage, however, points to the importance of location analysis and site selection. Once a facility is built, purchased, or leased, the ability to relocate may be restricted for a number of years. In short, location and site selection is one of the most important decisions made by a retail owner. We need to look for ways to optimise this process.
Factors of Retail Location
Population and Potential Customer
Before, choosing a location for the retail store, survey the area thoroughly before making a final decision. Read local newspapers and interact with other small businesses in the area. Details about location demographics such as information on the area’s population, income and age are to be obtained. Once obtained customers are known, then find a location where customers reside, work and shop
. Accessibility, Visibility and Traffic
Retailers want to be located where there are many shoppers but only if that shopper meets the definition of their target market. Small retail stores may benefit from the traffic of nearby larger stores. However, following factors are to be considered in connection with accessibility, visibility and traffic:
How many people walk or drive past the location?
Is the area served by public transportation?
Can customers and delivery trucks easily get in and out of the parking lot? Is there adequate parking facility?
Depending on the type of business, it would be wise to have somewhere between 5 to 8 parking spaces per 1,000 square feet of retail space. When considering visibility, the location should be examined from the customer’s view point. Can the store be seen from the main flow of traffic? Will the signage be easily noticed? In many cases, a retail outlet having better visibility requires less advertising. A specialty retail store located out of town in a free standing building will need more marketing than a shopping store located in a mall.
Location Costs
Besides the base rent, consider all costs involved when choosing a retail store location.
Who pays for lawn and building maintenance, utilities and security?
Who pays for the upkeep and repair of the air-conditioning?
If the location is remote, how much additional marketing will ittake for customers to find you? How much is the average utility bill?
Will you need to make any repairs or remodeling to have the location fit your needs? Will the retailer be responsible for property taxes?
The location you can afford now and what you can afford in the future always varies. It is difficult to create sales projects on a new business, but one way to get help in determining how much rent you can pay is to find out what sales similar retail businesses are making and how much rent they are paying.
Personal Factors
Before planning to work in one’s store, one must think about one’s personality, the distance from the shop to home and other personal considerations. (If he spends much of his time travelling to and from work, the commute may overshadow the exhilaration of being his own boss). Also, many restrictions placed on a tenant by a landlord, Management Company or community can hamper a retailer’s independence.
Special Considerations
Retail shop requires special considerations. Therefore, make a list of any unique characteristic of your business that may need to be addressed.
Will the store require special lighting, fixtures or other hardware installed? Are restrooms for staff and customers available?
Is there adequate fire and security protection for the area?
Is there sanitation service available?
Does the parking lot and building exterior have adequate lighting?
Does the building provides shelter if raining?
Are there restrictions on Sunday sales
Department Stores
These are large scale retail stores selling their products under one roof and offer a variety of goods divided into different departments, each of which specializes in an individual merchandise. Converse is of the opinion that a department store is a retail shop handling several classes of goods including fast moving consumer goods, each class being separated from others in management, accounting and location. It is viewed by Clarke as that type of retail institution which handle a wide variety of merchandise under one roof which are grouped into well-defined departments which is centrally controlled and which caters primarily to women shopper
Characteristic Features of Department Stores
The chief features of these stores are:
Location of Department Stores
The success of a department store depends much on its location, availability of space, the area and community to be served and ability to attract customers are the important factors to be considered before establishing a store at a particular place. Special Consideration should be given to accommodation so as to allow every possible amusement facilities. Considerable space should also be allotted for show room displaying stores merchandise.
Q(2):Describe the three strategies people often use to make security decisions.
There are three strategies according to the author that people often use to make security decisions when it comes to computing.
The first is the rule based decisions which include external circumstances that are widely accepted. The book illustrates car ignition locks, and further examples provided by myself would be pins on debit cards.
The second strategy is the relativistic decision. These are used by staying ahead of the power curb or those attempting to access that which you want to be left secure. The example used is the Hunter’s Dilemma. You are chased by a bear and will not out run it. You are hunting with companions and realistically must only be faster than the slowest person to survive (or sabotage them, not nice). This idea keeps in mind that you may not need top of the line goods, just good enough.
The third and final strategy is the rational decisions. In order to implement these you must use a systematic analysis of the security situation. This involves a six step process; 1. Identify your assets.
2. Analyze the risk of attack.
3. Establish your security policy.
4. Implement your defences
. 5. Monitor your defenses.
6. Recover from attacks.
Q(3):Describe the six steps in NIST’s risk management framework
To sum up, the Risk Management Framework (RMF) is most commonly associated with the NIST SP 800-37 guide “Guide for Applying the Risk Management Framework to Federal Information Systems.
The RMF is a six-step process as illustrated below:
STEP 1. CATEGORIZE INFORMATION SYSTEMS
This step is all administrative and involves gaining an understanding of the organization. Prior to categorizing a system, the system boundary should be defined. Based on that system boundary, all information types associated with the system can and should be identified. Information about the organization and its mission, its roles and responsibilities, as well as the system’s operating environment, intended use and connections with other systems may affect the final security impact level determined for the information system.
STEP 2. SELECT SECURITY CONTROLS
Security controls are the management, operational, and technical safeguards or countermeasures employed within an organizational information system that protect the confidentiality, integrity, and availability of the system and its information. Assurance is the grounds for confidence that the security controls implemented within an information system are effective in their application.
STEP 3. IMPLEMENT SECURITY CONTROLS
Step 3 requires an organization to implement security controls and describe how the controls are employed within the information system and its environment of operation. Policies should be tailored to each device to align with the required security documentation.
STEP 4. ASSESS SECURITY CONTROLS
To assess the security controls requires using appropriate assessment procedures to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.
STEP 5. AUTHORIZE INFORMATION SYSTEM
The authorize information system operation is based on a determination of the risk to organizational operations and individuals, assets, other organizations, and the nation resulting from the operation of the information system and the decision that this risk is acceptable.
Use reporting is designed to work with POA&M (Plan of Action & Milestones). This provides the tracking and status for any failed controls.
STEP 6. MONITOR SECURITY CONTROLS
Continuous monitoring programs allow an organization to maintain the security authorization of an information system over time in a highly dynamic operating environment where systems adapt to changing threats, vulnerabilities, technologies, and mission/business processes. While the use of automated support tools is not required, risk management can become near real-time through the use of automated tools. This will help with configuration drift and other potential security incidents associated with unexpected change on different core components and their configurations, as well as providing ATO (Authorization to Operate) standard reporting.
.
Q(4) Describe the four steps in the proprietor’s risk management framework
Establish system and security goals: Identify the system’s goals, security risks, andrequirements. We perform a risk assessment and use it to produce a list of security requirements.
Select security controls: identify existing controls and additional ones required, and constructthe system containing the controls. We use the security requirements to identify the controls we require.
Validate the information: verify that the controls work as required, approve the system for operation, and deploy it. We test the system’s controls against the security requirements to ensurethat we address our risks.
Monitor security controls: watch for security incidents and address them; also review the environment for changes that affect security. The system must contain security controls that keep records of security-relevant operations and incidents.
Q5. Describe the relationship between assets, boundaries, threat agents, vulnerabilities,attacks, and defenses.
ANS: Assets are protected by a boundary Openings in the boundary are vulnerabilities. A threat agent or attacker tries to attack assetsA defense, safeguard, or countermeasure protects the assets
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.