Megan Thrash
Project Objective
To conduct a comprehensive assessment of the current security infrastructure at each building on the university campus, identify vulnerabilities and security gaps, and provide detailed recommendations for improvements, including cost analysis.
Project Scope
Site Survey:
Physical inspection of each building on campus.
Documentation of existing security systems:
Access control systems (ACS)
Video surveillance systems (VSS)
Intrusion detection systems (IDS)
Fire alarm systems
Emergency notification systems
Security Risk Assessment:
Identify potential security threats and vulnerabilities.
Evaluate the effectiveness of current security measures.
Assess compliance with industry standards and regulations.
Gap Analysis:
Compare the current security infrastructure to industry best practices and university security policies.
Identify areas where improvements are needed.
Cost Analysis:
Develop detailed cost estimates for recommended security upgrades.
Consider factors such as equipment costs, installation costs, maintenance costs, and ongoing operational costs.
Report Generation:
Prepare a comprehensive report detailing the findings of the assessment.
Include recommendations for security improvements, cost analysis, and implementation timelines.
Presentation:
Present the findings and recommendations to university administration and relevant stakeholders.
Project Deliverables
Site Survey Report:
Detailed documentation of the current security infrastructure at each building.
Inventory of existing security equipment and systems.
Identification of any physical security vulnerabilities.
Security Risk Assessment Report:
Assessment of potential threats and risks.
Evaluation of the effectiveness of current security measures.
Identification of critical security controls.
Gap Analysis Report:
Comparison of the current security infrastructure to industry best practices.
Identification of security gaps and vulnerabilities.
Security Improvement Recommendations:
Detailed recommendations for security upgrades and enhancements.
Justification for each recommendation based on identified security risks and vulnerabilities.
Cost Analysis Report:
Detailed cost estimates for recommended security improvements.
Breakdown of costs by project phase and building.
Final Report:
Comprehensive report summarizing the findings of the assessment and recommendations.
Includes executive summary, site survey findings, security risk assessment, gap analysis, security improvement recommendations, and cost analysis.