Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Running Head Vulnerability Assessment Model - 595 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

Running head: VULNERABILITY ASSESSMENT MODEL Vulnerability Assessment Model August 14, 2009 Vulnerability Assessment Model Before making decision concerning pros and cons of contract versus proprietary security services, it is crucial to understand the basic distinctions between these two types of operations. Contract security services are usually provided by a professional security company contracting its services to a company. In this case the facility would contract with security company for specific security services. Proprietary security operations are in-house security services that are controlled entirely by the organization that establishes security for its operations. In this case the facility hires a CSO (chief security officer) and all necessary employees and equipment to operate a security department within the faculty. It is quite difficult to conclude which type of services would work better for this specific faculty, as both services have their own pros and cons that should not be underestimated.

The main advantages of contract services for the faculty mostly involve such aspects like cost, administration, staffing, unions, impartiality and expertise. In most cases, contract guards are less expensive than a proprietary security guard service, as proprietary guards earn more due to general wage rate of the facility that employs them. Proprietary security guards are typically receive more fringe benefits, and the facility employing them has less savings in costs of hiring, training, payroll taxes, equipment, uniform, and liability insurance. In-house security service also requires from the facility to develop and administer a recruitment program, training programs, personnel screening programs, etc (Broder, 2006). It also implies the direct supervision of security personnel.

At the same time, contract security services solve such problems as scheduling and substituting manpower during the guards sick leave or employment termination. Proprietary security services also less flexible in staffing compared to the contract ones. Also, contract security services more effectively and more readily enforce regulations compared to proprietary services, as they are paid by different employer. At the same time, the advantages of proprietary security services mostly relate to such factors like quality of personnel, control, loyalty and prestige (Fischer & Green, 2003). As proprietary security services have higher fringe benefits and higher pay, this attracts higher-quality personnel which are more likely to show a lower rate of turnover and are more carefully screened. Therefore, while making decision concerning the choice between these two services, the facility should take into consideration the specific aspects, advantages and disadvantages of using each service to make better decision.

The Vulnerability Assessment Model should also be applied to the facility to decide whether proprietary or contract guard services is the way to go. Under this model, it is important to take into consideration characterization of the facility, including its missions and objectives, identification and prioritization of possible adverse consequences to avoid. The Vulnerability Assessment Model should foresee the possibility to determine critical assets of the specific facility that may be subject to malevolent acts that could lead to the undesired circumstances. It is also important to assess the likelihood / qualitative probability of these malevolent acts from the adversaries; to evaluate existing countermeasures and to conduct analysis of current risks as well as to develop the prioritized plan for risk reduction. The extent and nature of the vulnerability assessment for specific facility will depend on a number of factors, based on the facility's necessity of a greater control over security personnel, the specific needs of the facility, the scope of work, to mention a few.

References Broder, J. (2006). Risk Analysis and the Security Survey. Butterworth-Heinemann. Fischer, R. , & Green, G. (2003). Introduction to security. Butterworth-Heinemann.


Free research essays on topics related to: proprietary, fringe benefits, facility, pros and cons, security personnel

Research essay sample on Running Head Vulnerability Assessment Model

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com