Develop and complete a vulnerability assessment tool to be used to conduct a survey of a home

Develop and full a vulnerability analysis gadget to be used to conduct a survey of a home, enterprise, faith institution or completely different bodily facility of your choice.

The paper is predicted to include:

1) Cowl net web page with scholar’s title, course title and amount, and date submitted.

2) Physique of paper:

A. Introduction that offers the goal of the paper;

B. Dialogue of the placement selection and the rationale for the placement chosen;

C. Components of the vulnerability analysis; and

D. Concepts and proposals of security counter-measures to mitigate and in the reduction of the prospect of acknowledged vulnerabilities to an applicable diploma.

Three) Reference guidelines.

4) Appendix that offers a reproduction of the vulnerability analysis gadget that you just assembled and used for the mission.

All papers must be submitted to the mission folder and cling to APA suggestions. It must be a minimal of 5 (5) to 10 (10) computer-generated, double-spaced pages and use a 12-point font. Margins are to be 1 inch (prime, bottom, correct, and left). This does NOT embody the vulnerability analysis gadget that may be added as an appendix.
Vulnerability Analysis: Interval Church, Metropolis, State

Web site Alternative and Rationale
This vulnerability analysis was carried out at Interval Church (“Interval”), 429 State Highway, Metropolis, State 90909, on the dates of September 25 – 28, 2017, and was adopted up with subsequent interviews of associated church personnel. The situation was chosen for quite a lot of causes along with the potential for a violent incident just like a mass taking footage, and the potential for fraud or completely different financial crime. A vulnerability is printed as “weak level[ ] or gap[ ] in a security program that could be exploited by threats to realize unauthorized entry to an asset” (Menace Analysis Group, 2017). Threats are events or people, just like a pure disaster, hearth, felony act, or terrorist incident, that will exploit a vulnerability (Menace Analysis Group, 2017). A vulnerability analysis “evaluates all alternate options which can be exploited by a menace” and via an in depth course of identifies areas the place vulnerabilities could possibly be mitigated to lower the prospect (DiMarino, 2017). Hazard is printed as “the potential for loss, hurt or destruction of an asset on account of a menace exploiting a vulnerability” (Menace Analysis Group, 2017). The vulnerability analysis at Interval Church covers quite a lot of areas to include bodily, operational, technological, and financial vulnerabilities. Whereas Interval has taken measures to mitigate vulnerabilities, there are some options in each area that may further mitigate hazard.
Religion is a contentious and polarizing matter within the USA, which makes church buildings prime targets for groups or individuals who must make an announcement. Possibly in all probability essentially the most infamous church taking footage in present memory is when white supremacist Dylann Roof shot and killed 9 African-American church members of Emanuel African Methodist Episcopal Church in Charleston, SC, on June 17, 2015 (Blinder & Sack, 2017). Roof launched a .45-caliber semiautomatic handgun into the church in a waist pouch, and attended the Bible analysis for about 40 minutes sooner than he shot and killed the members using seven magazines and over 70 rounds (Blinder & Sack, 2017). This incident is just one of many violent incidents at areas of worship. There is not a sure-fire method to completely steer clear of incidents just like this taking footage, nevertheless there are steps that could be taken to help scale back or steer clear of a large-scale incident.
Together with the specter of violence, church buildings are moreover prime targets for fraud, every from inside and exterior threats. For instance, the Coronary heart for the Study of Worldwide Christianity experiences that in 2014 church buildings misplaced an estimated $39 billion to inside financial fraud (Thomason, 2016). Theft and embezzlement of church funds are two necessary risks confronted by faith-based institutions. (Thomason, 2016). Together with an insider menace, there will be the ever-present menace of economic establishment accounts or piece of email accounts being compromised and money being stolen. Much like individuals or corporations, church buildings can fall sufferer to account takeovers or ransomware. In a single occasion, the Catholic Diocese of Des Moines, IA, misplaced $600,000 when their checking account was compromised and money was transferred to “money mule” accounts in every single place in the US (McGlasson, 2010). It must be well-known that the Diocese had insurance coverage protection that protects them from the loss, nevertheless not all church buildings are so lucky.
Description of Facility
Interval is a smaller church associated to the Southern Baptist Convention. Interval began in 2005 with the intent of constructing a church throughout the coronary heart metropolis to further the restoration and revitalization of city. downtown (Interval Church, 2017). Interval purchased their current facility through a mortgage and has occupied the developing for about two years. The developing has two flooring, and roughly 12,000 sq. toes. There’s the precept sanctuary, the kids’s ministry area, the second-floor ministry area, the office area, and an attached warehouse area that is not in use. There are presently 104 devoted members, and on a median Sunday roughly 150 adults and children attend the service. The Sunday service begins at 10:30 AM, lasts until roughly 11:45 AM, and different individuals keep on the church until roughly 1:00 PM. The lead pastors are John Smith and David Jones. The vulnerability analysis interviews had been carried out with Smith, Jones, and two separate church members who take care of security and funds respectively.
Necessary Property
Interval’s main belongings in order of significance are church members/ friends (children); church members/ friends (adults); church developing; church funds (money); and further contents throughout the church. Interval is not a giant church so the money it has obtainable is very important to them and their mission. Shopping for the developing was an infinite decision for the members and shedding the developing could possibly be a devastating loss.
Evaluation of Neighborhood, Crime Information, and Prior Incidents
The church is positioned in downtown AnyCity, which has a historic previous of crime and is taken into consideration one of many important violent small cities throughout the nation. There’s foot guests throughout the church, and a Division of Veterans Affairs clinic is subsequent door together with some homeless shelters and completely different outreach organizations shut by. Interval purposely positioned themselves on this ambiance to make a optimistic affect on the neighborhood. Fortunately, Interval has not been the sufferer of any crimes since transferring into the developing. There have not been any automotive break ins all through the Sunday service, nor have there been any break ins all through the week. There have not been any threats made in direction of the church. The first threats that had been considered whereas conducting this analysis had been violent crime, misdemeanor crime, hearth, and fraud. In the intervening time, there are usually not any elevated risks at Interval, and all threats had been thought of when conducting the vulnerability analysis.

Evaluation of Bodily Vulnerabilities
The first area addressed all through the vulnerability analysis was the bodily vulnerabilities. The developing is constructed with cinder blocks and a brick exterior. There is a big drain positioned exterior the developing that does once more up all through heavy rain and may set off some water to enter the developing. Normal the developing has held up in direction of any acts of nature. There are three entrances to the developing on the first floor. Two entrances open to the precept sanctuary, and the third entrance opens to the once more hallway between the kids’s ministry and warehouse. All three doorways are locked when the developing is unoccupied, or all through the week when church workers are the one individuals throughout the developing. The side entrance is locked on Sundays at 10:30 AM when the church service begins. Solely the doorway door coping with Main Highway is unlocked as quickly because the service begins. The third door stays locked all through the service. A person can exit the developing even when the doorways are locked. There are additional doorways contained within the developing that lock along with the doorway to the office area and the two pastors’ workplaces. Obligatory paperwork is secured in a locked pastor’s office. The doorway of the developing coping with State Highway has dwelling home windows that line the developing and attain from the very best of the first floor to the underside. Because of the design of the house home windows, individuals can’t see through the house home windows all through the day, and one is able to see through the house home windows at night. There are blinds that keep down when the developing is unoccupied. These blinds are closed when the Sunday service begins. The developing was inspected earlier to occupation and is periodically inspected by the Hearth Marshall. All electrical work was carried out by an professional. The second floor was not too way back renovated, nevertheless permits weren’t required as a result of dimensions of the renovation and the place it handed off contained in the developing.

Current Bodily Security Counter Measures
The developing has a security system that is monitored by a security agency. The company provides 24/7 monitoring suppliers. The protection system consists of motion detectors and hearth alarms. The hearth alarms may be addressed throughout the subsequent paragraph. The motion detectors are positioned all by means of the developing. There are usually not any glass break sensors throughout the developing, nevertheless with the number of motion sensors, glass break sensors mustn’t wished. The two pastors, a cleaning service employee, and a former employee have the code for the security system. Smith and Jones every get hold of textual content material message alerts when the alarm is activated or deactivated. There is a cell phone utility that may be utilized to entry and performance the system. The system has a battery backup and communicates using cellular towers. There is a separate Internet Protocol (IP) digital digital camera system that is positioned all by means of the developing. Smith and Jones can entry the cameras remotely by means of a cell phone utility that could be seen in precise time. There are moreover cameras positioned exterior the developing along with the doorway door, which could possibly be seen to find out friends all through the week sooner than letting them contained within the developing.
As beforehand talked about there are smoke detectors positioned all by means of the first floor of the developing that are associated to the security system, and may alert the company in the event that they’re triggered. There are usually not any smoke detectors positioned on the newly renovated second floor. There are moreover no observable smoke detectors throughout the warehouse area of the developing. There is a smoke detector positioned by the two hearth doorways that separate the precept sanctuary from the kids’s area. If these smoke detectors are activated the fireside doorways shut robotically serving to to incorporate a fire. The wall between the precept sanctuary and the kids’s area on the first floor is taken into consideration a fire wall, and would help stop the unfold of a fireplace. There is not a sprinkler system positioned contained within the developing. A sprinkler system is not required because of dimension of the developing, and would worth $45,000, which is worth prohibitive for Interval. There are hearth extinguishers within the precept sanctuary and the kids’s area, nevertheless they are not mounted on the wall.
Evaluation of Operational Vulnerabilities
The second area examined was the existence of operational vulnerabilities. Interval has a security employees, which is responsible for security on Sunday mornings. There are two members that monitor the parking lot from roughly 10:15 AM until 10:45 AM. After 10:45 AM, the two members monitor the sanctuary from the once more of the room. These an identical individuals make sure that the side entrance is locked at 10:30 AM so all foot guests ought to come through the doorway door. Though it is not a regularly scheduled obligation, some individuals will place themselves exterior the kids’s area on the end of the service whereas dad and mother are deciding on up their children. The individual in charge of the security employees well-known that there is a stability that must be struck between making all people actually really feel welcome and nonetheless remaining vigilant. There is a key fob that may immediately contact the native police that is associated to the security system, and is normally carried by a member of the security employees. There is a first assist package deal on web site and quite a lot of members of the church work throughout the medical topic. Interval hires a uniformed police officer for greater church events that occur at night.
Essential asset at Interval is the kids, and the kids’s ministry has quite a lot of pointers in place to help protect them. The youngsters’s ministry is positioned in a separate area, and solely dad and mother with children are allowed throughout the area. All children are checked in by means of a computer and acquire a sticker that is positioned on their once more. The sticker has a randomly generated code that is given to the dad and mother for resolve up. The stickers moreover embrace any meals allergy signs for the child. All volunteers throughout the children’s ministry have their background checked and are required to supply quite a lot of references. The references mustn’t on a regular basis contacted counting on how properly the actual individual is believed to the church workers. Each Sunday school classroom has on the very least two volunteers. In any case one specific individual is a coach educated by the church workers. Spouses mustn’t allowed to volunteer within the an identical classroom so that there is on a regular basis a viable witness should an incident occur. All of the doorways to the classroom have a chief and bottom. The underside stays closed, nevertheless the prime is each open or could possibly be opened at any time. Three of the four lecture rooms are associated and allow all three lecture rooms to be merely evacuated through the third door to the developing, which leads to the back-parking lot. The fourth classroom is positioned correct subsequent to the classroom the place the entire remaining children may be exiting and likewise merely ends in the an identical door, which leads to the back-parking lot. Inside the event of a fireplace or completely different incident all the children’s rooms could possibly be evacuated with out having to cross dwelling home windows or the precept sanctuary. All the kids’s lecture rooms are moreover windowless and can operate a shelter all through a tornado.
Evaluation of Present Security Insurance coverage insurance policies
There are usually not any specific protocols in place to answer to a mass taking footage or an act of violence. Nor are there any specific protocols in place for a fireside or tornado previous how the kids’s ministry could possibly be evacuated. There are on the very least three members of the church who regularly carry a hid weapon. One member is the top of the security employees, whereas the alternative two persons are members of the regulation enforcement neighborhood. It must be well-known that one in every of many two members of the regulation enforcement neighborhood is that this author. This state is an open carry state, and there are usually not any specific pointers prohibiting open carry in a church. There was on the very least one specific individual before now who overtly carried a pistol in church, most undoubtedly to make a political assertion. The members of the security employees watched him intently and decided that it was biggest to let the individual come and go versus making a scene and presumably having the church be used to make a political assertion in favor of open carry in church buildings.
Evaluation of Cyber Security Vulnerabilities
The fourth area examined was cybersecurity vulnerabilities. Interval has a non-public and non-private wi-fi neighborhood and every are password protected. Every networks operate on the an identical and are air gapped. Most of the workers pc programs at Interval are Mac laptops that go dwelling with the staff at night. The laptops should not have anti-virus because of they’re Apple merchandise, nevertheless they do have add blocker software program program. The pc programs at Interval are all password protected. The youngsters’s ministry computer that is used to look at in and out children is password protected and this method is internet based and requires a password. The church makes use of a mainstream tech agency to host their piece of email, which is all password protected as properly. The church site is hosted by a neighborhood agency, and any changes are made by means of Phrase Press, which requires a password.
Evaluation of Financial Vulnerabilities
The final word analysis focused on financial vulnerabilities. There are three members of the finance employees that are responsible for coping with the church funds. The pastors should not have any administration over church funds. An outside accountant assists with taxes. Interval does not have any financial institution playing cards. Interval does their banking at a neighborhood monetary establishment that has on-line banking. The three members of the finance employees have the username and pw. There is a devoted Interval piece of email take care of that is hooked as much as the checking account. They do not have two-factor authentication established for on-line banking. A every day account stability is distributed to the e-mail take care of and checked regularly, nevertheless they do not get hold of textual content material message alerts. Interval makes use of computerized bill pay, nevertheless does not have any should wire money. The finance employees is not constructive in the event that they’ve the pliability to wire money. There is a cap on the every day use of the debit card and withdrawals. There is not a protocol in place to regularly change passwords. There is a devoted finance computer on the church, nevertheless it is unknown what sort of anti-virus software program program is on the machine. The checking account may be accessed on-line by means of non-public pc programs belonging to members of the finance employees.
Interval makes use of church administration software program program to facilitate on-line giving. The software program program is password protected and the finance employees has entry to the financial portion of the software program program. The software program program is linked to the an identical Interval piece of email take care of. There is a charge processor that works in reference to the software program program to facilitate the donations and tithes. The charge processor has two-factor authentication with a username and password along with cell phone notification. As a result of the software program program and charge processor every ship notifications, the info should corroborate one another. Interval retains little or no cash obtainable on the church, and tithes are deposited weekly on the monetary establishment. Interval moreover makes use of an internet primarily based payroll agency to pay its employees. The finance employees has the username and password. The an identical devoted piece of email take care of is connected to the payroll account as properly. The payroll agency sends notifications by means of piece of email when there are changes or a payroll is launched. There is not a two-factor authentication established. A member of the finance employees releases the payroll every two weeks.
Security Recommendations
The Menace Analysis Group (2017) states that “hazard is a function of threats exploiting vulnerabilities to accumulate, hurt or destroy belongings.” They make clear that threats will on a regular basis exist, however when there are usually not any vulnerabilities than there could also be little or no hazard (Menace Analysis Group, 2017). Equally, there are circumstances the place there is a vulnerability, nevertheless no menace so there is no hazard (Menace Analysis Group, 2017). Sadly, it is not potential to completely take away the specter of fireside, church violence, or crime in direction of the church so options and changes must be made to mitigate the vulnerabilities and thus in the reduction of the prospect as lots as potential.
The bodily security steps that Interval has taken are a wonderful start, nevertheless there are some vulnerabilities that must be addressed. There must be additional smoke detectors positioned on the second floor and throughout the warehouse. If a fire occurs in these areas, it should unfold to the rest of the developing sooner than the security agency would develop to be aware. A sprinkler system could possibly be an extra profit, nevertheless the firewall and further smoke detectors would help make certain that the fireside agency is notified immediately and the fireside is contained. All the fireside extinguishers must be mounted on the wall the place they’re typically merely positioned. Quite a lot of seconds delay in deploying a fire extinguisher may present to be devastating. Security system sensors additionally must be considered for the three doorways, because of it ensures that every one three doorways are closed sooner than the alarm could possibly be activated. The two most necessary pastors should have their very personal security code for the system, and secondary codes must be established for various individuals. When these individuals not work on the church, these codes must be far from the security system. Lastly, Interval has a submit office area, and to steer clear of mail theft, all mail must be directed to the submit office area versus being despatched to the bodily take care of.
There are additional operational vulnerabilities that could be addressed to further assure the safety of the church. Locking the side entrance at 10:30 AM should proceed and helps assure that there is only one technique contained within the church as quickly because the service begins. The members of the security employees that stand behind the sanctuary should on a regular basis place themselves in order that they’ve visibility of the doorway door. Their backs should not at all be to the door. The doorway of the hallway between the sanctuary and the kids’s ministry is an outstanding place. Protocols must be developed and recorded throughout the event of an lively shooter, hearth, and tornado. As quickly because the protocols are developed, the church members must be briefed all through a member’s meeting. It is understandable to not want to speak about it on a Sunday morning, nevertheless the church members should know what plans are in place. Many dad and mother’ instinct all through a fire or energetic shooter situation goes to be to run to the kids’s ministry when in reality the kids may be evacuated all through a fire, or locked down all through an lively shooter event. The members should know what’s going to occur particularly circumstances. Anyone throughout the church, whether or not or not it is a pastor, someone behind the church, or a member of the security employees ought to hold the necessary factor fob that summonses the police division. In the intervening time, the three members of the church that are armed know one another. Periodically, it must be assessed if there are additional members of the church who’re armed. The youngsters’s ministry has many sturdy security measures in place, nevertheless there are a variety of options for area. Teachers and volunteers must be educated using a daily children’s ministry protection. The protection should embody relevant strategies to take care of children, self-discipline, and completely different areas just like the fireside, energetic shooter, and tornado protocols. Kids’s stickers additionally must be far from their backs after they’re picked up by their dad and mother. It would help all people decide a child that has left the realm with out being appropriately picked up. It moreover removes the child’s title in case a stranger tries to utilize it to lure them away. It’s normally advisable that a pastor identify on the very least one reference on each specific individual’s background study sheet. There are factors that a background study can’t decide, which could be revealed by a reference study.
Lastly, the options to take care of cybersecurity and financial vulnerabilities overlap. The long-term goal must be to have two totally separate, air gapped non-public and non-private wi-fi networks. It gives a layer of security to the church pc programs. Having three members on the finance employees fosters accountability and can proceed. All of the on-line accounts to include the monetary establishment, payroll agency, software program program administration agency, and charge processor should have two-factor authentication enabled. Many events, when an account is compromised, the menace will spam the e-mail account to cowl any change notifications. In addition to, since Interval does not have a should regularly wire money, it’s advised that the pliability to wire money be disabled. This removes the specter of a giant wire swap leaving the account empty. The finance employees additionally wants to find the chance of buying insurance coverage protection to protect the church from financial loss. All pc programs that are used to entry the accounts, every Interval pc programs and personal pc programs should on a regular basis have the freshest anti-virus software program program. There are quite a few environment friendly anti-virus packages that are free to most people and would add an extra layer of security. Passwords additionally must be modified on the very least a couple of occasions a 12 months. Any member of the finance employees that makes use of his dwelling computer to entry any accounts additionally wants to ensure his anti-virus software program program is up to date. If there could also be suspicion that a computer has been compromised, then all passwords must be modified. The prospect of Interval being centered immediately is small, nevertheless the chances that Interval being unknowingly centered are lots bigger and the aforementioned options will help lower the possibilities that a menace is worthwhile.
Conclusion
This vulnerability analysis surveyed bodily, operational, cybersecurity, and financial vulnerabilities. Whereas the staff and members have already taken measures to increase security, there are additional actions that could be taken to further scale back the likelihood a menace is worthwhile. It is unattainable to completely take away all threats, and unrealistic to imagine there any actions that will totally stop individuals from attempting malicious actions. Nonetheless, Interval might also assist in the reduction of the prospect by following the options outlined on this analysis. It is understandable that Interval needs to hunt out the steadiness between making all people actually really feel welcome, whereas nonetheless remaining vigilant. These options will allow Interval to carry out that goal and protect their most important belongings protected.

References
Blinder, A., & Sack, Okay. (2017, January 10). Dylann Roof is sentenced to dying in Charleston
church massacre. The New York Situations. Retrieved from https://www.nytimes.com/2017/01/10/us/dylann-roof-trial-charleston.html?_r=zero/
DiMarino, F. (2017). Module 4: Vulnerability assessments. Doc posted in School of
Maryland School College CJMS 630 9040 Seminar in Security Administration (2175) on-line classroom, archived at https://research.umuc.edu/d2l/le/content material materials/223077/viewContent/9190918/View/
Interval Church. (2017). Welcome to Interval church! Retrieved from http://erachchurch.org/
McGlasson, L. (2010, September 1). Church latest sufferer of ACH fraud. Monetary establishment Info Security.
Retrieved from https://www.assignmentessaypage.com/write-my-essay/bankinfosecurity.com/church-latest-victim-ach-fraud-a-2888/
Menace Analysis Group. (2017). Menace, vulnerability, hazard – typically blended up phrases.
Retrieved from https://www.threatanalysis.com/2010/05/03/threat-vulnerability-risk-commonly-mixed-up-terms/
Thomason, S. (2016, August 24). Cease church fraud with increased controls. The Tennessean.
Retrieved from https://www.assignmentessaypage.com/write-my-essay/tennessean.com/story/sponsor-story/lbmc/2016/08/24/lbmc-prevent-church-fraud-better-controls/89203972/

Appendix
Vulnerability Analysis Survey
Bodily Vulnerabilities Observations
• Establishing Information The developing is 1200 sq. ft. and a pair of flooring. There are Three entrances on the primary floor. There are glass dwelling home windows that line the developing prime to bottom on the precept avenue side of the developing. At night and all through the Sunday service the blinds are closed. All electrical work is accomplished by professionals and as a lot as code. Earlier to putting the developing in use, it was inspected and the fireside marshall conducts interval inspections. There are exterior lights throughout the entire developing that operate on at timer at night. The within of the developing has additional locked doorways along with the pastors’ workplaces.
o Dimension
o Flooring
o Entrances/ Locks
o House home windows/ Blinds
o Electrical Work
o Inspections/ Establishing Code
o Exterior Lighting
• Security System There are IP based cameras that operate individually from the security system. The cameras could possibly be accessed by means of the Internet an app on a cellphone. The protection system is monitored by an outside agency. The two most necessary pastors and cleaning specific individual have the code. There are a selection of motion detectors all by means of the developing. There is not a glass break detectors because of the number of motion detectors make it pointless. The two pastors get hold of textual content material message notifications. The system has a battery backup and operates on cellular communication system.
o Agency
o Cameras
o Motion Detectors
o Glass Break
o Smoke Detectors
o Battery Backup
o Entry Codes
o Devices used to entry system
• Hearth Detection System The hearth alarms are associated to the security system and are monitored 24/7 by the pores and skin agency. There are a selection of fireside alarms on the first floor along with one which’s associated to fireplace doorways that shut throughout the event of a fireplace. The doorways and surrounding wall are thought of a fireside wall that helps cease hearth from spreading. There is not a sprinkler system. The developing dimension does not require it and it would worth approx. $45,000. There are hearth extinguishers throughout the separate parts of the developing nevertheless they are not mounted. There’s NO hearth alarm on the renovated 2nd floor or throughout the warehouse(?)
o Sprinklers
o Smoke Detectors
o Hearth Partitions
o Hearth Extinguishers
• Additional Information In the middle of the week the doorways are locked even when the developing is occupied (they nonetheless allow individuals to exit) and there are cameras to see who’s knocking
o What entrances are locked all through the week?
Cybersecurity Vulnerabilities Observations
• Wi-fi Networks There is a personal and public wi-fi neighborhood on the church. The two networks have completely completely different pw. The private neighborhood is for church employees. The networks mustn’t air gapped and reside on the an identical router.
o Private Neighborhood
o Public Neighborhood
o Are they bodily separated?
• Types of pc programs The youngsters’s ministry study in computer is pw protected and this method is internet based w/ a pw. The two pastor lap tops are Mac Books that are taken dwelling at night. The Mac Books should not have anti-virus nevertheless there could also be add blocker. The youngsters’s ministry program does not have any PII. One or two additional pc programs keep on the church 24/7, nevertheless are pw protected.
o Anti-virus software program program
o Password protected
• Church E mail The church piece of email is hosted on a enterprise program that is free nevertheless provides customary security suppliers. The emails are pw protected.
o Who hosts the e-mail service?
o Is it password protected?
• Church site The church site is hosted by a neighborhood agency and changes are made by means of Phrase Press. A pw is required to make changes to the site.
o Who hosts the church site?
o Is a password required to make changes to the site?
• Additional Information
Operational Vulnerabilities Observations
• Are there any security protocols already in place? There is a security employees at Interval that ensures two persons are throughout the parking lot area of the church every Sunday morning from about 1015A to 1045A (church begins at 1030A). The an identical persons are responsible for ensuring that the side entrance is locked at 1030A. The an identical two individuals will hold within the path of the once more of the church to concentrate to any suspicious or misplaced habits. One specific individual will even switch to exterior the kids’s area on the end of church to make sure no children run out unattended or there are adults throughout the area that should not be. Phrase a should stability making all people actually really feel welcome whereas nonetheless being aware.
o Is there a specific plan in place to answer to an act of violence?

• Do you ever have the native police division current security? For certain events that occur at night or are greater they will lease an off obligation ATPD or ACSO officer.
• Is there a main assist package deal on web site? Positive
• What doorways are locked on Sunday morning? The third entrance is locked. The side entrance is unlocked until 1030A. The doorway entrance is on a regular basis unlocked. The side door is unlocked on the end of church for people to depart.
• Kids’s Ministry All volunteers throughout the Kids’s ministry are background checked by an outside agency. On Sunday mornings, there is a study in/ out system that requires an grownup to look at throughout the child who will get a sticker on their once more with a randomly generated code distinctive to the family. There is a separate cross for the grownup that has the code and is required to decide on up the kids. All meals allergy signs are documented on the child’s sticker and the snack is clearly displayed per classroom. There are educated lecturers in each classroom together with a volunteer. The teachers have additional teaching from the staff. There’s written protection nevertheless working to compile proper right into a full protection. The youngsters’s area has two separate glass doorways from the precept area. Each classroom has a two-part door so the underside stays closed and the very best could possibly be opened at any time. Additional protection is spouses do not work within the an identical room collectively so there could also be on a regular basis a viable witness for any actions taken by one different. In additional to a background study will contact references relying if anyone on the church is conscious of the actual individual on a non-public diploma.
o Background checks for volunteers?
o Confirm In/ Confirm Out System
o Doc Meals Allergic reactions
o Additional protocols for volunteers
o Restricted entry?
o Are there any armed members on the church? There are on the very least two armed members who’re regulation enforcement (1 is that this author) plus the top of the security employees has a hid carry license. Head of the security employees has spoken with every members who’re regulation enforcement.
• Additional Information There is a key fob as part of the security system that may robotically identify police. Security employees typically carries it.
Financial Vulnerabilities Observations
• Monetary establishment Monetary establishment A
• Who handles the funds? There is a Three-person finance employees that handles the money. The two pastors do not take care of the money and let the finance employees take care of these points. The three-person employees creates accountability.
• Do you conduct on-line banking? The church conducts on-line banking and the three finance employees members have the username and pw. There is a most necessary finance computer at church that is merely used for finance points. Unknown for the time being what anti-virus security is on the pc programs. The three finance employees members get hold of piece of email notifications when changes are made to the account and acquire every day account stability updates by means of piece of email. Used to have treasury mgmt choices nevertheless these for the time being are disabled. Do not get textual content material message alerts. Recommend using them. There is a devoted Interval piece of email take care of for financial points. Use non-public pc programs at dwelling to look at checking account on-line.
o What pc programs are used to conduct on-line banking?
o Who has entry to the username and password?
o Are there two challenge authentications?
o Does anyone get notified when changes are made to the account? How?
o Is there a specific piece of email take care of tied to the account?
• Are there any restrictions on money transfers? Do pay some funds with computerized bill pay. Used study to rearrange.
• Any specific protocols for wiring money? They do not should wire money. Checking to see in the event that they’ve the potential. Recommend disabling.
• Does anyone get notified when big transactions occur? Finance employees members all have entry to Interval piece of email account which is notified. NO cell phone notification.
• Payroll Agency Use on-line payroll system with Agency B. An identical Three-person finance employees has username and pw. Roughly rapidly to be 5 employees in system. Get notifications by means of piece of email to finance piece of email take care of when payroll paid. Go in and launch funds every two weeks. Cannot uncover two-factor authentication or cell phone notification selection. Will study with agency. Any change notifications are obtained by means of piece of email.
o What pc programs are used to make changes to the payroll account?
o Who has entry to the username and password?
o Are there two challenge authentications?
o Does anyone get notified when there are changes made to the account? How?
o What piece of email take care of is tied to the payroll account?
• Tithes there will be the option to deposit tithes by means of on-line giving system. It is pw protected church mgmt software program program. In addition to, the charge processor may be pw protected. Managed by an identical Three-person finance employees. Use an identical devoted piece of email take care of. Price processor requires two challenge authentication – username/pw and cell phone textual content material message code. notified by means of piece of email if there are changes made to account. there are a variety of client groups throughout the church mgmt software program program so pastors and others should not have entry to finance part of software program program. church mgmt software program program and charge processor every ship notifications, and so forth. and can corroborate each other.
o How do you deposit tithes?
o Does the church protect any cash obtainable?
o Who counts the tithes?
o What service do you use for on-line giving?
• the place do you retailer delicate paperwork? Delicate paperwork are saved in a locked office in a submitting cabinet.
• How lots cash do you keep obtainable on the church? Little or no cash is saved on the church.
• Any auto-payments established? Most funds are on auto-pay or direct draft.
• Additional Information There is a cap on debit card use in day and withdrawals with debit card. Recommend creating basic cap. Non-public and work pc programs used to entry on-line accounts. No protocol in place to regularly change pw. Wish to guarantee all pc programs have up-to-date anti-virus security. Open air accountant helps with taxes, provides further layer.
Primary Questions Observations
• Has the church been a sufferer of crime before now? No incidents before now.
• Has there been any specific threats in direction of the church? No threats in direction of the church.
• Have there been any automotive break ins before now – Sunday morning or completely different days? No automotive break ins.
• How prolonged has the church occupied the developing? roughly 2 years
• What variety of members attend the church? 104 members
• What is the frequent Sunday morning attendance? 150 people
• The place is the church’s mail delivered? Mail is delivered to the developing and a PO Subject.
Additional Information No protocols in place or written plans for a fireside or tornado.