× Didn't find what you were looking for? Ask a question
  
  
Top Posters
Since Sunday
26
21
21
21
20
19
19
19
18
18
18
18
New Topic  
wrote...
Posts: 204
Rep: 9 0
A week ago
What are the three components of an effective security program?
Textbook 
Introduction to Security: Operations and Management
Edition: 5th
Authors:
Read 50 times
1 Reply
Related Topics
Replies
wrote...
A week ago
Physical security refers to tangible objects, such as walls, fences, locks, and building designs, that promote the protection of persons and property. It also includes lighting, surveillance and alarm systems, and security personnel devoted to access control activities. The physical safety and security requirements for persons and property are balanced with operational needs and the aesthetic qualities required in the environment. Good physical security protects a facility and its people. It can affect a potential criminal offender's perception of a possible crime target. The protection of electronic systems from loss due to accidents, natural disasters, or unauthorized access is another function of physical security. Computer systems, data, software, transmission lines, airwave frequencies, voice communications, electronic mail, and Internet servers must be protected. Revolutionary changes in technology have radically changed the nature of business and the environment in which organizations and governments operate. As a result, special attention must focus on the protection of these systems. Security measures must also be designed and implemented to protect the operation itself. In other words, an organization's processes must be protected. Without redundant systems, such as backup power supplies, temporary inactivity may occur in a critical stage of the operation, resulting in expensive downtime.

Personnel security involves the protection of persons associated with the organization and the protection from individuals who might harm the organization. Protection of employees, customers, and guests is inherent in the security function. Unique strategies may be required to protect dignitaries, corporate officers, and celebrities. Personnel security also involves hiring the right people and maintaining their integrity. It includes the utilization of an effective preemployment screening process as well as policies and procedures to reduce the opportunity and motive for employee theft and poor productivity.

Information security is the third leg of the security management triad. Other than death or injury to a person, the greatest single threat to any individual, agency, institution, or nation is the loss of intellectual property or proprietary and confidential information. All stages of the information cycle must be protected. The methods used in the creation, processing, storage, retrieval, transmission dissemination, and disposition of information in any form must be secured. The level of protection required at each stage depends on the Information's value to the organization, the ability of an outsider to duplicate the information, and the potential harm that could result if the information is acquired by the wrong individuals, organizations, or nations.
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers.
Learn More
Improve Grades
Help Others
Save Time
Accessible 24/7
  122 People Browsing
Your Opinion
In one word, how would you rate our website?
Votes: 93

Related Images
 162
 135
 90