× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
5
o
5
4
m
4
b
4
x
4
a
4
l
4
t
4
S
4
m
3
s
3
New Topic  
yuknam yuknam
wrote...
Posts: 503
Rep: 9 0
4 years ago
What are the three components of an effective security program?
Textbook 
Introduction to Security: Operations and Management

Introduction to Security: Operations and Management


Edition: 5th
Authors:
Read 75 times
1 Reply

Related Topics

Replies
wrote...
4 years ago
Physical security refers to tangible objects, such as walls, fences, locks, and building designs, that promote the protection of persons and property. It also includes lighting, surveillance and alarm systems, and security personnel devoted to access control activities. The physical safety and security requirements for persons and property are balanced with operational needs and the aesthetic qualities required in the environment. Good physical security protects a facility and its people. It can affect a potential criminal offender's perception of a possible crime target. The protection of electronic systems from loss due to accidents, natural disasters, or unauthorized access is another function of physical security. Computer systems, data, software, transmission lines, airwave frequencies, voice communications, electronic mail, and Internet servers must be protected. Revolutionary changes in technology have radically changed the nature of business and the environment in which organizations and governments operate. As a result, special attention must focus on the protection of these systems. Security measures must also be designed and implemented to protect the operation itself. In other words, an organization's processes must be protected. Without redundant systems, such as backup power supplies, temporary inactivity may occur in a critical stage of the operation, resulting in expensive downtime.

Personnel security involves the protection of persons associated with the organization and the protection from individuals who might harm the organization. Protection of employees, customers, and guests is inherent in the security function. Unique strategies may be required to protect dignitaries, corporate officers, and celebrities. Personnel security also involves hiring the right people and maintaining their integrity. It includes the utilization of an effective preemployment screening process as well as policies and procedures to reduce the opportunity and motive for employee theft and poor productivity.

Information security is the third leg of the security management triad. Other than death or injury to a person, the greatest single threat to any individual, agency, institution, or nation is the loss of intellectual property or proprietary and confidential information. All stages of the information cycle must be protected. The methods used in the creation, processing, storage, retrieval, transmission dissemination, and disposition of information in any form must be secured. The level of protection required at each stage depends on the Information's value to the organization, the ability of an outsider to duplicate the information, and the potential harm that could result if the information is acquired by the wrong individuals, organizations, or nations.
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  783 People Browsing
 111 Signed Up Today
Related Images
  
 1049
  
 533
  
 794
Your Opinion
What's your favorite funny biology word?
Votes: 156