This website uses cookies to ensure you have the best experience. Learn more

Understanding Security Essay

1690 words - 7 pages

Diploma Assignment Module Two
Understanding Security (Remote Monitoring)

Assignment Two
I am currently employed as a Regional Security Manager working for a global logistics company my role was to have direct responsibility for security throughout the middle of the UK and Ireland. Since the security initiative I am going to discuss my role has changed and I now look after Security Projects on a national basis.
Like any company in this day and age we are always looking at ways of cost saving, this has been an important ...view middle of the document...

The first thing we did was to agree that we needed to reduce physical security but at the same time improve the electronic solution in order that it would replace the physical loss but could deal with our needs. For that reason we formed a project team, identified a site project manager and a team of department heads such as Warehouse, Transport, H&S, IT, Electronic Security suppliers and Maintenance, this was important as we needed the” buy in” and sponsorship from these departments to make the solution work.
Initially it was difficult due to the age old issue of no-one” liking change” and of course some of the departments had passed on non security duties to the guards which they didn’t really want to take back into their daily remit. We also had to look at what the Security Officers were actually doing on a daily basis which were not necessarily deemed as Security duties and could be controlled by the site internally without creating a security breach or weakening the ingress/egress of visitors, goods in or goods going out. Another issue of course was controlling employees of which there could be up to 300+ on a daily basis.
I already had professional electronic suppliers who were procured and had all of the required accreditations such as NSI Gold and most importantly had a good understanding of the type of systems I was looking for to run alongside and work with the protocols of the existing electronic systems that were already in place. Most of our sites had been using the Pelco equipment that I knew was robust and fit for purpose and would work with most other Remote Monitoring equipment. IP Cameras were also coming onto the market and although the fixed camera was proving positive at the time IP dome cameras were needing further improvements for that reason I also needed to look for a HYBRED solution to make any possible future site projects work in the correct effective manner.
Together with the suppliers I identified the Platform that we needed to use to and decided on a ADPRO system that not only would be future proof but would stand up to our requirements. There was also the bigger picture for us as a company because I knew there would be other cost savings to be made in the future and this would aide us when using the platform as an energy saving method. (Another project for the future)
The first physical thing we did was to have procurement on board who assisted us to update the contracts we had with the existing guarding companies this had to include a clause in the contract that we were not responsible for any redundancy cost should the guarding company not be able to relocate the existing staff some of whom had been on sites for many years. This was one of the important issues when making the cost savings and making them quickly rather than over a five year period.
The next stage was to create a site plan and plot where we needed to put the security solutions such as, fencing, gates, barriers, further cameras,...

Other Papers Like Understanding Security

Security Goals and Objectives Essay

805 words - 4 pages , security awareness briefings, annual security inspections and, security monitoring, ultimately these guidelines are set in place at accomplish one common goal. To protect. References David Lacey, (2010) "Understanding and transforming organizational security culture", Information Management & Computer Security, Vol. 18 Iss: 1, pp.4 - 13 - See more at:

Principles of Security 5th Edition Chapter 1 Review Questions

844 words - 4 pages accurate and the is no room for mistakes. Science because the technology is developed by computer scientists and engineers. Social science influences the practice of security because by studding the behavior of people as the interact with systems we get a better understanding of how data can be affected by people. Information security begins and ends with people within and organization. 15. Who is ultimately responsible for the security of

Global Security Policy - Week 5 - Cmgt-400

969 words - 4 pages strategies as the global organization. Planning and understanding how the data is acquired, knowing what is the most sensitive data, who is responsible for securing the data, and creating and testing a disaster recovery plan can help business leadership understand the severity of cyber security. Cloud Computing According to Chris Ciborowski at Digital Guardian, “Understanding what "the cloud" is and how cloud computing should be utilized given unique

Airport Security Improvements Before and After the September 11, 2001 Terrorist Attack

1210 words - 5 pages with domestic flights. To get a better understanding of how security has changed a list of questions will be provided to the head of security for he or she to answer to the best of their knowledge about security past and present. On this questionnaire they will have the option to express their beliefs on the current security measures in place and they will be able to express what improvements if any can be made at their local airport or any

Human Security

1956 words - 8 pages support to countries and states that are unable to independently resolve ‘human security’ issues. By understanding the concept of ‘human security’ it is easier for the international community to identify its factors and to produce strategies that address the requirements in an effective, efficient and timely manner. 3. The primary elements of ‘human security’ were initially embraced by the landmark 1994 United Nations Development Programme

Understand Security

1491 words - 6 pages Understanding Security Introduction . Security management and systems have often been perceived as a non –productive expensive capital overhead by the stakeholders of companies and a hindrance to employees. The purpose of this assignment is to, Identify what is seen as the main purpose of security management and discuss what is meant by the statement ‘security measures must be commensurate with the threat’. Discussion. Judgements on risk

Goals and Objectives

1174 words - 5 pages ” (Ortmeier, 2000 p. 71). Security Organizations and management must develop routines in learning understanding the administrative law regulations as well as setting up procedures to allow them to be followed daily. Security organizations must realize that these laws cover a wide range of dynamics in order to protect all aspects of public policy that the administrative agencies deem necessary. Influences to Organizational Security There are many

A Security Risk Management Approach for E Commerce.Pdf

2235 words - 9 pages , M. (2000), ``Using the viable systems model to develop an understanding information system security threats to an organisation'', Proceeding of the 1st Australian Information Security Management Workshop, Deakin University, Geelong, Australia, November. Warren, M. and Hutchinson, W. (2000), ``The Australian and New Zealand Security Standard AS/NZS 4444'', New Zealand Journal of Computing, Vol. 8 No. 1/2, pp 37-43. [ 242 ]

Information Security

988 words - 4 pages . Through increased usage, users will be able to discern the required procedures and action hence reducing the level of shortcuts used when dealing with information technology. Dementia and its influence to information security Breitner (2006) indicates that dementia is a collective term for mental related illnesses. These conditions include inadequacies on memory, thinking speed, mental agility, language, judgment and understanding (Breitner 2006

Cyber Security: Physical and Digital Security Measures

3505 words - 15 pages secure their digitized data and must have the ability to apply that knowledge within the constructs of their systems in order to ensure that a breach does not occur. In order to achieve good cyber security a mix of technical tools coupled with a superb training program and top level talent is necessary, but it is important to remember that no matter how good the system put in place, no system is ever 100% fully secure. Through an understanding of

Information Systems

1212 words - 5 pages small deal with risk and technical vulnerabilities? The measures include a number of overlooked situations like not understanding the true economic impact of information security exposures, not realizing the threats they need to manage against, or being more reactive after a security incident than proactive to significantly reduce the possibility of such events. Not actually knowing that small businesses endure a lot of these main issues which

Related Essays

Top 10 Laws Of Security Essay

1706 words - 7 pages Abstract It is very important to realize and understand the laws of security, by which all sectors in an enterprise or government can empower security within their perimeters. The higher understanding of this laws, the better security implementation is realized. These laws can be applied in each business field or any business environment. Such laws can be implemented in any degree of simplicity or complexity. Therefore, it is important to

Cmgt400 Week 4 Individual Essay

1359 words - 6 pages , implementation, and management requirements are specified by a security policy. It provides targeted guidance by introducing the organization’s fundamental technological and technical philosophies. While not used to establish administrative enforcement, security policies are used to provide a common understanding of the purposes for which employees can utilize technology at the workplace. Security policies provide readily available standards for

Security Management Case Study #1

819 words - 4 pages , Locking Devices and Containers * Control of Personnel and Vehicles * Safety for Personnel * Organization for Emergency * Theft Control Since the current aim is to protect infrastructure against theft and terrorism, it is important to know about perimeter security and access control mechanisms. Understanding the layout of the facility guides us into determining what kinds of access control mechanisms should be used in certain

Cap Study Guide Essay

5295 words - 22 pages human resources that's required to achieve a particular outcome. 9. There are Tasks associated with each RMF step.  You must have a basic understanding of what happens at each task AND the role that has Primary Responsibility for each task. • Categorize the information system and the information processed, stored, and transmitted by that system based on an impact analysis. • Select an initial set of baseline security