Facility And Security Management The Term Paper

There are barriers to developing systems security that are both financial and philosophical:

Systems security is often viewed in a manner similar to physical security: Buy it once and use it forever. Unfortunately, like physical security, obsolete policies, procedures, and technologies leave systems extremely vulnerable to external and internal attacks. Most stakeholders find it difficult to accept the need for constant spending on systems security when it is difficult to quantify the benefits. Even when benefits can be quantified, unenlightened stakeholders may still question the need for continuous spending in the systems security area. In many cases, education can overcome this philosophical barrier. Unfortunately, often only severe losses from a security breakdown will prompt appropriate, albeit late, action (Luehlfing et al., 2000, p. 62).

More and more organizations reco0gnize that part of security is data security. In choosing the technology solution for a given data need, certain features should be considered. This means making a careful study of needs, the complexity of the infrastructure, the resources and skill level of the it staff, and the capital available for investment. To make an informed choice, the manager should consider four areas: reliability, scalability, security, and total cost of ownership. The meaning of reliability is self-evident, and it means features to ensure the integrity of the data and to assure that the data is safe in the event of a system failure or disaster. The feature of scalability is measured in both its ability to manage increasingly large volumes of data and increasingly large numbers of users or transactions without compromising the system's overall worth. There are two approaches for dealing with scalability, known as scale-up and scale-out. Scale-up is achieved by increasing the computing power of a single machine by adding CPUs, memory, or enhancing the networking components and storage systems. Scale-out, on the other hand, is accomplished by the addition of more servers to the system to spread the workload...

...

It further depends on the training afforded to users, the abilities of the it maintenance staff, the documentation provided with the system, and many other facets of the development and implementation of an it system. If these elements are taken care of in a proper manner by personnel who are knowledgeable and whoa re using the best available information on requirements, then the resulting system will serve well and should also contain sufficient flexibility to be reshaped and adjusted as needed in order to serve new needs as they develop. Technology is also involved in physical security, from alarms on doors and windows to systems for deciding who is allowed to enter and who is not. The facility manager and the security manager must coordinate activities to assure that security is maintained throughout the facility.

Sources Used in Documents:

References

Borchers, M. (1996, July). Building security relationships. Security Management 40(7), 103.

Keehn, a.K. (2002). Institution's Complexity, Resources and Future Needs Influence Database Selection. The Journal 29(10), 50.

Luehlfing, M.S., Daily, C.M., Phillips, T.J., & Smith, L.M. (2000). Defending the security of the accounting system. The CPA Journal 70(10), 62

Phelps, E.F. (1994, May). Securing safety policies through self-inspection. Security Management 38(5), 75.


Cite this Document:

"Facility And Security Management The" (2007, September 14) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/facility-and-security-management-the-35793

"Facility And Security Management The" 14 September 2007. Web.23 April. 2024. <
https://www.paperdue.com/essay/facility-and-security-management-the-35793>

"Facility And Security Management The", 14 September 2007, Accessed.23 April. 2024,
https://www.paperdue.com/essay/facility-and-security-management-the-35793

Related Documents

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is

Facility Risk Management Risk Management Facility Issue: Infant Abduction Risk is defined as "anything that threatens the ability of [a] business to accomplish its mission." (Pakeys, 2010) The risk management plan is held to be "much broader than the emergency preparedness plan" and involves the management of risk, which offers a method of protecting against unforeseen hazards, and the routine risks faced by workers each day. (Pakeys, 2010) The express reason for

Security Management at Aviation and Healthcare Sectors Security Management Essay This paper discusses the concept of aviation security management and security management at healthcare settings. In addition to that, this paper also lists down and describes the important factors that can have an influential impact on the functions of aviation and a healthcare security manager. Security Management at Aviation and Healthcare Sectors Aviation Security The general aviation security confronts a number of security challenges. The

Identification of external risks depends of the location and structure of the business premises, the type of business, its neighbors, and company-specific risks. Security managers must also pay attention to regulatory compliance with voluntary, self-regulation, and statutory considerations (Options for the development of the security industry). Voluntary regulation is self-imposed and may include the establishment of a professional regulatory body. Self-regulation occurs where the regulated profession has a majority on

School Security Management
PAGES 8 WORDS 2483

Security Options and High Performance Introduction As McCrie notes, “the training of employees and the development of their skills and careers is a critical and time-consuming activity within security operations.”[footnoteRef:2] For an organization like a public elementary school, employees are more than likely already stretched to the max in terms of time and ability: their primary focus is on teaching and assessing student achievement. Other stakeholders—i.e., parents—will nonetheless be concerned about safety,

Port Facilities Manager Ports have historically played an instrumental role in driving the global economy by facilitating the movement of people and cargo from one part of the globe to another. Due to their phenomenal influence on the global economy, ports must be effectively managed. This is particularly true in terms of their facilities, equipment, and infrastructure. The port facilities manager is tasked with the responsibility of supporting the port