Security Management Is A Process That Functions Essay

PAGES
2
WORDS
694
Cite

¶ … Security Management is a process that functions systematically to identify and evaluate risks-posing threats whilst taking appropriate actions and resolutions aimed at safeguarding the company. Some security managers have the perception that risk is the future possibility of an occurrence that is bound to cause a negative impact, while keeping in mind that risk has also the possibility of providing future opportunities. In the course of taking up risks, companies in some cases are on the verge of achieving considerable objectives. Nevertheless, companies require security management to summarize and analyze the potential risks to balance possible gains against the possible losses and keep away from expensive mistakes and decisions. Security management functions best as a preventive mechanism rather than as a reactive mechanism. Companies experience maximum advantage when they put their risks into consideration in the course of recommendable performance and when they are experiencing growth to maintain profitability and growth (Whitman & Mattord, 2010). A security manager is included in the most significant jobs being offered by an organization. Although the...

...

Security managers are responsible for establishing and implementing security policies to make sure the environment is safe for the visitors and the employees (Sennewald, 2011). With the differing in positions of security managers to different organizations, the security managers carry out critical functions of ensuring the daily activities of the organization run as per expectation. In order to find out the differing functions that security managers perform in different organizations, we can describe the key functions of the security manager in a generalized perspective of the business sector. The roles of all security managers in different organizations are very significant in safeguarding the security needs in their areas of specialization (Hess, 2009).
A security manger in the field of Transportation Security Administration is the person in charge of the security undertakings at the terminal of the airport. They have authority over security officers for transportation, leads and…

Sources Used in Documents:

References

Burstein, H. (2010). Security: A management perspective. Englewood Cliffs, N.J: Prentice Hall

Fay, J. (2007). Encyclopedia of Security Management. Burlington: Elsevier

Hess, K.M. (2009). Introduction to private security. Belmont, CA: Cengage Learning

Sennewald, C.A. (2011). Effective security management. Burlington, MA: Butterworth-


Cite this Document:

"Security Management Is A Process That Functions" (2013, April 04) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/security-management-is-a-process-that-functions-88840

"Security Management Is A Process That Functions" 04 April 2013. Web.24 April. 2024. <
https://www.paperdue.com/essay/security-management-is-a-process-that-functions-88840>

"Security Management Is A Process That Functions", 04 April 2013, Accessed.24 April. 2024,
https://www.paperdue.com/essay/security-management-is-a-process-that-functions-88840

Related Documents

Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is

Microsoft proposes six steps to enable proper reactive management of security risks which include: protecting safety and life, containing and assessing the damage, determining the cause of and repairing damage, reviewing risk response and updating procedures in the hopes of preventing risk in the future (Microsoft, 2004). A proactive approach is much more advantageous however as it enables corporations to prevent threats or minimize risks before negative occurrences happen within an

Identification of external risks depends of the location and structure of the business premises, the type of business, its neighbors, and company-specific risks. Security managers must also pay attention to regulatory compliance with voluntary, self-regulation, and statutory considerations (Options for the development of the security industry). Voluntary regulation is self-imposed and may include the establishment of a professional regulatory body. Self-regulation occurs where the regulated profession has a majority on

Port Facilities Manager Ports have historically played an instrumental role in driving the global economy by facilitating the movement of people and cargo from one part of the globe to another. Due to their phenomenal influence on the global economy, ports must be effectively managed. This is particularly true in terms of their facilities, equipment, and infrastructure. The port facilities manager is tasked with the responsibility of supporting the port

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration