Preview

Reading

Good Essays
Open Document
Open Document
11453 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Reading
C H A P T E R

Identifying the Essentials
CHAPTER OUTLINE
Beginning with the Basics: Ever Changing and Never Ending Studies in Human Behavior: An Essential Need for Security Outlining and Defining Security Creating and Maintaining a Stable and Predictable Environment Threats, Risk, and Vulnerabilities Introducing Essential Security Tools: Identifying Threats, Risks, and Vulnerabilities Threats and Related Risk Levels Identifying Vulnerabilities and Determining Countermeasures A Final, All-Important Term A Few Essential Elements Proactive versus Reactive Response Contract Officers versus Proprietary Officers Contract Outsourcing Decisions Conclusion Review Questions Discussion Questions

2

CHAPTER HIGHLIGHTS
Security basics: • The security objective is a neverending process. • Security needs change over time. Contributions from psychology: • Adler: Humans are, above all else, social. • Maslow and the hierarchy of needs: Security is a fundamental human need. Defining security: • stability • predictability Useful terms: • threat • risk: 1. probability 2. criticality • vulnerability Essential tools: • threat assessment • vulnerability assessment • security survey (security audit) • risk assessment • risk analysis

KEY WORDS
American Society for Industrial Security (ASIS) Certified Protection Professional (CPP) Contingency plan Contract 64 Countermeasures Criticality Loss event Predictable environment Proactive

ISBN: 0-536-91271-8

Identifying and Exploring Security Essentials, by Mary Clifford. Published by Prentice-Hall. Copyright © 2004 by Pearson Education, Inc.

IDENTIFYING THE ESSENTIALS Probability Proprietary Reactive Risk Risk analysis Risk assessment Security audit Security survey Stable environment Threat Threat assessment Vulnerability Vulnerability assessment Vulnerability gap

65

Everyone is interested in security issues at one point or another. In any local newspaper on any given day, a person will read stories that may affect how



References: 1. Cunningham, W. C., J. J. Strauchs, and C. Van Meter, Private Security Trends: 1970–2000. The Hallcrest Report II, 236. 2. For more information about the CPP program and materials, go online at http://www.asisonline.org/cpp.html. 3. E. Dreikers Ferguson, Adlarian Theory: An Introduction (Vancouver, BC: Adlerian Psychology Association of British Columbia, 1984). 4. R. R. Dreikurs, Fundamentals of Adlerian Psychology (Chicago, IL: Alfred Adler Institute, 1953). 5. R. Corsini, Current Psychotherapies (Chicago, IL: F. E. Peacock Publishers, 1973), 45. 6. R. L. Hilgert and T. Haimann, Supervision: Concepts and Practices of Management, 5th ed. (Cincinnati, OH: South-Western Publishing Co.). 7. “Maslow’s Hierarchy of Needs,” http://chiron.valdosta.edu/whuitt/col/ regsys/maslow.html. 8. “Maslow’s Hierarchy of Needs,” http://chiron.valdosta.edu/whuitt/col/ regsys/maslow.html. 9. Nalla & Newman. 10. Fisher & Green. 11. Fisher & Green. 12. C. E. Simonsen, Private Security in America: An Introduction (Upper Saddle River, NJ: Prentice Hall, 1998), 202. 13. R. M. Momboise, Industrial Security for Strikes, Riots, and Disasters (Springfield, IL: Charles C. Thomas, 1968), 13. 14. D. Dalton, The Art of Successful Security Management (Woburn, MA: Butterworth-Heinemann, 1998), 217–220. ISBN: 0-536-91271-8 Identifying and Exploring Security Essentials, by Mary Clifford. Published by Prentice-Hall. Copyright © 2004 by Pearson Education, Inc.

You May Also Find These Documents Helpful

  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    The level of security can determine the rise and fall of any organization, no matter how big or small the company may seem, so mitigating risk should always be the number one priority. Risk mitigation can be define as the process of implementing any form strategic actions that will reduce the level of threats that may cause financial hardship towards the organization. In addition, risk mitigation tracks, identify and evaluation all form of risk, including new and old. The focus of risk mitigation is to assist the organization’s department of security administration with identifying a list of potential problems that…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    References: Clifford, M. (2004). Identifying and Exploring Security Essentials. Upper Saddle River, NJ: Pearson Prentice-Hall…

    • 705 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This Learning Team Project requires students to develop a semi-quantitative, weighted analysis that generates a comprehensive threat/vulnerability analysis of enterprise security, along with appropriate security measures and recommendations. Additionally, the readings provide background information supporting various techniques, as well as how to do assessments, how to create rankings, and so forth. These readings should be previewed as early as possible, rather than waiting for the specific week. The Enterprise Security Plan is due in Week…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    LESMA204

    • 2205 Words
    • 7 Pages

    References: The Open University of Hong Kong. LESM A204 Security Practices and Management (Unit2). Hong Kong: OUHK…

    • 2205 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Patting Down the TSA

    • 2182 Words
    • 9 Pages

    Cited: Kulash, Damian J. "It 's A Long Road To Security." Transportation Quarterly 56.4 (2002): 5.…

    • 2182 Words
    • 9 Pages
    Better Essays
  • Better Essays

    The historical development of private security in the United States has changed drastically over the centuries. The need for private security has grown as well. There are many gaps and areas for intrusion within the current public law enforcement system, almost mandating the necessity for private security. As the need and expectations for the private security grows, so will the qualifications for these positions. Understanding the history of the industry development creates a way to learn from the past, and make necessary changes for the future. Private security is the backbone of the American culture, and will continually evolve to prevent and protect society from any type of potential harm.…

    • 1277 Words
    • 6 Pages
    Better Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    International Relations

    • 2065 Words
    • 9 Pages

    Buzan, B. 1997. Rethinking Security after the Cold War. Cooperation and Conflict. Vol. 32, No. 1: 5-28.…

    • 2065 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays

Related Topics