Security Management - Essay Example

Only on StudentShare

Extract of sample
Security Management

organizing physical detection, alarm, response, and control systems; for many federal and private occasions and on regular basis. According to Mullins, a central part of the study of organization and management is the development of management thinking and what might be termed management theory. The application of theory brings about change in actual behavior. So when a security specialist starts applying the management theory, he can change the entire behavior of the organization towards security.
The Security manager's primary duty involves managing and supervising the security employees. The security programs like personnel, physical, information, or industrial security does need experts in their area of specialization. A security expert in Information system may not handle all the physical security threats. This makes the necessity of security expert in that particular field to operate the security operations in the organization.
Just like, risk management, security is also to be managed with reference to its plan, standards and practices. ...
Download paper


Security programs differ in scope, complexity, and purpose. The security is needed for material, equipment, machinery tools, people, money, documents, technical and nuclear information, weapons, fuels, medical supplies, Research and development property, intellectual property, concepts, ideas etc., All these elements need to be protected under the security management program…
Author : avalangworth

Related Essays

Security definition and its roles
Historically, the concept of security was there as it has a direct link with one of the emotions-fear. Fear creates insecurity and lack of safety. This sense of insecurity is so much powerful in its realization that a fearful person would not be able to carry out its routine business and personal activities. More importantly, the impact of fear is so much influential that the fearful person would be totally crippled mentally and socially as well. It would not be wrong to say that the entire circle of that fearful person come standstill until the fearful person find some stronger reasons to…
42 pages (10542 words) Dissertation
Implementing Information Security Management Systems
Air New Zealand have a total workforce of 10,453 employees and a reported income of 71$ Million as of August 2012 (Air New Zealand, 2012). Air New Zealand can be considered as one of the lifeblood of New Zealand’s economy since it provides services that are essential in the dynamics of commerce. At about 9am in November 10, 2009, an outage of the computer system of Air New Zealand affected its airport check-in systems as well as its online bookings and call centre systems. The outage affected more than ten thousand passengers contributing to the chaos and confusion of affected airports…
11 pages (2761 words) Assignment
iPad's Security Breach
Subsequent to this breach of AT&T’s security, a lot of security issues have since arisen for the firm and other computer security firms. In addition, many interested parties have questioned the justification of hacking activities as well as the role of ethical statements and policies of computer security firms, which promote activities such as website hacking. This paper explores the subjects of the possibility of the justification of hacking, computer security firms’ ethics that promote hacking, and the social responsibilities of media firms such as Gawkers Media LLC. Justification of…
4 pages (1004 words) Essay
Security Risk Management
In this essay, I am going to highlight a successful Risk Management project undertaken by us in the Kumtor Operating Company, a prime value asset and gold mine of Kyrgyzstan.…
14 pages (3514 words) Case Study
Security Management Market
There has been a considerable increase in the academic study of security industries in recent years, which has been reflected in a corresponding growth in academic research, academic curses and publications. This increasing interest in security management, however, has not focused on the process of managing in its entirety. Rather, there has been a preoccupation with one sector and a lack of concern with the other bodies that re engaged in security management. In recent years, however, there has been a growing realization that, to explore security management fully, one has to investigate a…
31 pages (7781 words) Coursework
Computer Security Information Risk Assessment & Security Management
Before computers became ubiquitous, confidential information was stored in documents, photographs, audio or video tapes, etc. The confidentiality was ensured by keeping these items in locked safes, bank vaults, dual control safes, etc. This is prevalent to some extent even today. With Computers becoming ubiquitous, documents are now largely electronic. To preserve their integrity and confidentiality, recourse is made to password protection, data encryption, firewalls, intrusion detection software, etc. (Parker. B, Donn. Microsoft Encarta, n. d.)…
4 pages (1004 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!