The Security Professional and their role in Emergency, Disaster and Contingency Planning

The Security Professional and their role in Emergency, Disaster and Contingency Planning Essay example
College
Essay
Design & Technology
Pages 16 (4016 words)
Download 0
Title: SECURITY PROFESSIONALS Name: Professor: Institution: Course: Date: Abstract A nation can be termed as developed if it has appropriate security measures put in place to take care of emergencies, disasters or predicted contingencies. This would imply that it should have resourceful and well skilled security professional to handle any eventuality that may occur at any given time…

Introduction

It also explains the measures and techniques that the security professional use to handle different emergencies or disasters. An emergency refers to an unforeseen combination of circumstances whose resulting states of nature require immediate attention and actions. An emergency may be serious to the extent that if no immediate attention is provided, it can result to crucial and fatal situations. A contingency, on the other hand, refers to an event that has the possibility of either occurring or not occurring in the future as predicted. A disaster can occur if people live near hazardous areas like unstable slopes where landslides are most likely to happen active volcanoes or close to rivers that are likely to burst and flood any minute. Introduction Security professionals are a group of low voltage contractors, individuals, or firms that specialize in the installation of security systems (Fischer, 2008). These systems are installed either at homes, offices, business premises, military camps, or even sport centers and clubs. Security professional also engage in maintenance and servicing of the security systems installed at any given destination. ...
Download paper
Not exactly what you need?

Related papers

Security Technology
Security cameras are one aspect of business security that is commonly used across many different business types. Often a number of video cameras transmit their signals to a specific point, frequently a set of monitors. This system is known as closed-circuit television (CCTV) the name derives from the fact that although a television signal is produced it is not transmitted openly, and as a…
Technology Support System For Homeland Security Program
Former Senator Rudman views the department to be a needed “formulation” in spite of the existing of great Army, Marine Corps and Air Force (2003). However, in assessing the organization and mission of the DHS, this proposal sees the agency to be wanting in resources and capacity along the aspects of independent mobilization and focus of initiatives. Organizationally, the DHS has to correlate…
System Planning and Design
In addition it is also imperative to understand hardware platforms for deployment of developed systems such that failure of operation is avoided (Smith, 2012). In this regard requirement analysis becomes essential. Secondly, since the onset of the digital era, there has been overwhelming demand for digitizing existing and forthcoming records and consequently information system building has to…
Emergency Technologies
Additionally, the discussion delves on the disadvantages of the same technologies in abetting crimes such as hacking and phising. There are various advantages of computers and the use of computer technology in investigations. For instance, in the determination of crimes, it is essential to conduct forensic investigations. This is to identify their authenticity in order to unearth the evidence.…
Data Governance, Quality, Integration, and Security
Although these aspects are closely interrelated within a system, addressing and improving them independently results in better performance of the system as a whole (Arens, Chee, Hsu & Knoblock, 1993). Data Governance Data governance encompasses a set of procedures ensuring that important assets in data form are properly managed in all divisions of an enterprise (Abiteboul, Benjelloun & Milo,…
Security Audit
Also, some team members violated integrity and confidentiality assertions by disclosing information to external parties. This paper entails the details and implications of security audit procedures carried out and observations noted. Conducting audit Lafleur has a complicated network of information systems in place, with various remote offices and centralized IT function. Therefore, to evaluate…
NFC Security Issues: A Case Study
Particularly, this form of technology is quite popular in advanced nations such as Japan (Gordon & British Computer Society, 2007). However, according to various studies that have been conducted into the technology, especially in the UK by a team of researchers from Surrey University, an alarm is fast being raised about the security risks involved with the same, particularly with regard to the…