The Security Professional and their role in Emergency, Disaster and Contingency Planning - Essay Example

Only on StudentShare

Extract of sample
The Security Professional and their role in Emergency, Disaster and Contingency Planning

It also explains the measures and techniques that the security professional use to handle different emergencies or disasters. An emergency refers to an unforeseen combination of circumstances whose resulting states of nature require immediate attention and actions. An emergency may be serious to the extent that if no immediate attention is provided, it can result to crucial and fatal situations. A contingency, on the other hand, refers to an event that has the possibility of either occurring or not occurring in the future as predicted. A disaster can occur if people live near hazardous areas like unstable slopes where landslides are most likely to happen active volcanoes or close to rivers that are likely to burst and flood any minute. Introduction Security professionals are a group of low voltage contractors, individuals, or firms that specialize in the installation of security systems (Fischer, 2008). These systems are installed either at homes, offices, business premises, military camps, or even sport centers and clubs. Security professional also engage in maintenance and servicing of the security systems installed at any given destination. ...
Download paper

Summary

Title: SECURITY PROFESSIONALS Name: Professor: Institution: Course: Date: Abstract A nation can be termed as developed if it has appropriate security measures put in place to take care of emergencies, disasters or predicted contingencies. This would imply that it should have resourceful and well skilled security professional to handle any eventuality that may occur at any given time…
Author : rosaliaschmitt

Related Essays

Security Technology
Security cameras are one aspect of business security that is commonly used across many different business types. Often a number of video cameras transmit their signals to a specific point, frequently a set of monitors. This system is known as closed-circuit television (CCTV) the name derives from the fact that although a television signal is produced it is not transmitted openly, and as a consequence cannot be picked up by exterior parties (Levine, 2000). The term CCTV can be technically used to refer to most types of video cameras; however, it is generally used to apply to those that are...
8 pages (2008 words) Essay
Technology Support System For Homeland Security Program
Former Senator Rudman views the department to be a needed “formulation” in spite of the existing of great Army, Marine Corps and Air Force (2003). However, in assessing the organization and mission of the DHS, this proposal sees the agency to be wanting in resources and capacity along the aspects of independent mobilization and focus of initiatives. Organizationally, the DHS has to correlate with federal agencies to be able to mobilize anti-terrorism initiatives; it also lacks the integrated mechanism so that the department can effectively interface with the anti-terrorism network of...
12 pages (3012 words) Assignment
System Planning and Design
In addition it is also imperative to understand hardware platforms for deployment of developed systems such that failure of operation is avoided (Smith, 2012). In this regard requirement analysis becomes essential. Secondly, since the onset of the digital era, there has been overwhelming demand for digitizing existing and forthcoming records and consequently information system building has to solve these problems. Such demand thus calls for specific design that takes into consideration all these requirements hence the need for system specification (Johnson, 2011). When all specific system...
7 pages (1757 words) Essay
Emergency Technologies
Additionally, the discussion delves on the disadvantages of the same technologies in abetting crimes such as hacking and phising. There are various advantages of computers and the use of computer technology in investigations. For instance, in the determination of crimes, it is essential to conduct forensic investigations. This is to identify their authenticity in order to unearth the evidence. However, despite the numerous benefits of forensics, it also has its disadvantages. On that note, the prevention of crimes such as corporate fraud, intellectual property disputes, phising and...
2 pages (502 words) Essay
Data Governance, Quality, Integration, and Security
Although these aspects are closely interrelated within a system, addressing and improving them independently results in better performance of the system as a whole (Arens, Chee, Hsu & Knoblock, 1993). Data Governance Data governance encompasses a set of procedures ensuring that important assets in data form are properly managed in all divisions of an enterprise (Abiteboul, Benjelloun & Milo, 2002). The processes ensure that data is trustworthy and employees can be held accountable for any harmful occurrences that take place due to low quality of data. The organization under review was found...
4 pages (1004 words) Essay
Security Audit
Also, some team members violated integrity and confidentiality assertions by disclosing information to external parties. This paper entails the details and implications of security audit procedures carried out and observations noted. Conducting audit Lafleur has a complicated network of information systems in place, with various remote offices and centralized IT function. Therefore, to evaluate this complex system, detailed audit procedures were planned including manual as well as automated assessments. Manual assessments mainly comprised interviewing procedures, performing physical checks and...
3 pages (753 words) Essay
NFC Security Issues: A Case Study
Particularly, this form of technology is quite popular in advanced nations such as Japan (Gordon & British Computer Society, 2007). However, according to various studies that have been conducted into the technology, especially in the UK by a team of researchers from Surrey University, an alarm is fast being raised about the security risks involved with the same, particularly with regard to the safety of private information of a client that is stored in it. This is because, the likely threats that arise are when the transmission for payments are made, which can be a few meters away from the...
6 pages (1506 words) Case Study
Got a tricky question? Receive an answer from students like you! Try us!