StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Chapter 3, Security Surveys and the Audit, in the Fennelly textbook - Essay Example

Cite this document
Summary
This strategy is necessary due to the recent failures of the conventional security gadgets in detecting threats that almost lead to loss of lives. One such…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Chapter 3, Security Surveys and the Audit, in the Fennelly textbook
Read Text Preview

Extract of sample "Chapter 3, Security Surveys and the Audit, in the Fennelly textbook"

Homeland Security looked into covert body scans due Why is this type of development necessary in the United States?The Department of Homeland Security needs to incorporate the Covert Body Scans into the country’s security system. This strategy is necessary due to the recent failures of the conventional security gadgets in detecting threats that almost lead to loss of lives. One such example is the recent Detroit failed plane terrorist takeover case, where the security instruments failed to detect the guns carried by the terrorists as they boarded the plane.

Other incidences where conventional policing has failed include the increasing shootings in academic institutions, illegal crossings at the Mexican border and bank and retail shops robberies. The advanced Covert Body Scans would detect concealed weapons in these cases in a detailed manner, such as which conventional methods like body taps would not. The Covert Body Scans would also ease up the long passenger queues caused by the current slow security systems, thus saving time for passengers and other officials.

On the onset of security threats, many travel avenues heighten security measures leading to long queues, cancelled trips and inconvenienced passengers. The covert security scanners would see an end to this since they can scan people as they move through, thus eliminating long, stagnant queues. These systems are also useful in that they are multipurpose in nature that is they can detect a wide variety of security threats from airborne pathogens and illegal immigrants, to concealed weapons (Fennelly, 2013).2) Where would the implementation of these technologies be acceptable?

The implementation of the covert security scanners is acceptable wherever imminent threat to human lives is constant, either directly or indirectly. Such locations include airports, academic institutions, the Mexican border, entries to prominent buildings like major banks and the white house.3) Would the implementation/testing be permissible for the private sector?As indicated earlier, these security systems are a necessity wherever there is a threat to human life. Statistics indicate that more security threats occur in the private sectors than the public ones.

These include private institutions like schools, banks, and shopping malls. Some, however, would argue that this development would be an infringement of the right to confidentiality. There requires to be a balance between the value of life and the preservation of privacy. Furthermore, Homeland security assesses and mitigates privacy implications that could result from developed security systems.4) How would the implementation of these technologies help safeguard life and property within critical infrastructure?

Such security technologies would definitely be of immense assistance in safeguarding lives and property if implemented. The covert security scanners expose objects in as acute details as none other gadgets can. For example, terrorists have come up with weapon concealing methods that none of the current security checks could detect. The covert systems would however, beat them to their game as they leave no cavity in any object unexposed, proving its efficiency in safeguarding lives and property. 5) Can you think of any recent current events where the use of this technology would have been useful to the American public?

Many recent security threats would have been averted had the security systems been implemented. Such cases include the Nevada school shooting of October 2013 that led to the death of three people; the attack of Metcalf electric station where 16 gunmen stole 17 transformers and the left the station in a highly life threatening state and the LAX airport shooting that occurred last year and left 11 people dead. Had the covert security scans been implemented, there would have been early detection of weapon in all the above cases, giving the authorities enough time to take the necessary mitigations (Frank, 2011).

ReferencesFennelly, L. J. (2013). Effective physical security.Frank, T. (2011,March 4). Homeland Security looked into covert body scans.Retrieved from:http://usatoday30.usatoday.com/news/washington/2011-03-04-bodyscans04_ST_N.htm

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Chapter 3, Security Surveys and the Audit, in the Fennelly textbook Essay”, n.d.)
Chapter 3, Security Surveys and the Audit, in the Fennelly textbook Essay. Retrieved from https://studentshare.org/human-resources/1628614-chapter-3-security-surveys-and-the-audit-in-the-fennelly-textbook
(Chapter 3, Security Surveys and the Audit, in the Fennelly Textbook Essay)
Chapter 3, Security Surveys and the Audit, in the Fennelly Textbook Essay. https://studentshare.org/human-resources/1628614-chapter-3-security-surveys-and-the-audit-in-the-fennelly-textbook.
“Chapter 3, Security Surveys and the Audit, in the Fennelly Textbook Essay”, n.d. https://studentshare.org/human-resources/1628614-chapter-3-security-surveys-and-the-audit-in-the-fennelly-textbook.
  • Cited: 0 times

CHECK THESE SAMPLES OF Chapter 3, Security Surveys and the Audit, in the Fennelly textbook

Importance of Security Survey or Audit

It holds great value while conducting surveys and can be considered as a right approach for Security Surveys.... Security is often defined as a pro-active approach of assessing the internal and external environmental factors that may affect the health of the organization and its… The discussion aims at highlighting the purpose of security surveys in the success and development of organizations across the globe.... The discussion aims at highlighting the purpose of security surveys in the success and development of organizations across the globe....
2 Pages (500 words) Essay

Textbook Evaluation Justification

As… Fourth grade students need to acquire skills applicable both to classroom-based activities and outside activities so as to make them useful people immediately textbook Evaluation Justification: Harcourt Language Justification for Selection of Harcourt Language TextbookThe Content of the BookThe limited context of the textbook title Language by Beech and Cramer (1989) in dealing with out-of-class activities renders its redundant.... The first textbook limits the fourth grade students to classroom-based activities thus making in inappropriate....
2 Pages (500 words) Assignment

Textbook chapter summary

For this chapter, the four selected chapters will be summarized separately along with their key content and… chapter 18 describes the laws of remedies for breach of sales and lease contracts.... In chapter 19 the warranties and product liabilities and its implications are being discussed.... The chapter talks about the language that should be used in order to claim the warranty or the product liability and the terms in which the claim is applicable....
4 Pages (1000 words) Assignment

Course Project Phase Two Deliverable Security Lighting in the Fennelly textbook

The facility is surrounded by numerous socialization centers, thus risk-based prioritization prompts the general security of this building.... This calls for physical security asset control.... No, there have been no substantial security incidences at the facility in the last 2-3 years.... This shows that the facility is well protected; high standards of security are maintained in this building.... The facility contains existing technologies in enabling key security services i....
2 Pages (500 words) Essay

Writing Assignment #2 Fence Standards, from the Fennelly textbook

The type of locks needed in facilities that require secrecy and confidentiality are dependent on a combination of correlated factors that involve design, installation, manufacturing, and system maintenance (fennelly, 2012).... Doors, gates and other forms of entrance must be well lit in so as to allow for observation of persons and vehicles coming in and out (fennelly, 2012).... The security product of choice for more than 60 years has been chain link fencing, reason being it is strong, easy to install, corrosion resistant has transparent abilities, versatile, value, and product variety selection(Finnelly, 2012, 269)....
3 Pages (750 words) Essay

RCP 3 Chapter 3

In view of the numerous information assets that it already owns, Data Mart has no reason to be left out of the organizations already embracing the principle of least privilege.... The principle dictates that each module within an IT environment (such as a user) should be capable of… Besides, the principle also restricts the level of use of administrative credentials among administrators just to the administrative tasks....
3 Pages (750 words) Coursework

Audit and Control Security Technology

the audit and control technology, however, has been initiated by experts with the latest technology.... This case study "audit and Control Security Technology" analyzes audit and control security technology used in banks as well as the aspects attributed to the technology.... The document below analyzes audit and control security technology used in banks as well as the aspects attributed to the technology.... With an effective security technology, the banks are capable of withstanding the threats, keeping its systems safe....
7 Pages (1750 words) Case Study

Comparison of Communication Studies Textbook and Website on Film Production

The4 author of this essay "Comparison of Communication Studies textbook and Website on Film Production" outlines their purpose, organization structure, comprehensiveness, use of sources, and credibility.... The book chapter's aim is to discuss the effects produced by codes, which arise due to the technical nature of medium on films (Marsen, 2006: p....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us