Got a tricky question? Receive an answer from students like you! Try us!

Security Management Paper - Essay Example

Only on StudentShare
Pages 8 (2008 words)


As stated in the Security Management Practices, control is important to reduce the effects of security threats and vulnerabilities to a level that is tolerable by an organization. [2001,p.4]. In this paper the following are discussed: the matrix in hiring personnel, policy on how to deal with privacy issues in conducting surveillance and intelligence gathering, analyzing a budget for a security organization, and the policy and procedures for dealing with issues such as sexual harassment, discrimination, physical security, and personal protection.

Extract of sample
Security Management Paper

The matrix is use to be able to provide equal opportunity to all the applicants on lawful job related and non-discriminatory criteria. A pre-designed tool was created by Texas Tech as a hiring selection matrix. The matrix composed of a spreadsheet, which helps to evaluate the applicant. The snapshot of the matrix is shown below (figure 1). To start with this matrix on the upper portion of the matrix just types the required qualification of the person needed for the job. The preferred skills may include education, Clerical experience, MS Office experience, ten key by touch, TTU experience, bookkeeping experience, keyboarding score and spelling score. On the lower part of the preferred skills you can rate the skills from 1 to 5 (with 5 as the highest scale).
Once the application received, the name of the applicant can be inserted on the applicants' column. Opposite to the applicant column are column wherein you can put your rate for a certain applicant (rate 1 to 5 - 5 is the highest). ...
Download paper
Not exactly what you need?

Related Essays

Information Security
There is also a vast body of empirical evidence that demonstrates that general managers ought to be much more involved in the formulation and implementation of information security because they are more able to assess particular types of risks, more attuned to cost-benefit considerations, and better able to integrate information security into a business organization's larger structure than narrow-minded security specialists (Lacity, 2005). In order to more clearly elaborate how organizations should approach information security issues, this essay will discuss how businesses should strike a…
4 pages (1004 words)
Change Management Plan Paper
Technology and innovative approaches to business are the main priorities of this company. In order to remain competitive and sustain its strong market position, CrysTel needs effective change models and leadership styles to support current improvements and innovations.…
12 pages (3012 words)
Knowledge Management paper
Knowledge is, to an enterprise or an individual, the possession of information or the ability to quickly locate it. This is essentially what Samuel Johnson, compiler of the first comprehensive English dictionary, said when he wrote that: "Knowledge is of two kinds: we know a subject ourselves, or we know where we can find information upon it." (Source website http:/,sid19_gci212448, 00.html)…
11 pages (2761 words)