Got a tricky question? Receive an answer from students like you! Try us!

Security Management Paper - Essay Example

Only on StudentShare
Author : herbertdickinso

Summary

As stated in the Security Management Practices, control is important to reduce the effects of security threats and vulnerabilities to a level that is tolerable by an organization. [2001,p.4]. In this paper the following are discussed: the matrix in hiring personnel, policy on how to deal with privacy issues in conducting surveillance and intelligence gathering, analyzing a budget for a security organization, and the policy and procedures for dealing with issues such as sexual harassment, discrimination, physical security, and personal protection.

Extract of sample
Security Management Paper

The matrix is use to be able to provide equal opportunity to all the applicants on lawful job related and non-discriminatory criteria. A pre-designed tool was created by Texas Tech as a hiring selection matrix. The matrix composed of a spreadsheet, which helps to evaluate the applicant. The snapshot of the matrix is shown below (figure 1). To start with this matrix on the upper portion of the matrix just types the required qualification of the person needed for the job. The preferred skills may include education, Clerical experience, MS Office experience, ten key by touch, TTU experience, bookkeeping experience, keyboarding score and spelling score. On the lower part of the preferred skills you can rate the skills from 1 to 5 (with 5 as the highest scale).
Once the application received, the name of the applicant can be inserted on the applicants' column. Opposite to the applicant column are column wherein you can put your rate for a certain applicant (rate 1 to 5 - 5 is the highest). ...
Download paper

Related Essays

Information Security
There is also a vast body of empirical evidence that demonstrates that general managers ought to be much more involved in the formulation and implementation of information security because they are more able to assess particular types of risks, more attuned to cost-benefit considerations, and better able to integrate information security into a business organization's larger structure than narrow-minded security specialists (Lacity, 2005). In order to more clearly elaborate how organizations should approach information security issues, this essay will discuss how businesses should strike a…
4 pages (1004 words)
Change Management Plan Paper
Technology and innovative approaches to business are the main priorities of this company. In order to remain competitive and sustain its strong market position, CrysTel needs effective change models and leadership styles to support current improvements and innovations.…
12 pages (3012 words)
Knowledge Management paper
Knowledge is, to an enterprise or an individual, the possession of information or the ability to quickly locate it. This is essentially what Samuel Johnson, compiler of the first comprehensive English dictionary, said when he wrote that: "Knowledge is of two kinds: we know a subject ourselves, or we know where we can find information upon it." (Source website http:/searchcio.techtarget.com/sDefinition/0,sid19_gci212448, 00.html)…
11 pages (2761 words)
Physical Security Principles Paper
Physical security describes both measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media and guidance on how to design structures to resist various hostile acts. (Task Committee 1999) According to O’Sullivan (2003), security planning should encompass the following areas: (1) identification of assets; (2) exposing losses; (3) assignment of occurrence probability factors; (4) assessment of the impact of occurrence; and (5) selection of countermeasures.…
3 pages (753 words)
Security Management (
All in all a complete security picture has been painted through this report.…
7 pages (1757 words)
Security Management
This evaluation is often referred to as Return on Investment (ROI) in finance. The Return on Investment is calculated by:…
17 pages (4267 words)
Security Management
This evaluation is often referred to as Return on Investment (ROI) in finance. The Return on Investment is calculated by:…
17 pages (4267 words)