Free

Chapter 3, Security Surveys and the Audit, in the Fennelly textbook - Essay Example

Comments (0) Cite this document
Summary
This strategy is necessary due to the recent failures of the conventional security gadgets in detecting threats that almost lead to loss of lives. One such…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
Chapter 3, Security Surveys and the Audit, in the Fennelly textbook
Read TextPreview

Extract of sample "Chapter 3, Security Surveys and the Audit, in the Fennelly textbook"

Homeland Security looked into covert body scans due Why is this type of development necessary in the United States?
The Department of Homeland Security needs to incorporate the Covert Body Scans into the country’s security system. This strategy is necessary due to the recent failures of the conventional security gadgets in detecting threats that almost lead to loss of lives. One such example is the recent Detroit failed plane terrorist takeover case, where the security instruments failed to detect the guns carried by the terrorists as they boarded the plane. Other incidences where conventional policing has failed include the increasing shootings in academic institutions, illegal crossings at the Mexican border and bank and retail shops robberies. The advanced Covert Body Scans would detect concealed weapons in these cases in a detailed manner, such as which conventional methods like body taps would not.
The Covert Body Scans would also ease up the long passenger queues caused by the current slow security systems, thus saving time for passengers and other officials. On the onset of security threats, many travel avenues heighten security measures leading to long queues, cancelled trips and inconvenienced passengers. The covert security scanners would see an end to this since they can scan people as they move through, thus eliminating long, stagnant queues. These systems are also useful in that they are multipurpose in nature that is they can detect a wide variety of security threats from airborne pathogens and illegal immigrants, to concealed weapons (Fennelly, 2013).
2) Where would the implementation of these technologies be acceptable?
The implementation of the covert security scanners is acceptable wherever imminent threat to human lives is constant, either directly or indirectly. Such locations include airports, academic institutions, the Mexican border, entries to prominent buildings like major banks and the white house.
3) Would the implementation/testing be permissible for the private sector?
As indicated earlier, these security systems are a necessity wherever there is a threat to human life. Statistics indicate that more security threats occur in the private sectors than the public ones. These include private institutions like schools, banks, and shopping malls. Some, however, would argue that this development would be an infringement of the right to confidentiality. There requires to be a balance between the value of life and the preservation of privacy. Furthermore, Homeland security assesses and mitigates privacy implications that could result from developed security systems.
4) How would the implementation of these technologies help safeguard life and property within critical infrastructure?
Such security technologies would definitely be of immense assistance in safeguarding lives and property if implemented. The covert security scanners expose objects in as acute details as none other gadgets can. For example, terrorists have come up with weapon concealing methods that none of the current security checks could detect. The covert systems would however, beat them to their game as they leave no cavity in any object unexposed, proving its efficiency in safeguarding lives and property.
5) Can you think of any recent current events where the use of this technology would have been useful to the American public?
Many recent security threats would have been averted had the security systems been implemented. Such cases include the Nevada school shooting of October 2013 that led to the death of three people; the attack of Metcalf electric station where 16 gunmen stole 17 transformers and the left the station in a highly life threatening state and the LAX airport shooting that occurred last year and left 11 people dead. Had the covert security scans been implemented, there would have been early detection of weapon in all the above cases, giving the authorities enough time to take the necessary mitigations (Frank, 2011).
References
Fennelly, L. J. (2013). Effective physical security.
Frank, T. (2011,March 4). Homeland Security looked into covert body scans.Retrieved from:
http://usatoday30.usatoday.com/news/washington/2011-03-04-bodyscans04_ST_N.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Chapter 3, Security Surveys and the Audit, in the Fennelly textbook Essay”, n.d.)
Chapter 3, Security Surveys and the Audit, in the Fennelly textbook Essay. Retrieved from https://studentshare.org/human-resources/1628614-chapter-3-security-surveys-and-the-audit-in-the-fennelly-textbook
(Chapter 3, Security Surveys and the Audit, in the Fennelly Textbook Essay)
Chapter 3, Security Surveys and the Audit, in the Fennelly Textbook Essay. https://studentshare.org/human-resources/1628614-chapter-3-security-surveys-and-the-audit-in-the-fennelly-textbook.
“Chapter 3, Security Surveys and the Audit, in the Fennelly Textbook Essay”, n.d. https://studentshare.org/human-resources/1628614-chapter-3-security-surveys-and-the-audit-in-the-fennelly-textbook.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Chapter 3, Security Surveys and the Audit, in the Fennelly textbook

Surveys

...? In a dynamic world that runs on numbers, it has become increasingly important for researchers to express populations in terms of statistical parameters. The most convenient way of extracting data from such a population is through a survey—that is, the systematic approach to studying individuals. Surveys are conducted primarily in one of two spectrums: cross-sectional, a linear survey for one point in time, or longitudinal, two separate surveys that are compared to estimate the influence of time (Rindfleisch, Malter, Ganesan, & Moorman, 2008). In both situations, surveys are conventionally conducted with the use of communicative media, such as the...
1 Pages(250 words)Essay

Security Audit

...? Security Audit: Lafleur Trading Company Introduction Lafleur Trading Company is a multinational concern based in Canada, dealing in wholesale of food items. As part of overall task, a security audit was conducted in respect of information systems incorporated at this organization. Security audit refers to assessment of effectiveness of information systems and internal controls implemented by the company’s management. Several ethical issues are also faced during security audits such as role ambiguity existed between our team members during audit work causing conflicts and violation of hierarchy lines at times. Also, some team members violated integrity and confidentiality assertions by disclosing information to external parties... . This...
3 Pages(750 words)Essay

Marketing/ communications plan

2 Pages(500 words)Essay

Textbook chapter summary

...Contemporary Business and Online Commerce Law Commercial Law In this paper, the is going to analyze different sections and their salient features of the book Contemporary Business and Online Commerce Law (Cheesemen, 2012). For this chapter, the four selected chapters will be summarized separately along with their key content and its importance in modern times. Chapter 18 describes the laws of remedies for breach of sales and lease contracts. Generally, when parties make a deal in lease or sale they sign a contract regarding the rules and regulations about the deal. They are supposed to follow it strictly. The chapter indicates that generally the obligations are about...
4 Pages(1000 words)Assignment

Course Project Phase Two Deliverable Security Lighting in the Fennelly textbook

...alarm signals, and intruder alarms. In addition, IT and networking security solutions are beneficial to this company thus offering comprehensive security, for instance, proximity readers and biometric solutions. The private security company is responsible for maintaining high security levels in the organization. Without this, critical data, intellectual property, assets, corporate security and property are at risk. Pictures of Lexington Financial Center Physical Security Survey (3.B) Exterior physical characteristics: perimeter grounds 1. What types of locks and chains are used to...
2 Pages(500 words)Essay

Writing Assignment #2 Fence Standards, from the Fennelly textbook

...(Finnelly, 2012, 96). 3. These barriers act as a warning sign to people to not try to enter specified areas. Locks The type of locks needed in facilities that require secrecy and confidentiality are dependent on a combination of correlated factors that involve design, installation, manufacturing, and system maintenance (Fennelly, 2012). In addition, not all locks are applicable in most situation, specifically designed locks are usually used in specifically provided situation, hence sufficient knowledge of basic principles of locking systems are inevitable. Lighting Consideration Security lighting is an effective deterrent method. Attackers will never enter a well-lit area or premise....
3 Pages(750 words)Essay

Rhetorical and Visual Analysis

6 Pages(1500 words)Essay

RCP 3 Chapter 3

... the layered approach towards securing the information assets owned by Data Mart Company. References Ben-Natan, R. (2005). Implementing database security and auditing: A guide for DBAs, information security administrators and auditors. Burlington, MA: Elsevier Digital Press. Meghanathan, N., & CNSA <3, 2010, Chennai>. (2010). Recent trends in network security and applications: Third international conference ; proceedings. Berlin: Springer. Pollack, K. M., & Brookings Institution. (2006). A switch in time: A new strategy for America in Iraq. Washington, DC: Saban Center for Middle East Policy at the Brookings Institution.... RCP 3 Chapter 3 RCP 3 Chapter 3...
3 Pages(750 words)Coursework

Security audit assignment

...Security Audit Grade (April 2, Security Audit I chose to undertake a security audit on a health institution. Physical security on the health institution in which the security audit was conducted is available. There are security guards who are duty 24 hours a day and seven days a week, manning both the main gate and also other entries and exits that are specifically used by the staff to the hospital. The separation of the gates for public use and the staff use is also an element of physical security provision. Administrative safeguards are also present in...
3 Pages(750 words)Assignment

Chapter 3

...Average annual emission of carbon per person is 19.8 MT. It costs about 23 dollars per month and therefore on n annual basis it will cost 276$. The carbon footprint score comes from food which takes up 27% of the annual carbon emission followed by home which makes 3%, travel which takes 44% and stuff which take about 15% of the total consumption. Food-(0.27*19.8*276) =1475.45, Home-(0.03*19.8*276) =163.94, Travel-(0.44*19.8*276) =2404.5, Stuff-(0.15*19.8*276) =819.72, Total carbon footprint =4863.61kgCO2e Ecological footprint components are food, shelter, goods and mobility. The percentage contribution of food is 32%, products 21%,housing 29% and mobility 18%.Therefore ecological footprint will be as shown; Food=2.72,...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Chapter 3, Security Surveys and the Audit, in the Fennelly textbook for FREE!

Contact Us