StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Functions Specializing in Safeguarding Sensitive Assets - Annotated Bibliography Example

Cite this document
Summary
This paper "Security Functions Specializing in Safeguarding Sensitive Assets" provides an annotated bibliography on the issue of safety. According to Loughlin, (2009), there are various ways of safeguarding the assets of people depending on what kind of asset it is. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Security Functions Specializing in Safeguarding Sensitive Assets
Read Text Preview

Extract of sample "Security Functions Specializing in Safeguarding Sensitive Assets"

Conducting vulnerability assessmentsKemp, R. (2007). "Assessing the vulnerability of buildings." Disaster Prevention and Management, Vol. 16 (4), pp.611 – 618. There are several different ways the assessment of vulnerable buildings in different facilities should happen according to (Kemp, 2007). These different ways are meant to ensure the security of these facilities and minimize or entirely prevent disasters that may be brought about by them not being rigid. Some of these ways include the type of construction, access to the site, the height of the building and even location among other ways.

Contemporary needs for protection and loss prevention Hayes, R. (2003). “Loss Prevention: Senior Management Views on Current Trends and Issues.” Security Journal, vol. 16, pp. 7-20. doi:10.1057/palgrave.sj.8340129 According to Hayes, (2003), the traditional methods of loss prevention seem not to be working and especially in multi-million dollar companies hence putting the security of their assets in jeopardy. The senior management in these companies has decided on using technology as a contemporary measure to prevent further loss and protect the assets of the customers.

This technology as a contemporary measure requires linkage with other managers in the business for it to be successful. Historical and economic perspectives of security measuresCalder, J. (2002) “Security Operations Management.” Security Journal, vol. 15, pp. 75-76. According to the article, managers have always viewed security in terms of guards (physical security) as a form of security management. However, with cases of the guards and other physical security measures starting to be outdated and outmanoeuvred by the information security system, the management has started adopting this by increasing the budget they allocate to the security dockets in their companies and this has gone way ahead to yield positive results as loss is prevented more without any injuries being inflicted on security personnel. 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security Functions Specializing in Safeguarding Sensitive Assets Annotated Bibliography, n.d.)
Security Functions Specializing in Safeguarding Sensitive Assets Annotated Bibliography. Retrieved from https://studentshare.org/law/1625259-security-management
(Security Functions Specializing in Safeguarding Sensitive Assets Annotated Bibliography)
Security Functions Specializing in Safeguarding Sensitive Assets Annotated Bibliography. https://studentshare.org/law/1625259-security-management.
“Security Functions Specializing in Safeguarding Sensitive Assets Annotated Bibliography”, n.d. https://studentshare.org/law/1625259-security-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Functions Specializing in Safeguarding Sensitive Assets

Security in E-Business

The author of the paper “Security in E-Business” presents that the main objective of a security plan in e-business is to “protect the privacy of the people with whom you do business and safeguard your IT and other information assets.... The main objective of a security plan in e-business is to “protect the privacy of the people with whom you do business and safeguard your IT and other information assets.... e-business enterprisers should conduct evaluation processes on their technological capabilities including multiple areas (“Approach to e-business security”, 2007), Core authentication and authorization functions Security policy setting Support for existing enterprise software Manageability Scalability and reliability Privacy Software quality Above all, protection of information or data focuses on three core elements as pointed out in E-business guide (“Protecting”, 2008) Confidentiality: Assuring sensitive data is disclosed only to authorized individuals....
1 Pages (250 words) Essay

Basic Security in Corrections

inally by identifying the most critical Basic security functions in the department of Corrections we have a clear view of which areas need more focus for the Continued being of the Organization.... asic Securities refers to all the procedures followed within an organization for ensuring safeguarding of assets, guaranteeing the precision and reliability of records, and encouraging operational correctness and observance to prescribed procedures.... Internal Controls also includes the safeguarding of the Computer Systems in the Organization....
2 Pages (500 words) Essay

Assess Asset allocation decision and security selection strategies

Immunization in the context of bond portfolio refers to an approach which matches the period of the firm's assets and liabilities with a view of reducing the effect of interest rates on the total net worth of the firm.... The short term bonds have the least standard deviation which implies that the asset has a lower risk as compared to others and although it is the fund with the least expected return the level of volatility will be reduced as desired by Ahmed. The expected return and the… deviation of the combined portfolio justify the answer in part 3 in the sense that it has a high expected return and a low standard deviation as compared to the current portfolio. If the investor expects a share move up in the market an arbitrage process will take place such at he will sell the ownership of the undervalued shares that he holds, borrow loan at an interest rate equivalent to his shareholding in that firm and then buy shares of equivalent proportion in the market....
3 Pages (750 words) Assignment

Enigma Security Services - Most Important Threats and Assets

The paper "Enigma Security Services - Most Important Threats and assets" describes that the processes of setting up security policies for the company must be in line with the legal provisions, as well as uphold the rights, freedom, and privileges of the staff at the company.... hellip; Security is just an aspect to ensure that the assets and sensitive information of the company are safe and do not fall into the wrong hands.... s such, it so appears that the company has to protect its assets, as well as sensitive information from the theft of all kinds, be it leakage, internal operators of the company, as well as external perpetrators keen on acquiring illegally the company's assets and information....
12 Pages (3000 words) Coursework

Principles of Information Security

This paper “Principles of information security” analyzes the state of an information system in a company before proposing various issue-specific policies capable of enhancing the efficiency and effectiveness of the system.... Information policies influence the nature of the information systems in a company....
9 Pages (2250 words) Essay

Physical Security Designing

The creation of layers from the perimeter moving inwards towards specific critical and strategic assets within the facility.... The layers will generally adopt particular functions that may include; (1) Deterrence, (2) Detection, (3) Delaying, (4) Assessment, and/or (5) Response.... The main purpose of this paper “Physical security Designing” is to produce the standard operating procedures as pertains to the procedural, physical and cyber security within the facility....
6 Pages (1500 words) Assignment

Safeguarding Forests and People

In the paper “safeguarding Forests and People” the author provides a theoretical perspective in terms of the background information on the formation of the REDD+ safeguards design in the respective countries.... hellip; This report seeks to support the safeguarding process through the provision of a framework that defines the components of the robust national system.... This would also aid in the provision of information on how the system functions....
9 Pages (2250 words) Assignment

The Implementation of the Security Plan

o develop security measures and programs that will ensure that the employees and information regarding the assets of the company are safeguarded from outside threats and vulnerabilities and that will provide the bank with retaliatory programs in terms of preventing penetration to the banking information systems.... The assets that the bank has and that can be accessed by individuals outside will be included in the implementation the action plan.... o ensure that the information security regarding the business is safeguarded and that loopholes are dealt with immediately to prevent leakage and hacking and, therefore, unauthorized access to sensitive information of the bank and the accounts of the people....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us