StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Key Aspects Of Security Management - Report Example

Cite this document
Summary
The report "Key Aspects Of Security Management" presents a short description of how security cover can be efficiently provided to a high profile event. The job of a security manager or a security head while the event is on as well as the time to its build-up has been effectively laid out in this report. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
Key Aspects Of Security Management
Read Text Preview

Extract of sample "Key Aspects Of Security Management"

SM and Section # of The report presents a short ofhow security cover can be efficiently provided to a high profile event. The job of a security manager or a security head while the event is on as well as the time to its build-up has been effectively laid out in this report. Several security threats like crowd control, traffic management and terrorism threats have been covered. Also to add to the authenticity of the control, measures to sustain any kind of known or unknown incident have been mentioned along the course of the report. Special emphasis on the VIPs attending the event has been covered as well in this security management report. All in all a complete security picture has been painted through this report. Security Management Security in the current scenario of ever-changing geo-political situation is the major talking point of any high profile event. This is due to the nature of damage any security lapses bring in such an event, both financial and moral. The report describes a detailed insight of security arrangements made for a high profile event. The event under discussion is a family festival in the capital of a small yet important country named Pakistan. The festival, takes place on the eve of Christmas, many dignitaries including the members of the American conciliate are invited. Hence the need for maximum security arrangements has been felt and a team of security consultants have been called in from the U.S.A. The detail of the event along with the security arrangements made to tackle any kind of a contingency has been chalked out in this report. Also, features like VIP movement and other factors have been highlighted. All in all, this report outlines all the measures that have been taken for the smooth running of this family gala, which takes place in a country where the security conditions are not ideal. Event Before coming to the actual arrangements, it is very important to know the gravity of the situation and the kind of the event that has to be handled. Only then one can understand the need for security measurements needed at the venue. As briefly stated before, it is a carnival for Christian families living in the federal capital of Pakistan. As Pakistan is a Muslim country, this is not a holiday season and therefore normal life routines are not halted for Christmas. This festival is an invite only event with many VIPs on the guest like the ambassadors of U.K and U.S. Since the invites have been sent already, the background check on all the guests has been carried out using the help of local law enforcing agencies. Any security lapse can be a serious opening for any disruptive activity by the miscreants. All security aspects should been seen under the microscope, as the magnitude of the event is such that any kind of half measures on the part of the security team will most definitely result in unfavorable situations for the reputation of the country and the safety of the guests. Venue The venue for this family carnival is a park located in the heart of the Pakistani capital, Islamabad. The map extracted from Google Maps™ (Google, 2012) shows the aerial view of the park, the routes which lead into and out of the park. This park is located in the sector F-9 of Islamabad and is named "Fatima Jinnah Park" after the sister of the founder of this country. The figure also shows the four entrance points that are being used by people for going in and out of the park. Also the red highlighted section shows the exact location of the festival taking place. Also it shows the parking and many security hazards that will be explained later in the report along with the counter-measures taken by the security management team. Figure 2 shows a close-up of the main venue and the parking lots have been marked. Figure 1: Fatima Jinnah Park, Islamabad, Pakistan Figure 2: Close-up of the main venue and parking lots General Security Concerns The first and foremost requirement for monitoring and controlling any event is the establishment of the control room. This is the central location from where all the security agencies are controlled, making in a centralized operation with one man running the show causing less havoc in the time of any emergency, if it arises. The position of the control room, which is a temporary establishment, has been shown on figure 2, depicted by a red box. Site Survey Although the event and venue has been explained in detail in documents but the actual survey and on ground notes can only be made while making the on ground race. This will be done by the search party made to form any sort of threat analysis on ground. The main reason for this party is to locate the dimensions and any kind of threat to those parameters. The cordoning area that has to be covered and also the figuring out of command post is also the prime responsibility of the site survey team. Also surveying of a site is the first and foremost step in the operation of a security setup. This is a step-by-step procedure before the actual implementation of the security plan which facilitates the understanding of areas to be covered and checked (VS, 2012). Access Control Very important aspect of the event is the people who are allowed to freely move in all sections of the park or those who are guests. This comes under the area of access control and is the responsibility of the event manager and security head. Another step will be providing all the security staff with clearance badges with photo-ID it. The control room can be accessed by senior supervisors, again identified by a different color code id-card. This would screen out any miscreants and also provide a clear state of the people involved in the whole operation (Shuster, 2012). The area around the park walls will also be guarded by the local police. That will be the first line of defense, the second being the inner cordon provided by armed guards with the authority to soot any person who tries to infiltrate without proper identification cards as the guests will only be entering through one entrance. Traffic control Since the event is an invite only, gate crashers are the only crowd threat to the event. The first concern is about the influx of vehicles that will be flowing into the venue which may also have protocol vehicles causing traffic jam on the starting end of the gate. The amount of cars, if stuck at a chocking it will cause a serious hazard to the security staff and also a protocol hazard. This is a big security concern as this can very easily start a disturbing argument among the guests which is highly undesirable. Therefore a plan has been chalked out for the influx and out fluxes of the cars. The visual depiction of the plan has been shown in figure 3. The yellow lines show the road that will be allowed only for the in-coming of the cars. The red lines however show the way out of the parking lot. Only one entrance will be used by the guests, rest all three entrances will be sealed and the park closed for the general public until the event is over with. This is a safety measure although the routes are different, but no chances have been left to luck or fate as they often cause confusion resulting in hazardous situations. Figure 3: showing route in and out of the parking lot Crowd Management As the crowd is mostly invite only, stampedes are out of question. Although a crowd of passer-byes trying to see the proceedings inside the park may cause a sizeable crowd. This has to be controlled even before it happens as it may cause a scene which gets out of hand. There must be a better understanding by all the authorities responsible for the event and the chain of command to be followed along with the nature of duties each person is responsible for. An important feature for this is the chalking out of an event plan produced by all the concerned agencies involved including exact names, location of personal, their duties, emergency plan lines of communication, entry and exit, name list of all the people invited and also those involved in the planning. Normal and emergency procedure related to crowd control should also be planned in advance so there is no confusion if any disorderly situation arises (CM, 2000) Terrorist Threat Post 9/11 no one can be sure of the method and weapon of a miscreants. Therefore terrorism is the biggest threat to any public gathering, let alone where important dignitaries are expected. Vigilance and correct measures before and throughout the event can only prevent any such mishap. The biggest threat due to the terrorist is does to the size of the venue and the area around the venue unsupervised. Many blind spots and places are present where an explosive device can be installed. Similarly the threat of a suicide bomber can also not be negated. For countering all these threats the help of local police is needed prior to the event as the venue will have to be cleared by the bomb squad and explosive sniffing dogs. Even after the initial search is done one rep of the Police has to be in the control room and all patrol cars dedicated for the event will have to be in touch with the control room person looking after the operation. All helping services like police, fire fighters, medical assistance have to be on high alert and in contact through wireless walkie-talkies with the control room. 100 meter from all sides of the place of the event inside the park will be cordoned off by the police and no person will be authorized to move in out without proper RFID signature cards issued for the event. VIP Movement Since this event is being organized by the state, the visit of the President, Prime Misnister and many other important VIPs is also expected. Therefore arrangements have to be made in pre-emptive condition so no last minute issues arrive. All security measures will be dealt in a categorical method, lightest being for a dignitary and highest for the president or a foreign delegate. Special team will be designated to coordinate with the personal security team of the VIP under discussion. Additional search by the bomb squad will be needed to scan the VIP sitting area for threats along with threat by projectile from far away buildings, like a sniper shot. The food to the VIP will also be kept under guard and checked before serving, the people responsible for serving will also be security cleared before the event. Conclusion This paper should be concluded by explaining one fact alone. The threats present are numerous in natures and not all the threats can be countered preemptively therefore strict vigilance and deployment of experience security workers, be it police, bureau or private contractors is strongly needed. A strong incident command center and properly laid out procedures for all possible emergencies should be chalked out; as when an incident occurs; confusion is the biggest threat to the management. Laid out procedure will make sure everybody knows what their job is. This kind of an event is often scrutinize as a measure of a countries integral security situation hence no loose meausers can be afforded and all possibilities have to be worked upon and checked out. References Crowd Management (2000) Report of the Task Force on Crowd Control and Safety, Chapter I - Crowd Management retrieved March 20, 2012, from http://www.crowdsafe.com/taskrpt/chpt1.html Google Maps (2012). Fatima Jinnah Park Map. Retrieved March 19, 2012, from http://g.co/maps/nn9rz Shuster, R. D. (2012). Security strategies for special events. Special Events. Retrieved March 20, 2012, from http://specialevents.com/mag/meetings_security_strategies_special/ Vendant systems (2012) safety meets security retrieved March 20, 2012, from http://vedantsystems.com/ Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security Management ( Report Example | Topics and Well Written Essays - 1750 words, n.d.)
Security Management ( Report Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/management/1591558-security-management
(Security Management ( Report Example | Topics and Well Written Essays - 1750 Words)
Security Management ( Report Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/management/1591558-security-management.
“Security Management ( Report Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/management/1591558-security-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Key Aspects Of Security Management

Internet Security: Awareness is Key

This essay is written to serve the following objectives: (1) to identify the security threats and vulnerabilities; (2) to present the nature of internet security; and (3) describe security and risk management in the light of impending threats in internet security.... (2003), the history of the Internet revolves around four distinct aspects: the technological aspect, operational and management aspect, social aspect, and commercialization aspect.... There is the operations and management aspect of a global and complex operational infrastructure....
15 Pages (3750 words) Essay

Issues Evident in Medical Emergencies

The areas of consideration bring the aspects of exposure for the patient data; hence, raising concern for the procedures of managing the electronic health records, as implemented in the various health factions in the world.... Additionally, with the blinking-rate of technological advancement, the concerns over the advancements also cause considerations on the aspects of the benefits and risks of the information systems.... Consequently, the evolving technological factors adopted in all sectors of the world… These advancements are important in the successful delivery and management of health management procedures....
5 Pages (1250 words) Research Paper

Security of Big Data

Imagine an organization in which the marketing department requires key reports from the technology department.... The paper "Securing of Big Data" explores firms must be aware that certificate authority servers are vulnerable to data loss.... When deploying their own certificate, which is a better solution, organizations are extra cautious of these elements to protect themselves against these attacks....
8 Pages (2000 words) Case Study

The Security of Networking

Information center operators, network administrators, need to appreciate the fundamentals of security to arrange safe and administer systems.... The paper "The security of Networking" states as the complexity of safety threats increases, so do the security mechanisms necessary to safeguard networks.... nbsp;… security events are on the rise at an alarming rate each year.... As the complexity of safety threats increase, so do the security mechanisms necessary to safeguard networks....
12 Pages (3000 words) Essay

Security Flaws of IPSec

hellip; This report will also analyze some of the main aspects of how is” IPSec a Scalable and Robust Solution to the problems associated with network security”.... This report will also analyze some of the main aspects of how is” IPSec a Scalable and Robust Solution to the problems associated with network security”.... In this research “security Flaws of IPSec” the author will present a detailed analysis of some of the main security aspects and role of IPSec in securing a network from inside as well as outer threats....
8 Pages (2000 words) Assignment

Key Features of Cyber Security

The author of this coursework "Key Features of Cyber security" describes significant cybersecurity vulnerability and associated threats in mobile computing.... Portability is regarded as a key facet of mobile computing (International Association of Medical Science Educators, n....
9 Pages (2250 words) Coursework

Physical Security Designing

The main purpose of this paper “Physical security Designing” is to produce the standard operating procedures as pertains to the procedural, physical and cyber security within the facility.... This document contains a comprehensive overview of the facilities security program.... This security plan implements the three strategies that formulate the fundamental principle of CPTED.... This security plan will generally adopt the layered defense model....
6 Pages (1500 words) Assignment

Legal Aspects of Hospitality Management

The paper "Legal aspects of Hospitality Management" highlights that for managers to ensure that their hotels operate successfully in the hotel industry, they must understand hotel liability laws and applications within the hotel industry.... here are key aspects that managers must understand in the hotel industry with respect to laws on hotel liability.... in addition, hotels may generally evict registered guests and may retain the possessions of evicted guests as security for room charges....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us