Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Security Planning - Essay Example

Comments (0) Cite this document
1. It is the aim of the Center for the Study of High Consequence Event Preparedness and Response to prepare the country to face high consequence issues. Security assessment has to encourage the development of sophisticated and creative technologies. This Center has to collaborate with the Department of Homeland Security Centers of Excellence…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Security Planning
Read TextPreview

Extract of sample "Security Planning"

Download file to see previous pages In this endeavor, attention has to be given to the provision of gas masks to the public and the shortcomings in tackling terrorist attacks, natural calamities and emergencies has to be ascertained. In addition, it is essential to estimate the extent of safety enjoyed by citizens, governments, communities, businesses and systems of information technologies in the context of such attacks, calamities and emergencies. The cost effective nature of preparedness in respect of uncertain and unpredictable has also to be estimated (Department Of Homeland Security Centers).
Another vital aspect to be considered is that of prevention and deterrence, and the measures that have to be adopted with regard to terrorist attacks and natural calamities. There has to be a substantial improvement in vigilance, intelligence gathering and situational awareness. The modus operandi of terrorist threats requires significantly different forms of prevention and deterrence. This can be achieved by resorting to a careful analysis of terrorist events. Such analysis requires a complete understanding of the high consequence events and their unique characteristics, especially when weapons of mass destruction are involved (Department Of Homeland Security Centers).
Decision making is a v...
Moreover, it is essential to resort to modeling and simulation so that an approximation can be obtained in respect of the actual incident to be encountered. A well designed model can prove to be immensely useful in countering terrorist and other threats (Department Of Homeland Security Centers).
In order to respond to major emergencies, networks have to be established, which on occasion function beyond the traditional means of communications. The individuals' participation in pacifying major homeland security crises and the constitution of social networks are necessary for countering major emergencies. Formation of temporary or event - based networks are better equipped to handle such events. Hazard, economic, transportation and other modeling operations should be rehearsed as they result in an understanding of the causes and effects of emergencies. Moreover, they are helpful in identifying and adopting suitable action during crises (Department Of Homeland Security Centers).
Of these aspects decision making is the most important and if a mistake is committed, while taking a decision, then the consequences can be disastrous. Further, the damage caused can be much higher if a wrong decision is taken.
2. Government at the federal, state, and local level must actively collaborate and partner with the private sector, which controls 85 percent of America's infrastructure . . . the nation's infrastructure protection effort must harness the capabilities of the private sector to achieve a prudent level of security without hindering productivity, trade, or economic growth. - The President's National Strategy for Homeland Security.
The federal government has the capacity to organize, convene, and coordinate broadly across governmental ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Security Planning Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Security Planning Essay Example | Topics and Well Written Essays - 2250 words. Retrieved from
(Security Planning Essay Example | Topics and Well Written Essays - 2250 Words)
Security Planning Essay Example | Topics and Well Written Essays - 2250 Words.
“Security Planning Essay Example | Topics and Well Written Essays - 2250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Security Planning and Risk Assessment

...Security Planning and Assessment One of the most important, and often overlooked, aspects of security assessment and planning is the human impact that employees and other casual contacts have on the security of an organization. Security threats are often thought of as external, physical threats such as robbery or terrorism, but major organizational losses stem from the "misuse of equipment and facilities, careless handling of raw materials and finished goods, sloppy documentation and poor inventory controls" (ASIS International, 2008, p.2-III-1). The human element is significant for two major reasons. First, the employees are typically responsible for regular loss within an organization and should be the first line of defense against...
5 Pages(1250 words)Essay

Security Planning and Assessment

...Security Planning and Assessment 1. The most important aspect of security assessment and planning is its sustainability. According to the EDAW (1999), the welfare of the population depends upon the “quality of the environment and the availability of resources. The idea of sustainable planning in terms of the security will help us ensure that the kind of safe environment we are trying to reach at present will be the kind of safe environment the the future generation will have. Apart from other aspects of security assessment and planning such as being at the cutting edge of technical, social, medical, cultural and educational advancements, its sustainability remain the “driving force” to which the aim for the future will be patterned after...
7 Pages(1750 words)Essay

CJ452 Security Planning and assessment

They also sound the alarm (usually church bells) if there was emergency and to announce the time (Bradley, 2007).
From being firefighters, security services in the earlier times have gradually transformed into curbing of criminal activities that have become more sophisticated and become more organized over time. In the United States, the US Secret Service was instituted as early as 1865 to suppress counterfeiting of currencies (Secret Service History, 2007). To provide national intelligence to senior US policymakers, President F. Roosevelt established the Office of Strategic Services that was to become The Central Intelligence Agency (CIA) (History of the CIA, 2007). The September 11, 2001 attacks on the World Trade Center an...
4 Pages(1000 words)Essay

Security Planning and Assessment - protection

...Security Planning and Assessment The word security refers to safety. Security can be on anything for which someone pays too much care and attention. In assessment of security the assessor wants the full help and guidance from the organization that is being assessed. The organization gives assessor the full authority and provides him all facilities to access the system of organization. The benefit of assessment is to implement the security or improvement in secure system. An assessment is basically very beneficial and useful of all security tests. Methodology Following type of security assessment methodology is used for the powerful security methodology. Analysis the system and its basic needs Review the previous document Risk analysis Sort...
6 Pages(1500 words)Essay

Security Planning and Assessment

... to be borne. The company must hire third party specialist security professionals to audit their networks for security. Email should be used according to the conditions described. Use of the Internet may be monitored. Assessment of potential risks to IT security is the corner stone of a successful IT security framework. Considerable time and money must be invested in assessing the potential risks. Unless all the potential risks are known, the company can not proceed to mitigate those risks. Although all elements of the risk management are important, risk assessment provides the foundation for all other elements of the mitigating process (GAO, 1999). Security Planning: Risk of Data: Data is the most crucial asset of a company...
10 Pages(2500 words)Essay

Security Planning and Assessment Quiz

...Security Planning and Assessment Quiz Generally, should prerequisites for employment be different for security candi s than they are for public sector police candidates Why or why not The prerequisites for both positions should be the same. Both positions have the same physical and cognitive demands. Background integrity requirements should be the same, as they are both in a position of trust. The different and specialized knowledge that a police officer requires, such as arrest procedure, is typically taught as a part of the police training program. Private security should also make a greater effort to train security guards in regards to their responsibilities and limitations. Education for security employment should have a special...
3 Pages(750 words)Essay

Security Planning Mid

...Security Planning History of Security Services The history of security services as an organized endeavor s back to ancient times as men havealways sought ways to protect themselves, their property, and mitigate their risk. The more modern history of security services began with the introduction of thief takers in England as a way to protect people and property in the new urban conditions brought about by the Industrial Revolution (Ortmeier, 2005, p.9). London is credited with implementing the first full time organized police department in 1829 (Ortmeier, 2005, p.10). In the US, private security began with the Pinkerton Agency in 1851 to protect the railroads, and served as contactors to the Union Army during the Civil War (Ortmeier, 2005...
5 Pages(1250 words)Essay

Security Planning and Assessment - terrorism

... should seek advice as to whether they should consider using specialist air handling systems or protective cabinets in their post room. Opening all items and inspecting the contents in the post room can significantly reduce the risk of CBR materials being spread to other parts of the building or site and finally In the long term, we should consider moving to a system where post is screened, opened and scanned onto computer at a dedicated off-site post facility and then forwarded electronically to the recipient. References New York postal services, Security Recommendations, available from Security Planning Measures for postal services, available from
5 Pages(1250 words)Essay

Information Security Planning

...Information Security Planning Introduction Information security is about taking care of business continuity which involves media backup operation, monitoring of incidents, classifying information and suitably providing access to this information to members of the company, investigating anomalies and safeguarding operations. In addition to this the existing standard of security can be judged by auditing the services and the information security. The information security is an ongoing process that would necessarily require planning and execution. Today with the PCs becoming networks, security has taken precedence over other issues. The company needs to be prepared to combat virus attacks, ingress of unsolicited visitors and possible attacks...
2 Pages(500 words)Essay

Network Security Planning

...Network security planning Introduction Network security planning entails developing best practices and measures for protecting the network infrastructure. It entails establishing a security baseline for securing the main management planes in an organization. Furthermore, network security planning also aims at developing a strong foundation where more advanced security measures, techniques, and methods can be subsequently established. This is made possible through developing additional security design aspects that are inevitable for the enhancement of control, visibility, and general safety of the data panel. The following areas have been identified as the key elements that require baseline security. This includes the following: Network...
2 Pages(500 words)Research Paper

An Effective Planning Process

Managements first and the most fundamental problem is selecting the right individuals with the prospective for development. evenly important is the placement of those individuals in positions in the organizational structure where their talents are most desired.
Manpower development instigates with human resources planning also known as manpower planning, which establishes a firm's specific personnel rations. These are attained by a qualitative fortitude of the individual job specifications and of the specific characteristics required of a person for the successful performance of each job. Once these job requirements are recognized, it is essential to forecast the number of persons desired for each job. This stage of employmen...
11 Pages(2750 words)Coursework

National Health Service Human Resource Planning

There are about 1500 primary care dentists who are working on a salaried basis with the NHS, in most cases employed by primary care trusts. This group of individuals was a part of the local government earlier but in 1974, they were transferred into the NHS. (Personnel Today, 2007). Starting from the year 1997 onwards, the U.K. Department for Education and Employment had allowed for additional funding of $7.2 million to ensure that medical schools are able to pay clinical academia staff the awards that have been recommended for doctors and dentists in the NHS, by the Doctors and Dentists Review Body (Beecham, 1996). This move was initiated to introduce pay parity because university employers found it difficult to pay the 3.8% incre...
14 Pages(3500 words)Term Paper

Marketing Planning of MD Inc UK

To cash in on the brand image achieved through the success of the ‘Bliss’ range of a hair care products, by positioning the new product range as affordable while being gentle and versatile and target the already favorable market segment of the ‘Bliss’ range.
MD inc. has already been in the beauty and personal care sector and has a successful product range named ‘Bliss’ under its kitty. The new market that is the Electrical hair care appliances market is potentially a high growth area. Though the current growth rate is slow, the future trends indicate that with appropriate marketing strategy and positioning, the market and the companies in this sector can grow at a higher rate.
6 Pages(1500 words)Case Study

The Relationship Between Security, Risk and Health in a Large Organisation

... when a firm’s strategic plan needs to be developed. When dealing with these issues, managers in modern organizations tend to use appropriately customized policies – in accordance with their firms’ needs and the resources (employees, funds, technology) available. Current paper focuses on the examination of the various aspects of security, risk, health and safety within large organizations; Particular emphasis is paid on the fact that the demands of each one of these factors may be differentiated under the pressure of the market conditions and the organizational priorities. The case of Shell in Nigeria has been used as an example in order to show the potential co-existence and interaction of these factors within a specific organizational...
9 Pages(2250 words)Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages(1500 words)Report

Project Planning Human Capital

Project planning involves a lot of factors and areas that we need to address for the effective management and handling of the project. The aim of this report is to provide a deep insight into some of the main areas that we need to address for the project of Adams's family farmhouse renovation. These issues are project team communication, project risk management, and deadline handling. Effective communication in a project provides a huge advantage regarding the better working and handling of the project. I have selected a very significant project regarding the preservation of the old and historical places. Here we require effective communication to provide better interaction among the designer, developers, and history preservation...
8 Pages(2000 words)Coursework

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Role of the Police and Private Security

...Report to the Legislator - Committee on Crime and Criminal Justice Congratulations on being appointed to the Committee on Crime and Criminal Justice. As a public servant you are holding a very responsible post that covers many areas of administration including the important role of providing security to the citizens of your constituency and to those individuals who visit it. This report will provide you with a clear picture on the role of security agencies with regard to homeland security. Many of the points mentioned here may be new or already known to you, but they are provided here in any case. It is common knowledge that apart from local and organized crime within the United States, the country is now facing new forms of threats like...
8 Pages(2000 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Security Planning for FREE!

Contact Us