StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

What Elements of Security Actually Mean - Essay Example

Cite this document
Summary
The paper "What Elements of Security Actually Mean" discusses that as safety of all guests will be the responsibility of the security personnel, so they will have to be fully attentive so as to make sure that no criminal activity takes place within the premises of the function. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
What Elements of Security Actually Mean
Read Text Preview

Extract of sample "What Elements of Security Actually Mean"

Solution No Before probing into the issue of essential elements relating to security or safety, we should first get familiar with what elements ofsecurity actually mean. Elements of security mean by those rudiments or elements which have a direct relationship with our safety. These essential elements are of various types such as physical, health and environmental elements. Let’s start it with health element of security. Health security of a person can be achieved by taking proper care, yearly medical examinations, and by having proper and balanced diet. In every person’s life, health plays a vital role because when the health of a person is maintained, he will be able to better concentrate on his job related matters and other financial matters. And when the health starts going down, the concentration level becomes unstable and the person starts worrying about his health which diverts his attention from many other matters. Another important element is physical security. We all know in these days, crime rate in almost every country is reaching its heights and not a single person can call himself purely safe from any sort of crime. We must take proper measures on our own to prevent ourselves from being victimized. “Private security meets the needs of individuals, businesses, institutions and organizations that require more protection than is offered by public police officers” (Hess, 2008). These measures include security alarms, obstacles on gates of organizations, building fences so as to stop criminals from entering private buildings and hiring security guards from private security agencies. Now, if we talk about security elements, information security element can never be sidelined. In the present era, the world has become global village. All the records of any organization, business or individual are saved on the computers to be retrieved when needed. The threat to this element is increasing day by day as hackers are getting more and more expert in destroying or deleting important files from someone’s personal computer by sending viruses and retrieving private information of any organization from their websites by hacking those websites. The measures that can be taken to avoid this include installing efficient anti virus applications in order to maintain internet security. There are a lot of proficient anti virus applications which prohibits hackers from entering or hacking any personal computer. So, these were some of the basic security elements which should be taken in consideration and proper steps should be taken to avoid ourselves from getting into any sort of security hazard. Solution No. 2 In the present era, the life we live is threatened by various sorts of hazards. These hazards are of different types. Some of them are criminal hazards while some are non-criminal hazards. Here is a list of some criminal and non-criminal hazards: 1. Accidents (non-criminal hazard): 2. Robbery (criminal hazard) 3. Kidnapping (criminal hazard) 4. Financial (non-criminal hazard) Let’s describe each of these hazards one by one and their ramifications: Accidents Accidents can happen with any individual, company or organization. In case of companies and organizations, these accidents can be earthquakes, fire or some structural damage. Ramifications, which can be made to avoid these accidents, can be to develop a well structured building according to engineering standards. A proper fire mechanism should be maintained to cop with accidental situations. Robbery This is a kind of criminal hazard. This hazard can happen within a house, bank or any other financial institution. Thieves can enter any alone house where there is no security mechanism or they can also enter a bank to get some money by showing power. Ramifications for this kind of hazards can be made to apply an efficient security mechanism. There are a lot of security devices which can be used to avoid it .e.g. security alarms, fences and obstacles. Kidnapping Kidnapping is also a type of criminal hazard where criminals kidnap a person and then ask his relatives to pay some money in order get their person released safely. Ramifications can be made by keeping a laser gun, a personal security technology, which is used to seize or lesser down any person’s movement when he tries to grab or kidnap other person. Financial Financial hazard can happen in any company, organization or with individuals. it happens when a company or individual starts facing financial crises due to improper management of money and investing capital in projects which are not beneficial for the company. Ramifications can be made by implementing a proper budget plan for the financial year of that company by keeping in mind all the economic aspects of the company. Solution No. 3 Let’s first get to know what access control systems actually mean. Access control systems are those systems which grants and revokes permissions to have access on any kind of private data. The permissions include editing, deleting, reading or creating some file on any server. These systems control the human intervention to perform any unauthorized task. “Access control is the process by which users are identified and granted certain privileges to information, systems, or resources. Understanding the basics of access control is fundamental to understanding how to manage proper disclosure of information” (Taylor, 2003). If we talk about physical security, we mean by those sources by means of which we can ensure our safety. These sources include different security mechanisms like security alarms, laser guns, fences and obstacles. Now the question here is that whether these systems, access control systems and physical security measures, are complete without human intervention? The answer is simply, no. None of these systems can work without human involvement. Like if we are apply access control mechanism in some company, this mechanism can not work until and unless there is a person sitting on a chair in front of computer to control all this mechanism. Without him, the computer will never get to know what it has to do and which access it has to restrict. It is the human who will control the mechanism by setting up the tasks to be performed by the computer. Same goes for physical security measures implementation. If we apply these measures for our safety, they can never be able to produce desired results unless there is human involvement in it. Like if a person keeps laser gun with himself in order to be safe from getting grabbed or kidnapped, the gun will never put out the laser beam automatically unless that person will not himself press the trigger. Or if some person applies security alarm in his home as a security measure, it will be a person who will set it up at the required place and with proper settings. So, we can sat that neither physical security not access control systems are complete without human interference. A dedicated security personal is extremely necessary for all organizations and companies in the present era. As we know, terrorism is at its heights these days and not a single individual can consider him safe. All companies and organizations are facing the threat of terrorism by different extremist groups. No one can fully rely on public police. Every company and organization should keep full time dedicated security personnel to minimize the chances of any act of terrorism or any criminal hazard for the organization. Solution No. 4 Before getting into the role of security personnel in a protective function, let’s first describe the meaning and roles of security personnel. Security personnel are persons who are appointed for security of a specific organization by a security providing company or agency. “Personnel security is everything involving employees: hiring them, training them, monitoring their behavior, and sometimes, handling their departure” (Practical Unix and Internet Security, n.d.). The security companies not only provide armored personnel to the clients to secure their property and valuable but also different security systems such as security alarms, automatic door locks and improved mechanism for personal security. The role of security personnel is of critical importance for the safety and security of any organization, company or an individual. Now, let’s move on to the roles and responsibilities of security personnel in a protective function. First of all, their role is to check and clear the area where the function is to take place before the start of the function. Then they have to set monitoring screens at different corners of the function’s territory. After that, they have to ask their security agency to arrange screening gate for the entrance of the guests as it doesn’t look nice to physically check all guests of the function. By arranging screening gate, when a guest will enter the area, the gate which he will pass through will signal whether the guest is clear or he has some prohibited material with him. Whenever a guest arrives, the security personnel will have to ask him for his entrance card. If any person entering the territory seems suspicious, the role of the security personnel will be to investigate him. After the time is over for entering in the function’s territory, not a single person should be allowed to enter. Then they have to close the gate and appoint one or two security guards there at the gate. Other security personnel will have move to their positions which will be at the monitoring screens as to check for any suspicious and doubtful activity by the persons present in the function. If any doubtful activity is seen taking place, the role of the security personnel will be to inquire the suspected person. They will have to be in continuous contact with the armed personnel appointed at the gate so that if any criminal activity or violence takes place, they will inform the armed personnel to catch up the suspected criminal. As safety of all guests will be the responsibility of the security personnel, so they will have to be fully attentive so as to make sure that no criminal activity takes place within the premises of the function. So, these were the roles and responsibilities which security personnel have to perform with full dedication to ensure the guests’ safety at any protective function. References Hess, K. (2008). Introduction to Private Security. United States, US: Wadsworth Publishing Company. Taylor, L. (2003). Access Control 101. Retrieved from http://www.intranetjournal.com/articles/200311/ij_11_10_03a.html Practical Unix and Internet Security. (n.d.). Retrieved November 30, 2009, from http://docstore.mik.ua/orelly/networking/puis/ch13_01.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Crminal justice/ private security Essay Example | Topics and Well Written Essays - 1500 words - 1”, n.d.)
Crminal justice/ private security Essay Example | Topics and Well Written Essays - 1500 words - 1. Retrieved from https://studentshare.org/miscellaneous/1560526-crminal-justice-private-security
(Crminal Justice/ Private Security Essay Example | Topics and Well Written Essays - 1500 Words - 1)
Crminal Justice/ Private Security Essay Example | Topics and Well Written Essays - 1500 Words - 1. https://studentshare.org/miscellaneous/1560526-crminal-justice-private-security.
“Crminal Justice/ Private Security Essay Example | Topics and Well Written Essays - 1500 Words - 1”, n.d. https://studentshare.org/miscellaneous/1560526-crminal-justice-private-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF What Elements of Security Actually Mean

Elements of Computer Security

Running Head: elements of Computer Security elements of Computer Security elements of Computer Security Without any doubts, the key purpose of any computer security system is to ensure that its users and stakeholders could be a part of a safe and reliable computing environment.... This paper is an attempt to explore the key elements of computer security in light of the concerning available literature.... Running Head: elements of Computer Security elements of Computer Security [Institute's elements of Computer Security Without any doubts, the key purpose of any computer security system is to ensure that its users and stakeholders could be a part of a safe and reliable computing environment....
3 Pages (750 words) Research Paper

Foreign Investment in Farmland

The World Bank report, dotted with case studies demonstrating the difficulties of rural peoples as a result of the rising phenomenon of transnational corporations and rich countries taking over their lands, states that the risks attaching to land grabbing actually “correspond to equally large opportunities” (page xxi) as long as access to technology, capital markets, infrastructure and information are granted.... The issue that I have chosen is foreign investment in farmland, or what has been labeled “global land grabbing”....
5 Pages (1250 words) Essay

Mike Daviss Fortress Los Angeles The Militarization of Urban Space Summary and Reaction

While it seems that these changes improve the quality of life and the sense of security for the common white-collared worker, this is done at the cost of those who have little purchasing power.... The private "security" industry is a thriving business, ready to answer to the ubiquitous slogan of "Armed Response".... The creation of these "fortress" cities, with the constant surveillance cameras, the gated walls, private security contractors, ground as well as on-air watchers, advances the progress of the social fragmentation, a polarization that serves to destroy the society's natural hegemony at the cost of the underprivileged....
4 Pages (1000 words) Essay

Security Operations in the United States since September 11, 2001

This essay analyzes and discusses the aftermath of the September 11, 2001 terrorist attacks on the United States and the security operations, that were held since.... Surveillance operations have been increased with higher funding directed towards policing and security services.... This essay discusses the September 11, 2001 attacks, that led to the implementation of various security policies by the government.... These security measures have provided safety and security for Americans, ensuring that authorities can carry out security measures efficiently....
18 Pages (4500 words) Term Paper

Cyber Crime, Cyber Security Awareness and Cyber Incident Reporting

Computer-related crimes include crimes which do not actually have a specific relationship to a network.... Regardless of the presence or absence of cybercrime laws however, the apprehension and prosecution of perpetrators have been made difficult by the nature of the offence, including the complications related to the cyber security awareness and cyber incident reporting (McGuire and Dowling, 2013; KPMG, 2011).... This paper shall carry out a literature review of cybercrimes, cyber security awareness, including cyber incident reporting....
28 Pages (7000 words) Literature review

Layers of Physical Security

This paper 'Layers of Physical Security' is an exploration of the elements of security at each level.... Since the traditional means of securing territories no longer hold, there must be an advancement in the forms of security with the utilization of technology.... Layers of physical security have developed with time but the basic need for security and the underlying concept at each level is the same.... The author is sure that the concern for security is a topic of great concern, how reliable the security system depends on the planning that the involved institutions apply....
9 Pages (2250 words) Essay

Climate Change and Global Security

This paper shall discuss the current climate change issue and its relationship to global security.... The relationship between climate change and food security has mostly been discussed in relation to the effect of crop productivity and food production.... The risks have been recognized by the United Nations, and its Framework Convention on Climate Change has been established in order to avoid dangers on the climate system; moreover, these dangers have been defined as threats to global security (Barnett, 2003)....
12 Pages (3000 words) Research Paper

Good in Life

Philosophically, a good life would mean the life that an individual dreams of living for happiness.... As the paper outlines, humans are never satisfied with what they have and their wants and desires keep on increasing as they begin to accomplish them.... This paper discusses the good in every individual's life which highly depends on their own perceptions of happiness and desires....
8 Pages (2000 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us