Verified Document

Facility And Security Management The Term Paper

There are barriers to developing systems security that are both financial and philosophical:

Systems security is often viewed in a manner similar to physical security: Buy it once and use it forever. Unfortunately, like physical security, obsolete policies, procedures, and technologies leave systems extremely vulnerable to external and internal attacks. Most stakeholders find it difficult to accept the need for constant spending on systems security when it is difficult to quantify the benefits. Even when benefits can be quantified, unenlightened stakeholders may still question the need for continuous spending in the systems security area. In many cases, education can overcome this philosophical barrier. Unfortunately, often only severe losses from a security breakdown will prompt appropriate, albeit late, action (Luehlfing et al., 2000, p. 62).

More and more organizations reco0gnize that part of security is data security. In choosing the technology solution for a given data need, certain features should be considered. This means making a careful study of needs, the complexity of the infrastructure, the resources and skill level of the it staff, and the capital available for investment. To make an informed choice, the manager should consider four areas: reliability, scalability, security, and total cost of ownership. The meaning of reliability is self-evident, and it means features to ensure the integrity of the data and to assure that the data is safe in the event of a system failure or disaster. The feature of scalability is measured in both its ability to manage increasingly large volumes of data and increasingly large numbers of users or transactions without compromising the system's overall worth. There are two approaches for dealing with scalability, known as scale-up and scale-out. Scale-up is achieved by increasing the computing power of a single machine by adding CPUs, memory, or enhancing the networking components and storage systems. Scale-out, on the other hand, is accomplished by the addition of more servers to the system to spread the workload...

It further depends on the training afforded to users, the abilities of the it maintenance staff, the documentation provided with the system, and many other facets of the development and implementation of an it system. If these elements are taken care of in a proper manner by personnel who are knowledgeable and whoa re using the best available information on requirements, then the resulting system will serve well and should also contain sufficient flexibility to be reshaped and adjusted as needed in order to serve new needs as they develop. Technology is also involved in physical security, from alarms on doors and windows to systems for deciding who is allowed to enter and who is not. The facility manager and the security manager must coordinate activities to assure that security is maintained throughout the facility.
References

Borchers, M. (1996, July). Building security relationships. Security Management 40(7), 103.

Keehn, a.K. (2002). Institution's Complexity, Resources and Future Needs Influence Database Selection. The Journal 29(10), 50.

Luehlfing, M.S., Daily, C.M., Phillips, T.J., & Smith, L.M. (2000). Defending the security of the accounting system. The CPA Journal 70(10), 62

Phelps, E.F. (1994, May). Securing safety policies through self-inspection. Security Management 38(5), 75.

Surette, K.J. (1993, November). Have we made security an issue?. Security Management 37(11), 40.

A f, M.D. (2000, September). The importance of site manager involvement.

Occupational Hazards 62(9), 31.

Truncer, E. & Field, S. (1997, March).

System maintenance that sings. Security Management 41(3), 95.

Zwirn, J.D. (1997, November). For whom the bell tolls. Security Management 41(11), 60.

Sources used in this document:
References

Borchers, M. (1996, July). Building security relationships. Security Management 40(7), 103.

Keehn, a.K. (2002). Institution's Complexity, Resources and Future Needs Influence Database Selection. The Journal 29(10), 50.

Luehlfing, M.S., Daily, C.M., Phillips, T.J., & Smith, L.M. (2000). Defending the security of the accounting system. The CPA Journal 70(10), 62

Phelps, E.F. (1994, May). Securing safety policies through self-inspection. Security Management 38(5), 75.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Management Security Measures Risk Management
Words: 1552 Length: 5 Document Type: Essay

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is

Facility Risk Management Risk Management Facility Issue:
Words: 1651 Length: 6 Document Type: Essay

Facility Risk Management Risk Management Facility Issue: Infant Abduction Risk is defined as "anything that threatens the ability of [a] business to accomplish its mission." (Pakeys, 2010) The risk management plan is held to be "much broader than the emergency preparedness plan" and involves the management of risk, which offers a method of protecting against unforeseen hazards, and the routine risks faced by workers each day. (Pakeys, 2010) The express reason for

Security Management at Aviation and Healthcare Sectors
Words: 2154 Length: 8 Document Type: Essay

Security Management at Aviation and Healthcare Sectors Security Management Essay This paper discusses the concept of aviation security management and security management at healthcare settings. In addition to that, this paper also lists down and describes the important factors that can have an influential impact on the functions of aviation and a healthcare security manager. Security Management at Aviation and Healthcare Sectors Aviation Security The general aviation security confronts a number of security challenges. The

Security Management the Statement That
Words: 1061 Length: 3 Document Type: Essay

Identification of external risks depends of the location and structure of the business premises, the type of business, its neighbors, and company-specific risks. Security managers must also pay attention to regulatory compliance with voluntary, self-regulation, and statutory considerations (Options for the development of the security industry). Voluntary regulation is self-imposed and may include the establishment of a professional regulatory body. Self-regulation occurs where the regulated profession has a majority on

School Security Management
Words: 2483 Length: 8 Document Type: Essay

Security Options and High Performance Introduction As McCrie notes, “the training of employees and the development of their skills and careers is a critical and time-consuming activity within security operations.”[footnoteRef:2] For an organization like a public elementary school, employees are more than likely already stretched to the max in terms of time and ability: their primary focus is on teaching and assessing student achievement. Other stakeholders—i.e., parents—will nonetheless be concerned about safety,

Security Management and Management
Words: 3236 Length: 10 Document Type: Research Paper

Port Facilities Manager Ports have historically played an instrumental role in driving the global economy by facilitating the movement of people and cargo from one part of the globe to another. Due to their phenomenal influence on the global economy, ports must be effectively managed. This is particularly true in terms of their facilities, equipment, and infrastructure. The port facilities manager is tasked with the responsibility of supporting the port

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now