Preview

Main Purpose of security management

Powerful Essays
Open Document
Open Document
1509 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Main Purpose of security management
The Main Purpose of Security Management and Security Measures must be Commensurate with the Threat

For us to identify security management we first have to breakdown the meaning of security management because one person’s ideology of security can be totally different to someone else’s, therefore to define security in Latin (secura with care) basically translates to be free from danger.
To need security management we first have to identify a threat because without a threat we can’t fully understand or comprehend the task at hand, Management is how we go about implementing our principals of management that we have learned throughout our careers and personal approaches to the systems that have been proven over the years in successes and also failures.
The Management section of any security organisation must start at the top from the security director down, It makes no difference if you have a security section of ten or a thousand the command structure must be adhered to because if it doesn’t things can rapidly deteriorate quickly, we have these structures in place as a fallback system to determine where things have failed and also to stop it progressing to the next level.
The thing that usually differs with security management and the other corporate management sections is the others are usually put in place to increase the financial yield of an organization, The Security section although a very important part of an organization is sometimes found to be a costly financial burden which is sometimes seen as an extravagance but necessity. As the old adage says security is everyone’s concern and should be emphasized throughout the whole organization. Today security can be under an umbrella of many guises ranging from information security, physical security, investigations, forensics, screening and crisis management to name a few.
To combat against the threat the security Director/manager must have a good security and risk plan. Michael Blyth (2008) describe that a

You May Also Find These Documents Helpful

  • Powerful Essays

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    CJS 250 Appendix G

    • 603 Words
    • 3 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    The level of security can determine the rise and fall of any organization, no matter how big or small the company may seem, so mitigating risk should always be the number one priority. Risk mitigation can be define as the process of implementing any form strategic actions that will reduce the level of threats that may cause financial hardship towards the organization. In addition, risk mitigation tracks, identify and evaluation all form of risk, including new and old. The focus of risk mitigation is to assist the organization’s department of security administration with identifying a list of potential problems that…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Describe how an organization can properly manage its information security efforts using proper risk management techniques and cost-benefit analyses for these information security efforts.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Est1 Task 1

    • 623 Words
    • 3 Pages

    The security rule has meaningful standards that are grouped into five categories; administrative safeguard, physical safeguard, technical standards, organizational standards, and policies, procedures, and documentation requirements. Administrative safeguards have several standards that help implement the security rule. The security operation purpose require organizations to evaluate their risks to security and implement policies and procedures that prohibit, detect, and acceptable security violations and to define appropriate approval for security violations. Another, workforce security has three implementation qualifications that are mandatory by the organizations. The organization has to contain policies and procedures to ensure that each members of the particular…

    • 623 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Ensuring proper level of security is important for a business because it is crucial to the operations. The business must protect the valuable asset, confidential information pertaining to trade secrets, financial data, product development, business strategy, and customer’s information. Inadequate security could result in legal liability and demise of business. Strong security and control can result in an increase of employee productivity and lower operational costs. Some tools available to prevent breaches are firewalls, intrusion detection, and antivirus software.…

    • 369 Words
    • 2 Pages
    Good Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Security is divided in three major areas: Physical security includes access to the building, offices, and the rooms housing the organization’s servers and other critical computing devices. External threats to the organization’s computing network such as hackers and malicious software. Access and permission to authorized users of the system as well as to the information.…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    References: Ortmeier, P.J. 2009. Introduction to Security: Operations and Management. (3rd ed). Upper Saddle River, N.J.: Pearson Prentice Hall…

    • 1495 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Capstone Checkpoint

    • 270 Words
    • 2 Pages

    I believe that it is essential for security professionals to be well familiar with their surroundings and have great knowledge of their primary targets, while roaming their environment. It is critical that all security professionals must maintain full control of the environment they are assigned to, and are aware of not leaving a vulnerable gap to the criminals. These security professionals must be ready to notice the slight changes of the environment, and must keep in mind that all areas are different. Therefore, they must plot a defense mechanism based on the type of environment they are assigned to.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cjs/250 Appendix G Week 6

    • 353 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The diverse associations and understandings of the word security is confusing to the public as well as those who are public safety professionals such as law enforcement officers, firefighters, medics, emergency managers, et al. As an example, when a homeowner states they have “security” at their home, what they likely mean is they have installed a fire and burglary alarm system. However, the term security may just as well mean that the homeowner has installed high security locks on their doors and windows. Still to another homeowner, the installation of motion activated exterior lighting may mean that the homeowner has installed security at their…

    • 3449 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Risk Assessment

    • 1788 Words
    • 8 Pages

    Almost every company in business is face with some risk or potential threat that could cause a huge blow to their organization operations. These risks and threats usually comes from within or outside and organization. In order to prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risk so they could protect themselves from the harm caused by them. Risks involve theoretical effectiveness of security measures, loss of impact, threats and vulnerabilities that are common in today's society.…

    • 1788 Words
    • 8 Pages
    Powerful Essays