Identifying the Essentials
CHAPTER OUTLINE
Beginning with the Basics: Ever Changing and Never Ending Studies in Human Behavior: An Essential Need for Security Outlining and Defining Security Creating and Maintaining a Stable and Predictable Environment Threats, Risk, and Vulnerabilities Introducing Essential Security Tools: Identifying Threats, Risks, and Vulnerabilities Threats and Related Risk Levels Identifying Vulnerabilities and Determining Countermeasures A Final, All-Important Term A Few Essential Elements Proactive versus Reactive Response Contract Officers versus Proprietary Officers Contract Outsourcing Decisions Conclusion Review Questions Discussion Questions
2
CHAPTER HIGHLIGHTS
Security basics: • The security objective is a neverending process. • Security needs change over time. Contributions from psychology: • Adler: Humans are, above all else, social. • Maslow and the hierarchy of needs: Security is a fundamental human need. Defining security: • stability • predictability Useful terms: • threat • risk: 1. probability 2. criticality • vulnerability Essential tools: • threat assessment • vulnerability assessment • security survey (security audit) • risk assessment • risk analysis
KEY WORDS
American Society for Industrial Security (ASIS) Certified Protection Professional (CPP) Contingency plan Contract 64 Countermeasures Criticality Loss event Predictable environment Proactive
ISBN: 0-536-91271-8
Identifying and Exploring Security Essentials, by Mary Clifford. Published by Prentice-Hall. Copyright © 2004 by Pearson Education, Inc.
IDENTIFYING THE ESSENTIALS Probability Proprietary Reactive Risk Risk analysis Risk assessment Security audit Security survey Stable environment Threat Threat assessment Vulnerability Vulnerability assessment Vulnerability gap
65
Everyone is interested in security issues at one point or another. In any local newspaper on any given day, a person will read stories that may affect how
References: 1. Cunningham, W. C., J. J. Strauchs, and C. Van Meter, Private Security Trends: 1970–2000. The Hallcrest Report II, 236. 2. For more information about the CPP program and materials, go online at http://www.asisonline.org/cpp.html. 3. E. Dreikers Ferguson, Adlarian Theory: An Introduction (Vancouver, BC: Adlerian Psychology Association of British Columbia, 1984). 4. R. R. Dreikurs, Fundamentals of Adlerian Psychology (Chicago, IL: Alfred Adler Institute, 1953). 5. R. Corsini, Current Psychotherapies (Chicago, IL: F. E. Peacock Publishers, 1973), 45. 6. R. L. Hilgert and T. Haimann, Supervision: Concepts and Practices of Management, 5th ed. (Cincinnati, OH: South-Western Publishing Co.). 7. “Maslow’s Hierarchy of Needs,” http://chiron.valdosta.edu/whuitt/col/ regsys/maslow.html. 8. “Maslow’s Hierarchy of Needs,” http://chiron.valdosta.edu/whuitt/col/ regsys/maslow.html. 9. Nalla & Newman. 10. Fisher & Green. 11. Fisher & Green. 12. C. E. Simonsen, Private Security in America: An Introduction (Upper Saddle River, NJ: Prentice Hall, 1998), 202. 13. R. M. Momboise, Industrial Security for Strikes, Riots, and Disasters (Springfield, IL: Charles C. Thomas, 1968), 13. 14. D. Dalton, The Art of Successful Security Management (Woburn, MA: Butterworth-Heinemann, 1998), 217–220. ISBN: 0-536-91271-8 Identifying and Exploring Security Essentials, by Mary Clifford. Published by Prentice-Hall. Copyright © 2004 by Pearson Education, Inc.