Preview

Security

Better Essays
Open Document
Open Document
1340 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security
Communication in Security Settings Paper

January 28, 2013

SEC/360

Robert J. Deuel

Instructor:

Scott Mann

In the security world today many organizations have developed a more concise communication tools that will enable a security personal department, to teach, and help there officers observe the various behaviors that individuals display. For instance a security officer notices an individual is seen walking around a facility or retail establishment acting in a very suspicious way. It could be possible that this particular individual is going commit a crime or has a severe mental issue. With the officer learning the certain skills to detect this type of behavior it very well could prevent either a crime being committed or the individual from hurting himself or other people who are around the situation. In these instances a trained security personal may have to use their communication skills to read what the person is doing by watching their gestures and emotions. Unfortuannally In many security settings personal deal with many challenging, and frustrating individuals that have many nonverbal language barriers. From ant where to people who are death, or don’t understand the language or is trying to convey a certain message to the security officers or other authority figures. Accordingly to University of Phoenix (2011). Introduction to Security a quote” If security personnel accurately assess the nonverbal behavior they would be able to save lots of people. If the nonverbal communication would not be considered important then the security personnel would not be able to save people unless they communicate verbally and it sometimes becomes difficult when an individual is at gun point”. The security team must provide and learn to properly observe and report the nonverbal behavior to qualified personnel so it will more lives. Verbal communication is a very important tool to use, because it helps security



References: University of Phoenix. (2011). Introduction to Security. Retrieved from University of Phoenix, SEC360 website. University of Phoenix. (2009). Communication. Retrieved from University of Phoenix, SEC360 website. University of Phoenix. (2009). Effective Security Management. Retrieved from University of Phoenix, SEC360 website

You May Also Find These Documents Helpful

  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    The training of police officers are rigid, exhaustive and provides opportunities to demonstrate leadership and criminal justice services to federal, state, municipal, and international agencies and partners (The FBI Academy, 2014). Bundled with these trainings include development of effective communication skills that will enable law enforcement officers to build a connection with the public, victims and colleagues. Since the work of police officers entail communicating with people of different background, preconceptions and attitudes, it is necessary that they adjust their communication practices (Barker, 2008). These practices can either be verbal or non-verbal communication. Verbal communication involves the use of spoken words and is a common form of communication, whereas, non-verbal includes not only words by gestures, facial expressions, posture, eye contact and body language.…

    • 1187 Words
    • 5 Pages
    Better Essays
  • Best Essays

    References: Stoneburner, Gary. “Computer Security”, Retrieved November 11, 2011, From National Institute of Standards and Technology at http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf…

    • 3482 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    Senior UI designer

    • 2702 Words
    • 11 Pages

    It provides leadership in addressing issues that confront the future of the Internet and is the…

    • 2702 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Verbal Communication

    • 859 Words
    • 4 Pages

    Verbal and nonverbal communication can be valuable when there is a police situation. In a situation such as a robbery, the witnesses would use both verbal and nonverbal communication in order to help the police with the investigation. Witnesses are most likely to use body language such as putting their head down, not looking directly at the officer or crossing their arms during an interrogation. They would also use gestures with their hands to identify different descriptions of a suspect or the scene of the crime. Witnesses are also likely to tell the investigator verbally what they saw.…

    • 859 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    List of Hosts- HTML

    • 24535 Words
    • 99 Pages

    This script displays, for each tested host, information about the scan itself: - The version of the plugin set - The type of plugin feed (HomeFeed or ProfessionalFeed) - The version of the Nessus Engine - The port scanner(s) used - The port range scanned - The date of the scan - The duration of the scan - The number of hosts scanned in parallel - The number of checks done in parallel…

    • 24535 Words
    • 99 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security

    • 587 Words
    • 3 Pages

    The protection of persons, physical assets and information is a concern at every level of society. From the individual to the giant organization, the need for safety and security is a basic requirement. However, due to limited resources or lack of ability to confront numerous noncriminal risk, public law enforcement agencies are unable to provide adequate protection against the multitude of foreseeable threats. In addition to the fear of crime, numerous hazards exist that threaten personal safety and property. Consequently, security services have experienced tremendous growth, both in terms of the number of personnel employed and the financial investment in the loss prevention and asset protection.…

    • 587 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Physical Security

    • 1733 Words
    • 7 Pages

    Physical security starts with a rather simple basic premise; those who do not belong on your institution’s property should be excluded from your institution. This may happen in three often interrelated ways: when those who do not belong are identified, stopped and denied admission, when those who do not belong are denied admission by a physical device, such as a locked door. When those who do not belong are denied admission because they decide that your institution is too difficult to enter and thus they do note entry.…

    • 1733 Words
    • 7 Pages
    Better Essays
  • Good Essays

    One area of communication that officers are trained in, is nonverbal communication. Not only do law enforcement officers train in reading nonverbal communication, they also learn how to utilize it effectively. Segal, Smith, Boose, and Jaffe (2013) claim that nonverbal communication is the most powerful tool that people can use to express what they really mean and towards building stronger relationships. Officers trained in reading nonverbal communication are able to detect if a person if lying about…

    • 1129 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Sw Security

    • 3001 Words
    • 13 Pages

    Building Security In Editor: Gary McGraw, gem@cigital.com Software Security S oftware security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this undertaking’s importance, but they need some help in understanding how to tackle it. This new department GARY MCG RAW Cigital 80 aims to provide that help by exploring software security best practices. The software security field is a relatively new one. The first books and academic classes on the topic appeared in 2001, demonstrating how recently developers, architects, and computer scientists have started systematically studying how to build secure software.…

    • 3001 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Protection and Security

    • 1598 Words
    • 5 Pages

    The separation of protection and security is a design choice. Protection is identified as a mechanism, which means that it is a device that changes an input into a desired output. Security is identified as a policy, which is a procedure to guide the decision making process. Security relies on the protective mechanisms along with cryptology techniques.…

    • 1598 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    voting

    • 7263 Words
    • 30 Pages

    Abstract — Voting process in today’s era is behind its time in respect of the usage of modern ICT. The voting process is being seen mostly as a manual and paper based one. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related systems were being developed to resolve some of the issues like electoral fraud, impersonation, double voting etc. One such system is Electronic based voting that has been actively used for voting in countries like India. However, these systems seem to be prone to electoral frauds and voters have to make tremendous effort to cast their ballots. There are still a few very important areas which have to be identified and addressed viz., the Security which involves a person be able to vote in a secure manner, the time spent for voting by voters, the efficiency in counting of votes and the cost involved in employing people towards monitoring the voting process. So taking these areas/issues into consideration we have now come with the biometrics authenticated mobile voting system, to start with for a country like Jamaica. The technology being proposed now is novel and the first of its kind proposed at present. It is proposed that using fingerprint supported biometric control information and encryption along with Secure Socket Layer i.e. SSL using VeriSign, would make the software involved in the voting process well secured. In addition tying the credentials to a…

    • 7263 Words
    • 30 Pages
    Good Essays