Security Management Overview

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which perspective emphasizes pleasure versus pain as a primary driver of human behavior?

  • Classical School of thought
  • Hedonism (correct)
  • Rational choice theory
  • Deterrence theory focused on swift and severe punishment

What is the primary focus of security assessments, as opposed to risk or threat assessments?

  • Identifying vulnerabilities in existing security protocols
  • Determining the likelihood of specific threats occurring
  • Calculating potential financial losses from security breaches
  • Examining a facility's overall security program through systematic evaluation (correct)

How does the concept of 'deterrence decay' impact security management strategies?

  • It suggests security measures become less effective over time if not maintained or updated. (correct)
  • It refers to the physical degradation of security equipment, leading to system failures.
  • It indicates a decline in the public's fear of crime, encouraging more offenses.
  • It implies that the perceived severity of punishment decreases over time.

What is the main implication of the 'dark figure of crime' for security management?

<p>It suggests that official crime statistics underestimate the true extent of criminal activity. (C)</p> Signup and view all the answers

What distinguishes 'executive protection' from general private security services?

<p>Executive protection provides security to high-profile individuals who may be at increased risk. (A)</p> Signup and view all the answers

How does the 'broken windows theory' influence security strategies in urban environments?

<p>By prioritizing the repair of minor damage and signs of neglect to prevent further crime (C)</p> Signup and view all the answers

How do security measures such as high ground and vantage points contribute to overall security?

<p>They provide a tactical advantage for observation and defense. (B)</p> Signup and view all the answers

In the context of security, what is the significance of ASIS International?

<p>It serves as the largest organization worldwide for security professionals. (B)</p> Signup and view all the answers

What is the primary purpose of pre-employment screening in enhancing organizational security?

<p>To evaluate a candidate's background and potential risk factors before hiring (A)</p> Signup and view all the answers

Which security principle is directly addressed by implementing measures for 'opportunity reduction'?

<p>Minimizing potential targets and increasing surveillance (A)</p> Signup and view all the answers

Why is 'security' defined as 'the condition of being protected against hazards, threats, risks, or loss'?

<p>To emphasize the proactive and comprehensive nature of security measures (D)</p> Signup and view all the answers

How does the use of wireless networks impact modern camera systems in security?

<p>They facilitate smaller, more accessible devices, enabling greater flexibility. (B)</p> Signup and view all the answers

What is the primary purpose of using window film in security applications?

<p>To delay entry and provide additional time for authorities to respond. (C)</p> Signup and view all the answers

What distinguishes 'tempered glass' from 'annealed glass' in terms of security?

<p>Tempered glass shatters into small pieces, while annealed glass shatters into shards. (D)</p> Signup and view all the answers

How does Artificial Intelligence (AI) enhance camera system effectiveness?

<p>By primarily assisting with sorting out false alarms (A)</p> Signup and view all the answers

Flashcards

Security

The condition of being protected against hazards, threats, risks, or loss.

Security Assessment

A systematic on-site assessment and analysis of current security measures.

Security Training

A thorough, systematic examination of a facility's overall security program, best conducted by an independent, outside firm.

Iron Law of Troublesome Places

Trigger fear to the environment, typically from dark parking lots and alleyways.

Signup and view all the flashcards

Security Perimeter

Physical barrier used to deter, detect, delay, deny, and defend.

Signup and view all the flashcards

Fencing

Chain Link fencing most common, with 11 gauge wire and 8 feet tall

Signup and view all the flashcards

Alarm

A device that detects changes and triggers based off said changes

Signup and view all the flashcards

Passive Infrared (PIR)

Detects changes in thermal energy

Signup and view all the flashcards

Tempered Glass

Glass that's Code in most of entrances and car windshields, shatter into pieces

Signup and view all the flashcards

Camera systems (CCTV)

Trends with cameras coming into play for solving crimes. A good example of this the city in London known for being the most surveilled.

Signup and view all the flashcards

ASIS International

Largest security organization worldwide.

Signup and view all the flashcards

Security (Latin Definition)

The condition of being without care, free from danger (Latin origin).

Signup and view all the flashcards

Threat Assessment

Analyzing hazards, threats, vulnerability to reduce risk.

Signup and view all the flashcards

Opportunity Reduction

Reducing opportunity for crime.

Signup and view all the flashcards

Study Notes

  • Security is the condition of being protected against hazards, threats, risks, or loss.
  • ASIS stands for the American Society for Industrial Security.
  • CPP means Certified Protection Professional.
  • A security manager needs 5 years of experience in security management for the CPP.
  • Risk assessment is also known as needs assessment.
  • Security is quantifiable.
  • Insurance is part of security.
  • Security includes threat assessment and leanage.
  • Theories include hedonism and the Classical School.
  • Hedonism is pleasure vs pain
  • Under the Classical School, individuals possess free will.
  • Deterrence is a theory proposed by Bentham.
  • Deterrence includes swift, severe, and certain punishment.
  • Deterrence decay is when punishment is no longer in view.
  • Rational choice includes a suitable target, a likely offender, and the absence of capable guardian, as well as Routine activity approach
  • Security can include fraud, disaster recovery, and pre-employment screening.
  • Executive protection and private security are part of security.
  • Castles were security measures in the past.
  • Castles are on high ground near water and have vantage points.
  • Security improves with each generation.
  • Code of Hammurabi is the set of laws from ancient Mesopotamia
  • Lex talionis is Latin for the principle of an "eye for an eye."
  • Sumer was an ancient civilization with a legal system.
  • English common law impacted security
  • 1066 Norman invasion impacted security
  • William I criminalized offenses against the king.
  • Maslow's hierarchy of needs goes from biological, to safety, love/belonging esteem and self-actualization.
  • Professor Kremser taught security management on 03/04/25.

Board Certification

  • ASIS International is the largest security organization worldwide.
  • IPSC is part of threat assessment.
  • ASIS requires paying an annual membership fee.
  • ASIS has conferences and standards that are needed to be followed.
  • "Certified Protection Professional" certification requires staying up to date with continued education.

Defining Security

  • Securus is the Latin word for security.
  • Securus means without care, free from danger.

Conceptualizing Application

  • Micro is personal security and situational awareness.
  • Mezzo is institutions and office buildings.
  • Macro is homeland security and city design.

Security Assessment

  • Security assessment involves a systematic on-site analysis of current security measures.
  • A security assessment includes physical, technology, operations, and policies.
  • Security assessments involve training.
  • Security program is a thorough systematic examination of a facility's overall security program.
  • Best security programs are conducted by an independent outside firm.
  • Schools do this security program using school resource officers and state police.
  • Security assessments are not the same as risk assessments or threat assessments.
  • Assessments aren't about checking off boxes, inspections, placing blame, or selling a product.
  • The purpose is to assess the current level of security, locate deficiencies, and make feasible recommendations.
  • It's recommended to start at the exterior and work your way interiorly.
  • Main concern is with reasonable prevention, not reaction.

Dark Figure of Crime

  • Shoplifting is a main security issue.
  • Shoplifting mainly affects private institutions.
  • Data about shoplifting is not readily available to researchers.
  • The "Iron Law of Troublesome Places" triggers fear in the environment, dark parking lots, alleyways.
  • Broken windows theory is a theory about crime in disordered areas.
  • Crime is centralized in poorly cared for areas, disorder

Security Perimeters

  • The five D's are deter, detect, delay, deny, and defend.
  • Deter can include a no trespassing sign.
  • Detect can include security cameras local proprietary and central station alarms
  • Delay can include fencing.
  • Deny can include a rising blocker.
  • Defend is one of the 5 D's.
  • Chain Link fencing is most common, 11 gauge wire and 8 feet tall.

Alarms

  • Local alarms include car alarms.
  • Proprietary alarms are maintained onsite by a security team.
  • Notification is received and responded to in proprietary settings.
  • Central station alarms are used in residential areas.
  • Central station alarms are monitored by a third party and often use ADT.
  • Central station alarms sends an alarm trigger to the central station
  • Alarms can notify police, fire, and the homeowner.
  • Alarm system cuts down on false alarm responses by police.
  • 97% false alarm rate
  • Alarm system detects defects in equipment.
  • Nuisance alarms detects something that response is not needed which is often wildlife
  • Passive infrared (PIR) detects changes in thermal energy/ detects wildlife and large dogs and cats/can lead to nuisance alarms
  • Microwave motion alarms are used in security.
  • Prevention of fires, carbon monoxide.
  • Window glazing reduces the risk of harm
  • Tempered glass is used in most entrances and car windshields.
  • Tempered glass shatters into pieces.
  • Annealed glass is used in homes
  • Annealed glass shatters into shards.
  • Window film is not bulletproof and delays entry for authorities to arrive.
  • Ballistic glass has a rating of 1-8 according to UL.

Camera System

  • Camera system is also known as CCTV.
  • Cameras are increasingly used to help solve crimes
  • London is the most surveilled city.
  • Casinos spend the most on camera systems.
  • Remote monitoring
  • Fewer personnel needed to monitor
  • Faster connections
  • Technology is getting more practical and cheaper
  • AI assists security and sorts out false alarms.
  • Wireless networks are trending.
  • Smaller cameras are trending.
  • Solar paneling and more accessible devices is on the rise
  • Body worn cameras are being used on police.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Site Security Management Roles Quiz
5 questions
Industrial Security Management
10 questions

Industrial Security Management

FantasticChalcedony3859 avatar
FantasticChalcedony3859
IT Security Management Basics
20 questions

IT Security Management Basics

LustrousNephrite6095 avatar
LustrousNephrite6095
Use Quizgecko on...
Browser
Browser