Security Management Planning Importance

ArdentAccordion avatar
ArdentAccordion
·
·
Download

Start Quiz

Study Flashcards

9 Questions

What is the potential loss or damage to an asset known as in the business world?

Risk

What are the three common categories in which risks are generally classified?

Liability (legalities affecting people and material assets)

Risk analysis is a task that needs to be performed only once and does not require periodic assessments.

False

In risk analysis, it is important to identify the __________ of risk occurrence.

probability

Which elements are included in a successful management role?

Implement modern management techniques

What are some examples of tactical plans? Some examples include ______.

Project plans, Acquisition plans, Hiring plans, Budget plans, Maintenance plans, Support plans, and System development plans

What is security management defined as?

Security management is defined as the scientific utilization of men, funds and equipment to protect assets and life and to ensure reduction of business interruptions or losses, keeping it to the minimum.

Due diligence is mainly a follow-up on due care.

False

Match the following needs from Maslow's Hierarchy:

  1. Basic Physiological Needs
  2. Safety and Security Needs
  3. Societal Needs
  4. Esteem and Status Needs
  5. Self-Actualization Needs

Survival needs such as food, shelter sex, and elimination of waste = Basic Physiological Needs A person needs to feel free from anxiety and fear = Safety and Security Needs The need to be loved and need to belong and the societal status as membership and acceptance by a group or members = Societal Needs The need to be competent, to achieve and to gain approval, and respect = Esteem and Status Needs Signifies self-realization and fulfillment, reaching full potential = Self-Actualization Needs

Study Notes

Security Management Planning

  • Security management is the scientific utilization of men, funds, and equipment to protect assets and life, and to ensure reduction of business interruptions or losses.
  • The ultimate goal of security management planning is to create a security policy that will implement and enforce it.
  • A security policy provides a clear direction for all levels of employees in the organizational structure.

Elements of Security Management Planning

  • A guide that identifies goals and visions, defines the role of security, and provides details on how to accomplish goals and objectives.

Types of Security Management Plans

  • Strategic plan: identifies long-term goals and visions, defines the role of security, and provides details on how to accomplish goals and objectives.
  • Tactical plan: provides more details on how to accomplish the goals and objectives specified in the strategic plan, such as project plans, acquisition plans, and budget plans.
  • Operational plan: focuses on the day-to-day operations of the security organization, including resource allotments, budgetary requirements, staffing assignments, and scheduling.

The Top-Down Approach

  • The most effective approach to security management planning is the top-down approach, where senior management initiates and supports the security management planning process.
  • The security team or department should be autonomous and led by a designated chief security officer, reporting directly to senior management.

Role of an Agency Operator/Security Director

  • The security director should have a dual executive personality, being an expert in security and a proficient manager.
  • The director's roles include:
    • Providing leadership to the security organization
    • Acting as a company executive
    • Having high visibility and being a sought-after speaker
    • Having a broad profile and contributing to other areas of the business
    • Being an innovator and finding new ways to improve the job
    • Acting as a counselor and advisor to the company management
    • Being a trainer and supporting the development of subordinates

Inadequate Training and Performance

  • Inadequate training or lack of training is a primary contributor to poor performance.
  • A security manual should be available to regular security personnel and others expected to implement security procedures.
  • The manual should be updated regularly and used as a training guide.

Behavioral Theories

  • Abraham Maslow's Hierarchy of Needs theory suggests that employees' needs must be satisfied in a specific order, including:
    • Basic physiological needs
    • Safety and security needs
    • Societal needs
    • Esteem and status needs
    • Self-actualization needs

Selling Security to Management

  • To sell security to management, it is essential to:
    • Establish a meaningful dialogue with decision makers
    • Marshal the facts and use trend projections to support the position
    • Deal in principles and not personalities
    • Be professional and develop a proposal that is brief and to the point
    • Consider hiring an outside consultant to reinforce the position

Risk Analysis and the Security Survey

  • Risk is associated with almost every activity, especially in the business world, and is a potential loss or damage to an asset.
  • Risk analysis is a management tool that determines the probability of risk occurrence and the impact of effect, in monetary values.
  • A risk assessment analysis is a rational and orderly approach to problem identification and probability determination.
  • Risk analysis provides management with information to base decisions, such as:
    • Preventing the occurrence of a situation
    • Containing the effect of a hazardous situation
    • Recognizing the potential for a hazard

How Risk Analysis Helps Management

  • Risk analysis provides information on the current security posture of the company.

  • It highlights areas where greater security is needed.

  • It helps to assemble facts for the development and justification of cost-effective countermeasures.

  • It increases security awareness by assessing the strengths and weaknesses of security at all organizational levels.### Public and Private Critical Infrastructures

  • Energy Sector, Water Utilities, Information and Communication, Transportation (Land, Air, & Sea), Banking and Finance, Public Health, Emergency Services, Agriculture and Food, Manufacturing, Government Services, Real Estate & Strategic Commercial Centers, and Religious and Cultural Sites and Facilities are all examples of critical infrastructures.

Industrial and Corporate Security

  • Various roles in industrial and corporate security include:
    • Asset Protection Officer
    • Loss Prevention Specialist
    • Crime Prevention Specialist
    • Physical Security Officer
    • Credit Investigation
    • Fraud Investigation
    • Company Security Officer
    • Guard Force Service Manager
    • Health, Safety, Environment & Security Officer
    • Insurance Investigator
    • Executive Protection
    • Risk Control
    • Security Investigator
    • Accident and Traffic Investigator
    • Security Compliance and Audit
    • Threat & Vulnerability Officer

Business and Service Partners

  • Roles in business and service partnerships include:
    • Agency Security Officer
    • Field Officer
    • Security Inspector and Investigator
    • Operations and Liaison
    • Protection Agent
    • Training Officer and Instructor
    • Private Detective
    • Lie Detector Examiner
    • Regulatory Compliance
    • CCTV Specialist
    • K9 Specialist
    • Digital and Automation Specialist
    • Red Team and Penetration Specialist
    • Security Advisory & Consultancy

Academic and Training Institutions

  • Roles in academic and training institutions include:
    • Instructor in BS ISM (online and offline)
    • Campus Security Officer
    • Training Officer and Instructor of Security Training Academy

This quiz assesses understanding of security management planning, its role in protecting assets and life, and reducing business interruptions. It covers the guidelines for successful management, including understanding roles, studying organizations, and setting meaningful goals.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Security Planning and Disaster Response
16 questions
Security Planning and Risk Management
16 questions
Information Technology Contingency Planning
10 questions
Plan de Contingencia
22 questions

Plan de Contingencia

ToughVampire3703 avatar
ToughVampire3703
Use Quizgecko on...
Browser
Browser