Surname 4 Essay Example
The security domain is a department whose mission is to ensure the well-being of the society. It is divided into various segments with each requiring different individual attributes, knowledge and skills. The classification is meant for the supply of security in all departments and organizations that exist. The various segments include the technical security, protective security, intelligence security, the technical security as well as the security manager. As documented by Jensen, 2009, these domains may have several similarities, but the differences enable them to play different roles in their respective role.
The security theory
In reality, Security to a particular issue brings about the failure of the regular processes of the politics sector as well as the democratic processes which are liberal based. Therefore the security results to bringing a negative impact and evil that is necessary to the society. This is in contrast to the view of theoreticians who perceive securitization as a way of engaging and productive activity. Therefore, security is said to involve survival measures. Keller, 2006 explained that when issues that are presented as posing a threat to the designated referred object that exists brings a justification for the usage of extraordinary steps as a way of solving the threat.
Imposition of security cannot be done as the audience’s consent only can justify on whether a measure to be implemented or not. These actions may include breaching of procedures placed on legislative, which are regular, as a way of eradicating the threat on board. Materialistic assumptions that security threats exist independently failed to be left as a criticism. Therefore security is a process or a way of social constructions of threats involving the securitization sector. Securitization legitimizes usage of some measures for the neutralization of threats. As a result, the problem on board is removed outside the normal democratic procedure bound and securitized. More concepts view security as an action purposed to place politics beyond the established rules. Besides, is encloses the issue as above politics or as a kind or politics which is special.
Protective security specific
These officers are typically appointed by the Police pursuant Commissioner. His incumbent is to provide electronic services purposed for safety as well as the performance of duties within the broad with well-defined procedures, policies, and directions. He is required to exercise initiative in duties, conduct besides the use of judgment. The officer has to take the report to the supervisor of Security Control Centre daily. The officer has to perform a proactive role in the maintenance and restoration of security on nations’ infrastructure as well as assets. The property includes places, vehicles, and protection. The agency is made to work individually or as a group under no supervision.
In the ICT branch, Volner, 2007 argues that the protective security team co-ordinates and manages all physical, personal and information aspects in the framework of the protective security. He is part of the component of the day-to-day business activities of the department. The activities include assets, people, and information from potential threats.
Skills and knowledge of the protective security officers
Proper understanding and commitments to the principles of equity, non-equity and diversity requirements, principles practice and assessment of risks in accordance. He must have knowledge on how to secure individuals’ private data and information. The protective security department has direct responsibility of giving support to all elements of the department that range from the personal safety cutting across all the physical and information security.
Responsibilities of the protective security officer
He maintains and develops procedures, policies, standards procedures on its operation and guidelines that entail all the protective security services’ elements. Conduction of briefings on safety and awareness training are his responsibilities. Besides, he oversees the destruction and recording of materials and information and the distribution, accounting and reporting of information classified within a working environment that is highly organized among others. (Hope, 2009)Coordination, supervision, and monitoring of day to days’ work activities of the protective security team is its responsibility as well. To add, he is responsible for the development, oversight, and the supervision of the suite of policies of the protective security and their standards and guidelines associated with the elements of the department.
Security and traffic manager specifics.
The security and traffic manager sits within the section of facilities management. He has responsibility for all the safety and the safety of the institution’s members, infrastructure, visitors, regulations and management of parking on the organization. T
Responsibilities of a security and traffic manager.
He maintains the enforcement of a secure and a safe customers’ environment alongside that of the employees through the establishment of implementation of policies on security as well as the supervision of the security guard force. The traffic manager is said to be responsible for the development and maintenance of the distribution and transportation procedures thus maximum delivery efficiency. This is documented by Zissis, 2012.He makes the selection of the delivery methods that are appropriate for the highest satisfaction of the customer and minimum delivery cost.
Roles and duties of traffic and security manager.
They ensure the goals of the organization are achieved through the acceptance of ownership for the accomplishment of different and new opportunities exploring with the aim of adding value to the achievement of the job. He also updates knowledge on the job through their participation in academic opportunities. These opportunities include the reading publications’ professionals. There is personal data maintenance as well as involvement in professional organizations. Therefore, the traffic and the security managers are of great importance to the securing of the nation’s economy from loss.
Skills and knowledge of the traffic and security manager
The security manager needs to be conversant with the skills on surveillance, have proficiency in management, analysis of information as well as be a useful information delivered to others. Besides, the skills on how to track budget expense, giving the report on skills, coordination, staffing, as well as the ability to deal with complex issues are additional expertise and knowledge.
The security manager ensures maximum use of software, system, and technology as a way of driving efficiency and simplification in the performance of services as activities’ operations. He provides prioritization, communication and solving problems within a teams’ environment that are oriented. However, the added value is maximized through the existing contracts by the principal contractors performing management efficiently.(Torkilseng, 2008)
Intelligence security office
These are the personnel’s in the military trained to gain information through making observations as well as making threat levels’ observations from the enemy lines and war zones. Observations are also required to be taken from activities involving secret operations’ observations that that regards threat to the nation or the military. They are expected to conduct often procedures to partake in the interrogation of the foreign invaders or the suspected terrorist. They later make reports to the commander in chief of their findings. Besides, use or surveillance equipment, computers, and design developed to spy on the places at terror risks or invasion by the foreigners and the border patrol area. They also take the observation on the military duties.
Responsibilities of intelligence security officer.
He is responsible for the development and planning of several strategies that are operational for the mitigation of potential threats to satisfy the organization’s needs. Besides, he should analyze and take measurements on the extent and the nature of compliance risks as well as be providing advice on decision to be made on the potential threats’ compliance. This undermines the sustainability of the Australia.
Skills and knowledge of the intelligence security officers.
These must have skills from military pieces of training and be a member of any branch of the military. Their communication skills are of the highest order with ability in negotiation, vocal works. Written documents, liaison as well as interpersonal forms of communication. Besides, their working relationship should be appreciable. They also have to be conversant with the languages used in the respective societies as well as be able to read the psychology of people. This enables them quickly spot a crime scene or a threat risk. Therefore, they can mentor, guide and develop people, value diversity, and differences, nurture external and internal relationships as well as facilitating partnership and co-operation. (Erickson, 2005)
On results achievement, they can give the delivery report on the expected results, expertise on marshal’s professional, implement and steer changes as it builds organizational responsiveness and capacity. The intelligence officers can display resilience, probity, and professionalism. Finally. The shave all the qualifications and knowledge on the subject matter.
The precinct security manager.
This body of security is almost the same as the security manager discussed above under the traffic and security manager. He has the overall responsibility for the system and department of security. He evaluates and manages various security related activities. This is for insurance of safety and safe environment for the individuals in the nation, Australia. (Baisley, 2008)
Roles of the precinct security manager.
He offers training to the replacement and the new personnel’s in service provision to the satisfaction of the organizations’’ leader as well as ensure all the service providers’ personals pursue their contracted duties. They also ensure all equipment’s in security are used in the correct manner. Besides, they manage the continuing operability and maintenance of the installed surveillance and security systems.
Skills and knowledge of the precinct security manager
The skills and awareness of the security manager are the same as those of safety and traffic officer. He should be conversant to the government of the nation, with leaderships well as with adequate knowledge on information and technology
The technical security officer acts as an advisor to the governments’ protective security. He is the front line in the provision of efficient and professional technical countermeasures of surveillance services. It also advises the Australian agencies and government as well on how it can mitigate and manage the technical surveillance risks evident. This departments’ works provides high assurance that is not subjected to the sensitive and classified decisions that are used in the compromisation of the special attacks as documented by Crook, 2007.
Roles of the technical security officers.
They pursue and make effective and efficient plans for the risks based on the technical surveillance countermeasures as well as monitor the changes in technology and their impacts on security professionally. They also maintain and construct productive activities relationship between the technical surveillance countermeasures and its related agencies. Besides, there is the provision of professional security education and knowledge to the clients, including the development of awareness and educational materials. (Dettinge, 2007)
Skills and knowledge of the technical security officers.
The officers should have displayed qualifications and experience in electro-mechanical or electronics engineering, thus being able to catch up with the ever-growing technologies and can communicate. Also, the officer should pose a resourceful and an analytical mindset in the ways of accessing the technical security of nations which are identified and inspected to be vulnerable from the compromisation view (Prenzler, 2008)
Besides, the officer can have additional skills and knowledge on building construction methods, and information technology work experience, either in the principles of cyber security or it is vulnerable. He must have the understanding on the physical safety and how they are applied to the nation’s rules. Adequate experience in maintenance and the installation of security systems and equipment’s is a necessary skill required alongside the knowledge of system management construction.
Converged themes in themes of knowledge and skills.
The discussed security domains have converged themes based on the skills and knowledge. Some expertise and experience in the field of specialization a protection security officer are found to have some similarities to those of the other security agencies. (Zhang, 2009) Despite the fact that the diversity recorded being more, we have each security domain having its skills and knowledge that differ from those of the other spherical section. Military skills and proper awareness and understanding of the government of an individual nation is a convergent evident in several domains.
Despite the divergence in the skills, roles, and knowledge of the security domains, we have the areas which differ on the educational level basis. Therefore an officer can manage to officiate all the domains through taking short courses as a way of upgrading from one domain to the other. The general role of the securities is to take care of the well-being of the persons in a nation as well as maintenance of law and order as per the constitution governing them.
Bailey, M. (2008). The unified cross domain management office: bridging security domains and cultures. UNIFIED CROSS DOMAIN MANAGEMENT OFFICE WASHINGTON DC.
Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From big data to big impact. MIS quarterly, 36(4), 1165-1188.
Coole, M. P. (2015). Physical Security Professional’s Body of Knowledge: a cultural domain analysis of physical security’s knowledge structure. Doctor of Philosophy, Curtin University of Technology, Perth.
Crook, R., Ince, D., Lin, L., & Nuseibeh, B. (2002). Security requirements engineering: When anti-requirements hit the fan. In Requirements Engineering, 2002. Proceedings. IEEE Joint International Conference on (pp. 203-205). IEEE.
Dettinger, R. D., Kolz, D. P., Stevens, R. J., & Tenner, J. W. (2007). U.S. Patent No. 7,228,307. Washington, DC: U.S. Patent and Trademark Office.
Ericsson, G. N. (2005). Management of information security for an electric power Utility-on security domains and use of ISO/IEC17799 standard. IEEE transactions on power delivery, 20(2), 683-690.
Ericsson, G. N. (2010). Cyber security and power system communication—essential parts of a smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3), 1501-1507
Hope, R. (2009). Protective security review report. Canberra: Australian Government Publishing Service.
Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009, September). On technical security issues in cloud computing. In Cloud Computing, 2009. CLOUD’09. IEEE International Conference on (pp. 109-116). IEEE.
Keller, J. F., & Wilson, D. A. (2006). U.S. Patent No. 5,503,304. Washington, DC: U.S. Patent and Trademark Office.
Prenzler, T., & Sarre, R. (2008). Protective security in Australia: Scandal, media images and reform. Journal of Policing, Intelligence and Counter Terrorism, 3(2), 23-37.
Sapsed, J., Bessant, J., Partington, D., Tranfield, D., & Young, M. (2007). Teamworking and knowledge management: a review of converging themes. International journal of management reviews, 4(1), 71-85.
Torkilseng, Å., & Duckworth, S. (2008). Security frameworks for electric power utilities—Some practical guidelines when developing frameworks including SCADA/control system security domains. CIGRÉ Electra.
Volner, R., & Pousek, L. (2007, October). Intelligence security home network. In Security Technology, 2007. Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on (pp. 30-37). IEEE.
Zhang, J., Reithel, B. J., & Li, H. (2009). Impact of perceived technical protection on security behaviors. Information Management & Computer Security, 17(4), 330-340.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592.
More Important Things