overall role of security systems security services

30
Overall Role o Security Syste Security Services

Upload: hilda-hines

Post on 17-Jan-2016

222 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Overall Role of Security Systems Security Services

Overall Role of Security SystemsSecurity Services

Page 2: Overall Role of Security Systems Security Services

2Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Copyright and Terms of Service

Copyright © Texas Education Agency, 2011. These materials are copyrighted © and trademarked ™ as the property of the Texas Education Agency (TEA) and may not be reproduced without the express written permission of TEA, except under the following conditions:

1)  Texas public school districts, charter schools, and Education Service Centers may reproduce and use copies of the Materials and Related Materials for the districts’ and schools’ educational use without obtaining permission from TEA.

2)  Residents of the state of Texas may reproduce and use copies of the Materials and Related Materials for individual personal use only, without obtaining written permission of TEA.

3)  Any portion reproduced must be reproduced in its entirety and remain unedited, unaltered and unchanged in any way.

4)  No monetary charge can be made for the reproduced materials or any document containing them; however, a reasonable charge to cover only the cost of reproduction and distribution may be charged.

Private entities or persons located in Texas that are not Texas public school districts, Texas Education Service Centers, or Texas charter schools or any entity, whether public or private, educational or non-educational, located outside the state of Texas MUST obtain written approval from TEA and will be required to enter into a license agreement that may involve the payment of a licensing fee or a royalty.

Contact TEA Copyrights with any questions you may have.

Page 3: Overall Role of Security Systems Security Services

3Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Risk Analysis

• The overall role of security management that includes identifying potential areas of loss and developing/instilling appropriate security countermeasures

• One part of this process is the security survey, which is used to identify potential problem areas

Page 4: Overall Role of Security Systems Security Services

4Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Risk Analysis (continued)

• Security services methodologies include– One-Dimensional Security – relies on a single deterring

factor (i.e. guards)– Piecemeal Security – security systems that have individual

pieces added to the loss prevention function as the need arises without a comprehensive plan

– Reactive Security – security systems that respond only to specific events of loss

– Packaged Security – standard security systems (equipment, personnel, or both) without a connection to any specific threats and with the assumption that packaged systems will take care of all problems

Page 5: Overall Role of Security Systems Security Services

5Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Risk Analysis (continued)

• There is a range of needs in security services– A small business with minimal loss potential or

relative ease of defense might adequately be served by one-dimensional security (i.e. a good lock on the door and an alarm system, or a contract guard patrol)

– As risks increase and become more complex, the effectiveness of the one-dimensional approach decreases, and a more comprehensive security program becomes necessary

Page 6: Overall Role of Security Systems Security Services

6Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Risk Analysis (continued)

• Security must be based on the analysis of the total risk potential

• In order to set up defenses against losses from crime, accidents, or natural disasters, there must first be a means of identification of the risks

Page 7: Overall Role of Security Systems Security Services

7Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Risk Management

• Management techniques that identify, analyze, and assess risks/threats; if a risk/threat is detected, methods are employed to manage it

• Requires procedures and research to help businesses avoid taking security risks

• Allows risk to be handled in a logical manner by using long-held management principles

Page 8: Overall Role of Security Systems Security Services

8Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Risk Management (continued)

• Begins with threat assessment (identifying vulnerabilities)– Many threats to businesses are important to security– Specific threats are not always obvious– The key is to consider the specific vulnerabilities in a given

situation– Characteristics of a good security manager are

• Awareness of all possible risks• The ability to assess the system and policies from the perspective of a

criminal in order to accurately reduce the vulnerability of company property

– A thorough threat assessment is comprehensive and accurate, and leads to effective countermeasures

Page 9: Overall Role of Security Systems Security Services

9Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Risk Management (continued)

• Begins with threat assessment (identifying vulnerabilities) (continued)– After a threat assessment is complete, a vulnerability analysis

(aka a security survey or an audit) should be repeated on a regular basis

– Threats to information systems are divided into three categories• Natural Threats • Intentional Threats • Unintentional Threats

– No system can be truly safe from all threats, but knowing the risks and methods for prevention increases the chance of protection

Page 10: Overall Role of Security Systems Security Services

10Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Risk Management (continued)

• Includes two alternative solutions, which should be complementary– Investment in loss-prevention techniques– Insurance/Insurance companies• Cannot meet the security challenges faced by major

corporations alone• Have found loss-prevention techniques and programs

invaluable

Page 11: Overall Role of Security Systems Security Services

11Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Risk Management (continued)

• Requires a good risk-management program that involves four basic steps– Identification of risks or specific vulnerabilities– Analysis and study of the risks/vulnerabilities– Optimization of risk management alternatives (see Section X)

• Risk Avoidance • Risk Reduction • Risk Spreading • Risk Transfer • Self-assumption of risk

• Ongoing study of security programs

Page 12: Overall Role of Security Systems Security Services

12Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Security Survey

• An exhaustive physical examination of the premises and a thorough inspection of all operational systems and procedures– To analyze a facility to determine the existing state

of its security– To locate weaknesses in its defenses– To determine the degree of protection required– To lead to recommendations for establishing a total

security program

Page 13: Overall Role of Security Systems Security Services

13Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Security Survey (continued)

• Requires an examination of the procedures and routines in regular operation

• Requires an inspection of the physical plant and its environs

Page 14: Overall Role of Security Systems Security Services

14Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Security Survey (continued)

• Can be conducted by – Staff security personnel currently employed by the

company– Qualified security specialists employed from

outside of the company for this specific purpose– Some experts suggest that outside security

personnel can provide a more complete appraisal because they are more objective and less likely to be blinded by routine

Page 15: Overall Role of Security Systems Security Services

15Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Security Survey (continued)

• Should be completed by persons who – Have training in the field– Have achieved a high level of ability– Are totally familiar with the facility and its

operations

Page 16: Overall Role of Security Systems Security Services

16Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Security Survey (continued)

• Includes a checklist created by the survey team in preparation for the actual inspection – Serves as a guide for the areas that must be examined– Includes locations and departments to be surveyed

including• Physical location• Personnel department• Accounting department• Data processing department• Purchasing department• Shipping and receiving department

Page 17: Overall Role of Security Systems Security Services

17Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Report of the Survey

• After the survey is complete a report should be written indicating the areas that have weak security and recommending solutions

• After the report is complete, a security plan may be created using it as a resource

• The plan must be revised to find the best approach for achieving acceptable security standards within the indicated limitations; compromise will be necessary in some cases

Page 18: Overall Role of Security Systems Security Services

18Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Report of the Survey (continued)

• When security directors do not receive their requests, they must work within the framework as best they can

• When security directors are denied extra personnel, they must find hardware that will compensate

• Security directors must exhaust every alternative method of coverage before going to management with an opinion that requires this kind of decision

Page 19: Overall Role of Security Systems Security Services

19Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Operational Audits and Programmed Supervision (continued)

• An operational audit (OA) – Considers all aspects of the security operation on a

continuing basis– A methodical examination, or audit, of operations– Threefold purpose

• To find deviations from established security standards and practices

• To find loopholes in security controls• To consider means of improving the efficiency or control of

the operation without reducing security

– Relatively inexpensive and builds on the security survey

Page 20: Overall Role of Security Systems Security Services

20Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Operational Audits and Programmed Supervision (continued)

• An operational audit (OA) (continued)– Based on the concept of programmed supervision

without which the audit would become nothing more than a simple security survey• Programmed Supervision (PS) – making sure that a

supervisor or other employees go through a prescribed series of inspections that will determine whether the functions or procedures for which they are responsible are being properly executed (Fischer and Green, 1998)

Page 21: Overall Role of Security Systems Security Services

21Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Operational Audits and Programmed Supervision (continued)

• An operational audit (OA) (continued)– Conducted by supervisors who are evaluating their

areas of responsibility on an ongoing basis– Differs from a security survey which begins by

developing a checklist of items that the security team believes are important

– Conducted regularly and frequently, and once the OA begins, it continues until someone in a position of authority decides that it is no longer necessary

Page 22: Overall Role of Security Systems Security Services

22Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Operational Audits and Programmed Supervision (continued)

• An operational audit (OA) (continued)– Requires supervisors to report physical conditions

regularly, as opposed to the security survey which relies heavily on either the proprietary security force or a contractor

– Uses the management resources of the company• The security manager can develop a comprehensive

security plan using the information gained from vulnerability analysis, security surveys, and OAs

Page 23: Overall Role of Security Systems Security Services

23Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Probability

• The chance that something will happen; typically involves the use of mathematics

• After vulnerabilities are identified by the security survey or the OA, it is essential to determine the probability of loss, even though probability is subjective

• Then decisions must be made based on– How quickly a problem needs to be addressed– Data, such as the physical aspects of the vulnerability being

assessed – Procedural considerations – History of the industry’s vulnerabilities

Page 24: Overall Role of Security Systems Security Services

24Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Criticality

• A term used to help separate vulnerabilities into smaller, specific categories; also means the impact of a loss as measured in dollars

• Determines how important the area, practice, or issue is to the existence of the organization

• The expense of security services must be greater than the potential loss of money for a viable cost-benefit analysis

Page 25: Overall Role of Security Systems Security Services

25Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Criticality (continued)

• Measures the impact of dollar loss, which includes– Cost of the item lost– Replacement cost– Temporary replacement– Downtime– Discounted cash– Insurance rate changes– Loss of marketplace advantage

Page 26: Overall Role of Security Systems Security Services

26Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Probability/Criticality/Vulnerability Matrix• Criticality, like probability, is a subjective measure,

but it can be placed on a continuum• By using the ranking generated for probability and

criticality, and by devising a matrix system for the various vulnerabilities, it is possible to quantify security risks and determine which vulnerabilities merit immediate attention

• Although some areas of importance may be obvious, some security executives may be surprised to find that other areas are more critical than they first surmised

Page 27: Overall Role of Security Systems Security Services

27Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Probability/Criticality/Vulnerability Matrix (continued)

• By considering the history of loss and the number and quality of security devices present, it is possible to estimate the probability of a cash theft

• Criticality should take precedence over probability

• The security director should implement measures to reduce the threat to the improbable level whenever the measures are cost-effective

Page 28: Overall Role of Security Systems Security Services

28Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Alternatives for Optimizing Risk Management• It is unlikely that any evaluation can absolutely

determine the cost effectiveness of any security operation

• A low crime rate can indicate that the security department is performing effectively

• Security services can also be considered insurance against unacceptable risks

• Effective security services must be adaptable, changing regularly to accommodate changing circumstances in a given facility

Page 29: Overall Role of Security Systems Security Services

29Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Alternatives for Optimizing Risk Management (continued)

• Compiling pertinent information is a useful tool for keeping security services current and effective– The survey and the report provide a valuable evaluation that

shows a detailed and current profile of the firm’s regular activities

– Texts, periodicals, official papers, and articles in the general press related to security matters especially those with local significance• May have immediate importance• May eventually reveal and predict risk patterns (i.e. seasonal shifts,

economic trends)

– Litigation, particularly with issues about no or inefficient security

Page 30: Overall Role of Security Systems Security Services

30Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Resources

• 012382012X, Effective Security Management, Charles A. Sennewald, Security World Publishing, 2011

• 0205592406, Introduction to Private Security: Theory Meets Practice, Cliff Roberson and Michael L. Birzer, Prentice Hall, 2009

• 0750684321, Introduction to Security, Robert J. Fischer and Gion Green, Butterworth-Heinemann, 2008

• Threats to Security: In Information Assurance and Security, Purdue University, The Center of Educational Research

• Investigator/Officer’s Personal Experience