My Account Log in

1 option

Professional security management : a strategic guide / Charles Swanson.

Ebook Central Academic Complete Available online

View online
Format:
Book
Author/Creator:
Swanson, Charles, author.
Language:
English
Subjects (All):
Private security services--Management.
Private security services.
Physical Description:
1 online resource (329 pages)
Edition:
1st ed.
Place of Publication:
London ; New York, New York : Routledge, [2021]
Summary:
"Historically, security managers have tended to be sourced from either the armed forces or law enforcement. But the increasing complexity of the organisations employing them, along with the technologies employed by them, is forcing an evolution and expansion of the role, and security managers must meet this challenge in order to succeed in their field, as well as protect the assets of their employers. Risk management, crisis management, continuity management, strategic business operations, data security, IT and business communications all fall under the purview of the security manager. This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses. It covers the basics of strategy, risk, and technology from the perspective of the security manager, focusing only one the "need to know". The reader will benefit from an understanding of how risk management aligns its functional aims with the strategic goals and operations of the organisation. This essential book supports professional vocational accreditation and qualifications, such as the Chartered Security Professional (CSyP), or Certified Protection Professional (CPP), and advises on pathways to higher education qualifications in the fields of Security and Risk Management. It is ideal for any risk manager looking to further their training and development, as well as being complementary for Risk and Security Management programs with a focus on practice"-- Provided by publisher.
Contents:
Cover
Half Title
Title
Copyright
Dedication
Contents
List of figures
List of tables
Acknowledgements
Introduction
Thinking like a criminal
Aims
Security management
Exercise Brave Defender
1 Private security and the development of the security manager
Policing and law enforcement
The United Kingdom
The Metropolitan Police Service (MPS)
The US
The UK police post-2008/09
The next great recession
The dark figure of crime
The private security sector
Private security companies (PSC)
The 2012 London Olympics
The development of the security manager
Management
The cultural debate
2 Security risk management and strategic business awareness
The security professional and risk management
Risk management responsibilities
Crisis management and the security manager
Strategic business awareness and the security manager
Income generation
3 Critical security areas
3.1 Security risk management
Security
International security
Timeline
Personal security - extrapolating from above section
National security
Globalisation
A potted history
Walls and castles
Risk
Risk perception
Risk perception case study: 9/11
The security risk assessment
Competent persons and the security risk assessment
Subject matter expertise
Risk component parts
Assets
Brand and reputation
Threats: capability combined with intent
Vulnerability
Likelihood
Impact
Risk treatment and control measures
Reduce the risk
Avoid the risk
Risk transference
Residual risk
Risk acceptance
Risk communication
Exercise Brave Defender: security and risk management
Scenario
Britcom UK: 1 Canada Fields
Security systems at 1 Canada Fields
Access control.
Intruder detection system (IDS)
Britcom plc
Unique selling point
Internal - SWOT
External - PESTLE
Synopsis
Task
3.2 Crime Prevention Through Environmental Design (CPTED) and Situational Crime Prevention (SCP)
CPTED
Situational Crime Prevention
Situational Crime Prevention activities
Routine Activity Theory (RAT)
Rational Choice Theory
3.3 Physical and electronic security systems
Defence in depth (DiD)
Defence in depth (continued)
The surrounding environment
Perimeter
Fencing
Security lighting
External access control
Building fabric and construction
Physical security standards
Reception areas
Electronic systems
Closed circuit television (CCTV)
Perimeter intruder detection systems (PIDS) and intruder detection systems (IDS)
Internal access control
Radio frequency identification (RFID)
3.4 The security survey and the security audit
The security survey
Competency levels
The security surveyor
My vision - the professional security surveyor
Registered security surveyor/auditor
3.5 Business resilience
Risk management
Management policies, procedures, and practices
Communicating, consulting, and establishing the context
Identifying, analysing, evaluating, treating, monitoring, and reviewing risk
Treating, monitoring, and reviewing the risk
Identification of residual risks
Monitoring and reviewing risk
Crisis management
The crisis management plan (CMP)
Phases of a crisis
Pre-crisis - preventing the crisis from occurring
The financial crisis of 2008
Operational crisis - containment and control
Post-crisis phase
The crisis management team (CMT)
CMT members
CMT lead
Human resources lead (director)
Legal advisor
Public relations (PR) and communications lead.
Security and safety
Operations and logistics
Business administration and finance
The role of the crisis management team
Crisis communications
Senior management response
Exercise Noble Response
Phase 1
Phase 2
Phase 3
Phase 4
Phase 5
Phase 6
Phase 7
Phase 8
Phase 9
Phases 1 to 7 - summary
Reflection on the above
Résumé
Terrorist threat level: SEVERE
Phase 10
Phase 11
Disaster management
Disaster management and the disaster management cycle
The Disaster Management Life Cycle
Business continuity
Business
Business Continuity Planning (BCP) and Business Continuity Management Systems (BCMS)
The Business Continuity Plan (BCP)
3.6 The chief security officer (CSO) and the chief information security officer (CISO)
The CSO
The CISO
3.7 Cybercrime and the cyberthreat
The cyberthreat
The Internet of Things
3.8 Critical national infrastructure
Interdependency
Risk and critical infrastructures (CI)
Threats to critical infrastructures
Physical threats
Fukushima Daiichi
Physical
Cyber
The protection of critical infrastructure (CI)
Cyber-NHS and ransomware
3.9 Terrorism and counterterrorism
Definitions and identification of terrorism
The psychology and rationale of terrorism
Radicalisation and de-radicalisation
Radicalisation
De-radicalisation and disengagement
Terrorist methods of operation and attack platforms
Irish terrorism
The troubles
The Fenians
Partition
1969 - the Apprentice Boys march
The Provisional Irish Republican Army (PIRA)
The corporal killings
PIRA external operations
Jihad
Islamic Jihadi terrorism.
Extreme right-wing terrorism
Left-wing ideologies
State-sponsored terrorism
State patronage
State assistance
3.10 Aviation and maritime security management
Aviation security
Maritime security
International terrorism
MV Limburg
USS Cole
The ISPS Code
Maritime Transportation Security Act (MTSA) of 2002 - USA
Container Security Initiative (CSI) - US
Customs Trade Partnership Against Terrorism (C-TPAT) - USA
World Customs Organisation (WCO) Framework of Standards to Secure and Facilitate Trade (SAFE)
Authorised Economic Operator (AEO) - EU
Maritime security - piracy
3.11 Supply chain security management
Intermodal transportation
3.12 Hostile environment awareness
Beirut
3.13 Strategic business awareness
3.14 Fraud and fraud investigations
Concern - 2018
PwC's 2018 Global Economic Crime and Fraud Survey
Fraud
Types of fraud
Synopsis and task
3.15 Retail loss and prevention methods
The British Retail Consortium (BRC)
Context and trends
Violence and abuse
Theft and damage
Retail loss prevention
Members of staff
Organised criminals
Opportunist criminals
Mitigation
Involve the right people with the right approach
Venice and the unions
The right people
Resistance
Choose activities and topics
Plan and execute
3.16 Workplace investigations
Evidence
Legislation
Civil law
Criminal law
Acts of Parliament
The investigation
Planning
Procedural transparency
Tasks
3.17 Academic and vocational qualifications
SIA front line training
Common security industry knowledge
Security guarding specialist module
Conflict management module.
The Regulated Qualifications Framework (RQF)
Foundation degree
Bachelor's degree (BA/BSc)
Master's degree (MA/MSc/MLitt/MPhil)
PhD
Chartered status
ASIS International
3.18 Conclusion
Bibliography
Index.
Notes:
Description based on print version record.
ISBN:
0-429-32306-9
1-000-08056-0
9780429323065
OCLC:
1141922842

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account