Managing Vulnerability Using Countermeasures of Physical Security Term Paper

Total Length: 1374 words ( 5 double-spaced pages)

Total Sources: 1+

Page 1 of 5

Maintaining professionalism, when communicating the physical security, ensures its adoption by the stakeholders. In addition, providing a cost estimate for the whole process makes the management team understand the need for the adoption of the physical security in the business/organization (Chapter 7 of Broder, & Tucker, 2011).

Cost benefit/benefit analysis enables the business to assess the risks and advantages associated with the security option. This entails evaluating the efficiency of the security program with the perceived operational costs and implications on organizational performance. This ensures proper development of security design for ensuring effective management operations management. Some of the risk management options that ensure physical security include the development of effective policies, procedures, hardware, and labor that promote utilization of security programs. Recovery can be achieved by ensuring developing the desired hardware that stores data related to operations management in the organization. Evaluating the effectiveness of a security program is achievable by determining the reduction of fraud cases in the business, effectiveness of operations management and the reduction in the number of reported incidences of security threats in the business.

Strengths of the modern physical security countermeasures

It is apparently clear that, the modern physical security countermeasures have more strength as compared to the traditional systems maintaining security. Security surveys used in the physical security countermeasures facilitate early detection and management of a security threat. The survey equips the security personnel and employees of the organization with the desired competencies. The countermeasures help organizations to prevent uncertainties and fraud that affects the effectiveness of operations management. The countermeasures facilitate the development of objectives that can be evaluated for their effectiveness. For example, the communicated benefits associated with physical security can be used to develop realistic and achievable objectives of the organization (Chapter 7 of Broder, & Tucker, 2011).

Physical security systems provided opportunities for the analysis of the perceived and actual costs and benefits associated with the adoption of the program.

Stuck Writing Your "Managing Vulnerability Using Countermeasures of Physical Security" Term Paper?

As such, physical security tools such as policy, procedures, hardware, and labor force/manpower provide organizations with effective ways of analyzing, developing, and designing cost effective physical security programs. The system design of the physical security allows for flexibility. It allows for review, re-structuring, upgrade, and improvement to ensure effective response to threats and management of operations in the organization. The system uses well-written policies, procedures, and guidelines. This ensures employee and stakeholder responsibility in ensuring the maintenance of optimal security within and outside the organization (Chapter 5 of Broder, & Tucker, 2011).

In addition, the countermeasures associated with the physical security are cost effective for business organizations. For example, the organizations use up to 85% of their resources in employing adequate labor force to ensure security and ensure optimum productivity. The countermeasure associated with the physical security reduces these costs because it uses optimum technology to bring the desired organizational change. The anti-trust and detective devices used by the physical security systems are more reliable than the traditional methods of ensuring the security in organizations. It uses state of the most sophisticated electronic systems that facilitate security.

Besides, the countermeasures associated with the physical security are time effective. In addition, the countermeasures replace the traditional systems of security management in the organization. Through this, it helps the organization by reducing the costs of maintaining the adopted security systems. The communication strategies used to market physical security ensure honesty and commitment from the stakeholders. It provides them with the estimate required for the adoption and management of the security systems in their organizations. Conclusively, the counter systems associated with the physical security are cost effective to the organization. They reduce organizational losses by increasing efficiency of tasks execution and management of operations. Above all, the system provides the most effective systems for detecting anti-trust activities and intrusion by a third party into the organization. Therefore, this ensures the safety of organizational information,.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Managing Vulnerability Using Countermeasures Of Physical Security" (2014, March 31) Retrieved May 20, 2024, from
https://www.aceyourpaper.com/essays/managing-vulnerability-using-countermeasures-186433

Latest MLA Format (8th edition)

Copy Reference
"Managing Vulnerability Using Countermeasures Of Physical Security" 31 March 2014. Web.20 May. 2024. <
https://www.aceyourpaper.com/essays/managing-vulnerability-using-countermeasures-186433>

Latest Chicago Format (16th edition)

Copy Reference
"Managing Vulnerability Using Countermeasures Of Physical Security", 31 March 2014, Accessed.20 May. 2024,
https://www.aceyourpaper.com/essays/managing-vulnerability-using-countermeasures-186433