Professional Security Management : A Strategic Guide.
Material type:
- text
- computer
- online resource
- 9781000080568
- 658.47
- HV8290 .S93 2021
Cover -- Half Title -- Title -- Copyright -- Dedication -- Contents -- List of figures -- List of tables -- Acknowledgements -- Introduction -- Thinking like a criminal -- Aims -- Security management -- Exercise Brave Defender -- 1 Private security and the development of the security manager -- Policing and law enforcement -- The United Kingdom -- The Metropolitan Police Service (MPS) -- The US -- The UK police post-2008/09 -- The next great recession -- The dark figure of crime -- The private security sector -- Private security companies (PSC) -- The 2012 London Olympics -- The development of the security manager -- Management -- Security management -- The cultural debate -- 2 Security risk management and strategic business awareness -- The security professional and risk management -- Risk management responsibilities -- Crisis management and the security manager -- Strategic business awareness and the security manager -- Income generation -- 3 Critical security areas -- 3.1 Security risk management -- Security -- International security -- Timeline -- Personal security - extrapolating from above section -- National security -- International security -- Globalisation -- A potted history -- Walls and castles -- Risk -- Risk perception -- Risk perception case study: 9/11 -- The security risk assessment -- Competent persons and the security risk assessment -- Subject matter expertise -- Risk component parts -- Assets -- Brand and reputation -- Threats: capability combined with intent -- Vulnerability -- Likelihood -- Impact -- Risk treatment and control measures -- Reduce the risk -- Avoid the risk -- Risk transference -- Residual risk -- Risk acceptance -- Risk communication -- Exercise Brave Defender: security and risk management -- Scenario -- Britcom UK: 1 Canada Fields -- Security systems at 1 Canada Fields -- Access control.
Intruder detection system (IDS) -- Britcom plc -- Unique selling point -- Internal - SWOT -- External - PESTLE -- Synopsis -- Task -- 3.2 Crime Prevention Through Environmental Design (CPTED) and Situational Crime Prevention (SCP) -- CPTED -- Situational Crime Prevention -- Situational Crime Prevention activities -- Routine Activity Theory (RAT) -- Rational Choice Theory -- Synopsis -- 3.3 Physical and electronic security systems -- Defence in depth (DiD) -- Defence in depth (continued) -- The surrounding environment -- Perimeter -- Fencing -- Security lighting -- External access control -- Building fabric and construction -- Physical security standards -- Reception areas -- Electronic systems -- Closed circuit television (CCTV) -- Perimeter intruder detection systems (PIDS) and intruder detection systems (IDS) -- Internal access control -- Radio frequency identification (RFID) -- Synopsis -- 3.4 The security survey and the security audit -- The security survey -- Competency levels -- The security surveyor -- My vision - the professional security surveyor -- Registered security surveyor/auditor -- Synopsis -- 3.5 Business resilience -- Risk management -- Management policies, procedures, and practices -- Communicating, consulting, and establishing the context -- Identifying, analysing, evaluating, treating, monitoring, and reviewing risk -- Treating, monitoring, and reviewing the risk -- Identification of residual risks -- Monitoring and reviewing risk -- Crisis management -- The crisis management plan (CMP) -- Phases of a crisis -- Pre-crisis - preventing the crisis from occurring -- The financial crisis of 2008 -- Operational crisis - containment and control -- Post-crisis phase -- The crisis management team (CMT) -- CMT members -- CMT lead -- Human resources lead (director) -- Legal advisor -- Public relations (PR) and communications lead.
Security and safety -- Operations and logistics -- Business administration and finance -- The role of the crisis management team -- Crisis communications -- Senior management response -- Synopsis -- Exercise Noble Response -- Phase 1 -- Phase 2 -- Phase 3 -- Phase 4 -- Phase 5 -- Phase 6 -- Phase 7 -- Phase 8 -- Phase 9 -- Phases 1 to 7 - summary -- Reflection on the above -- Phase 1 -- Phase 2 -- Phase 3 -- Phase 4 -- Phase 5 -- Phase 6 -- Phase 7 -- Phase 8 -- Phase 9 -- Résumé -- Terrorist threat level: SEVERE -- Phase 10 -- Phase 11 -- Disaster management -- Disaster management and the disaster management cycle -- The Disaster Management Life Cycle -- Business continuity -- Business -- Business Continuity Planning (BCP) and Business Continuity Management Systems (BCMS) -- The Business Continuity Plan (BCP) -- Synopsis -- 3.6 The chief security officer (CSO) and the chief information security officer (CISO) -- The CSO -- The CISO -- Synopsis -- 3.7 Cybercrime and the cyberthreat -- The cyberthreat -- The Internet of Things -- Synopsis -- 3.8 Critical national infrastructure -- Interdependency -- Risk and critical infrastructures (CI) -- Threats to critical infrastructures -- Physical threats -- Fukushima Daiichi -- Physical -- Cyber -- The protection of critical infrastructure (CI) -- Cyber-NHS and ransomware -- Synopsis -- Task -- 3.9 Terrorism and counterterrorism -- Definitions and identification of terrorism -- The psychology and rationale of terrorism -- Radicalisation and de-radicalisation -- Radicalisation -- De-radicalisation and disengagement -- Terrorist methods of operation and attack platforms -- Irish terrorism -- The troubles -- The Fenians -- Partition -- 1969 - the Apprentice Boys march -- The Provisional Irish Republican Army (PIRA) -- The corporal killings -- PIRA external operations -- Jihad -- Islamic Jihadi terrorism.
Extreme right-wing terrorism -- Left-wing ideologies -- State-sponsored terrorism -- State patronage -- State assistance -- Synopsis -- Task -- 3.10 Aviation and maritime security management -- Aviation security -- Maritime security -- International terrorism -- MV Limburg -- USS Cole -- The ISPS Code -- Maritime Transportation Security Act (MTSA) of 2002 - USA -- Container Security Initiative (CSI) - US -- Customs Trade Partnership Against Terrorism (C-TPAT) - USA -- World Customs Organisation (WCO) Framework of Standards to Secure and Facilitate Trade (SAFE) -- Authorised Economic Operator (AEO) - EU -- Maritime security - piracy -- Synopsis -- Task -- 3.11 Supply chain security management -- Intermodal transportation -- Synopsis -- 3.12 Hostile environment awareness -- Beirut -- Synopsis -- 3.13 Strategic business awareness -- Britcom plc -- Synopsis -- Task -- 3.14 Fraud and fraud investigations -- Concern - 2018 -- PwC's 2018 Global Economic Crime and Fraud Survey -- Fraud -- Types of fraud -- Synopsis and task -- 3.15 Retail loss and prevention methods -- The British Retail Consortium (BRC) -- Context and trends -- Violence and abuse -- Theft and damage -- Fraud -- Cyber -- Retail loss prevention -- Members of staff -- Organised criminals -- Opportunist criminals -- Mitigation -- Involve the right people with the right approach -- Venice and the unions -- The right people -- Resistance -- Choose activities and topics -- Plan and execute -- Synopsis -- 3.16 Workplace investigations -- Evidence -- Legislation -- Civil law -- Criminal law -- Acts of Parliament -- The investigation -- Planning -- Procedural transparency -- Synopsis -- Tasks -- 3.17 Academic and vocational qualifications -- SIA front line training -- Common security industry knowledge -- Security guarding specialist module -- Conflict management module.
The Regulated Qualifications Framework (RQF) -- Foundation degree -- Bachelor's degree (BA/BSc) -- Master's degree (MA/MSc/MLitt/MPhil) -- PhD -- Chartered status -- ASIS International -- 3.18 Conclusion -- Bibliography -- Index.
To examine exactly what is required of the Professional Security Manager in a demanding and fast changing business orientated sector.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.