Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 4 seminar Professor Matthew Selves Risk Management – CJ228.

Similar presentations


Presentation on theme: "Unit 4 seminar Professor Matthew Selves Risk Management – CJ228."— Presentation transcript:

1 Unit 4 seminar Professor Matthew Selves Risk Management – CJ228

2 Housekeeping issues… Unit 3 grades –Discussion board –Seminar Review of expectations Upcoming assignments –Midterm essays (Unit 5) Current Unit –DB

3 Housekeeping issues… Contact info: –Email – mselves@kaplan.edu –Cell phone 704-902-2692 –Office hours: Sunday 7:30 – 9:30 PM/EST AIM: chiefselves Late work policy Plagiarism policy Student resources: –Kaplan Writing Center –Career Resources –Student Support Desk

4 Security Survey Designs… In this unit, you should learn about the elements of designing security surveys: doing field work, observing, questioning, analyzing, verifying, investigating, and evaluating. This unit will also demonstrate the need for a preliminary review of the proposed project. You will be introduced to the concept of internal and external security auditors, along with the advantages and disadvantages of each. You will also see how to turn what appears to be a very complex project into a series of simple projects.

5 THE SECURITY AUDIT OR HOW TO SIMPLIFY A COMPLEX PROJECT

6 CONFUSED? In Chapter 7, the author of the text presents information from the standpoint of an outside consultant coming into an unfamiliar environment. DON’T LET IT CONFUSE YOU!

7 PLANNING There are advantages and disadvantages to being an insider and an outsider at an organization. The outside consultant must do a preliminary survey to become familiar with the company’s operation. Normally, the internal security personnel are already familiar with the operation.

8 CLEARING OUR MINDS The outside consultant has the advantage of seeing everything with a “new set of eyes,” while the insider must clear his or her mind of preconceived notions about the security operation. This is where the planning and structured approach comes into play.

9 PLANNING THE AUDIT (SURVEY) Your textbook acknowledges that conducting a security survey (or audit) is a very complex undertaking. To get an idea of the complexities, you might wish to review Appendix A of the text. However, complex tasks can be greatly simplified when they are broken down into smaller, simpler tasks. The internal security staff has the advantage during the planning of the survey; they already know the parameters of the tasks and the company operations.

10 SURVEY PLANNING CONTINUED We can break the survey down into two components: 1.Physical security 2.Operational security

11 PHYSICAL SECURITY Physical security refers to fences, gates, locks, cameras, alarm systems, etc. As noted in the Kaplan course Introduction to Private Security, the physical security always starts with the perimeter and works inward.

12 OPERATIONAL SECURITY This refers to the actual operations of the company: manufacturing and producing the product. It also refers to accounting, billing, and receipt of payments.

13 THE INQUIRY Your text identifies seven activities that relate to the preliminary survey. These are much the same as the overall survey. While the outside person is still feeling around, the insider is ready to start the survey.

14 A SYSTEMS APPROACH Though not explicitly stated, the textbook advocates a systematic approach to the survey process. This is highly recommended: If you lay out a master plan based on a systematic overview of your facility and its operations, there will be less chance of overlooking something.

15 SYSTEMS ANALYSIS IN A NUTSHELL Many people panic at the idea of systems analysis; however, it is really very simplistic and makes your job very easy. We all use systems in one form or another many times every day, we just don’t think about it. A systematic approach simply means that you view a complex operation from the standpoint of its individual subsystem or components.

16 YOUR CAR AS A SYSTEM Your car is a very complex system taken as a whole. However, most people see it in more simplistic terms. I put gas in the car, turn on the switch, put it in drive, and “away we go.”

17 THE DEVIL IS IN THE DETAILS There are times, though, when cars need a closer inspection of their systems. This requires a professional to look at the individual subsystems of the car: electronics, fuel systems, brakes, etc.

18 SYSTEMS ARE SYSTEMS There is no difference, in reality, between the car and security. On the surface, each has a complex operational system. But when you break either of them down into their various subsystems, you can begin to see the difference. An auto mechanic looks for what is wrong with one or more of the car’s subsystems instead of viewing the car as a whole. The security professional must look at the overall system from the standpoint of its subsystems.

19 BREAKING THE SYSTEM DOWN When isolating components (or subsystems), it may be helpful to break them down using a flowchart similar to the one in the textbook. The next two slides show a simplistic version of a flowchart that you can also use. The important part is to be as detailed and thorough as possible.

20 SECURITY SYSTEM PHYSICAL SECURITYOPERATIONAL SECURITY PERIMETERELECTRONICS FENCES & LIGHTING WINDOWS & DOORS ALARMS CAMERAS TRAFFIC CONTROL KEY CONTROL PERSONNEL VEHICLES

21 SITE WORKERS OUTSIDE CONTRACTORS SALES PEOPLE VEHICLES EMPLOYEE PARKING DELIVERY OF MATERIALS SHIPPING DEPARTMENT PERSONNEL

22 GOING FROM MACRO TO MICRO As you can see, all we did was to start with the overall system (macro) and begin to break it down into its smaller segments (micro). So now it becomes a much simpler process to address.

23 COLLECTING THE DATA Now we can start to collect data for the final survey report.

24 CJ 228 – Risk Management Questions and additional discussion???


Download ppt "Unit 4 seminar Professor Matthew Selves Risk Management – CJ228."

Similar presentations


Ads by Google