Essay Sample on Security and Control Issues

Paper Type:  Essay
Pages:  5
Wordcount:  1108 Words
Date:  2022-11-17
Categories: 

Maintenance of security is one of the issues that company heads ought to observe at all times. There are at times when certain risks happen that affect the operation of a business. Therefore, it is essential to ensure that preventative measures are adopted to ensure that a business thrives without security threats.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Various Types of Potential Security Issues, an Employer May Have To Deal With

An employer is endowed with the ability to deal with potential security issues irrespective of the size of an organization. Much of the potential issues under security threat entail a company's technical information, the working staff, and protection against terrorism. In this case, the technical information refers to a firm's crucial files that contain critical information which is always under the threats of hackers (Olavsrud, 2015). In this case, these computer experts retrieve sensitive information which may be used to harm the operations of a firm. Also, the other aspect of potential security issue revolves around personnel handling that ensures that workers are protected from external or internal harm. The other safety issue rotates around physical facilities (Thompson, N.d). In this case, a company's assets must be protected against theft and access to wrong hands. Finally, terrorist security measures ensure that employees are protected against terror attacks. Employees should be taught on preventive security mechanisms (United States Department of Labor).

Give Examples To Illustrate Each Of These Potential Security Issues

Each of these potential security issues can be presented with various examples. For instance, potential information security can be illustrated with the credit card number scenario. In this case, there was a credit card hacking experience that happened at Target. Also, there is evidence of personal information hacking where people's names, phone numbers, and other personal details were hacked and an estimated about 70 million people claimed to have their information accessed (Thompson, N.d). The hacking made Target develop complex mechanisms where hacking could no longer take place.

Additionally, there are risks where workplaces are illustrated as insecure for human survival. For instance, there is an illustration of the death of a chef at Salem in Massachusetts after a stab by a co-worker. In this case, employers are at the time unaware of the sour relations between employers who end up causing harm within them.

On the other hand, the physical security risks can be explained concerning the destruction of property within workplaces or even robberies in such premises. An example of this form of risk is robbing of financial institutions where attackers are never identified. Also, security agents at these times of attacks are never present to ensure that they protect their premises from being broken. In this case, employers or organizational leaders should install security tools such as surveillance equipment that capture all the activities that happen in their buildings. Some of these security measures are the use of the I.D when entering specific locations and the biometrics to authorize people to access certain locations.

The other security issue relates to terrorist attacks and threats. An example of such a case is the San Bernardino incident where terrorists' attacks ensued and affected various people. Thus, it is crucial for organizations to invest in security to ensure that such threats do not happen in workplaces.

Examples of Security Measures That Might Be Used To Control Each of These Potential Security Issues

One of the security measures that a company can adopt to deal with hackers is to secure their information sites. In this case, a firm can invest in the installation of security spyware and use anti-virus protectors. These methods offer protection of crucial data that may not be accessed with ease. However, it is not 100 percent efficient but limits the pace at which these sites are accessed (AtWork). Another protective measure is the use of secret passwords that are only limited to a few people.

In order to deal with workplace security among personnel, it is vital for employees to be given training that is based on personal defense. With this type of training, violence in workplaces is never experienced. Also, employers need to engage correctional officers who are endowed with the tasks to control the behavior of other workers in their jurisdictions (CIRSASafety, 2012). Undeniably, this is an essential practice to contain the violence that is mostly experienced in work stations.

The security measures that can be used to deal with physical safety in organizations entail several practices, for example, the use of security guards who continuously check on the operations of other employees and outsiders. Also, security devices can be installed such as the CCTV's, biometric systems, and the use of keypad entry systems among the premise workers (Olavsrud, 2015). These are some of the most elaborate ways to control physical security challenges.

Terrorist security threats demand complex security measures to ensure that employees feel secure in their stations. The defense mechanisms against this menace have continually been improved since 2001 where crowded places are secured with the use of metal detectors for all entrants in such places (AtWork). Examples of these crowded places are airports, churches, schools, prisons, and other centers.

Should the Federal and State Governments Enact Tougher Laws or Regulations To Deal With Security Violators?

It is undeniably incorrect to assume that federal and state governments do not have a role to play in the maintenance of security. They should continue to enact strict laws and regulations that deal with security violators to their maximum. In this case, I think such security laws should be implemented as federal laws and be dealt with as federal crimes which are weightier than state laws.

In this regard, I would recommend that hackers be given severe punishments with a thorough analysis of their hacking procedures before handing them life jail sentences (Zetter, 2015). Severe punishments should be handed to all security violators. Also, firms should be assisted in the development of complex computerized systems that cannot be easily maneuvered. With this simple was, security violations are reduced.

References

At Work. (n.d.). Retrieved from https://www.nsc.org/work-safety/safety-topics/workplace-violence

CIRSASafety. (2012, April 12). Facility And Personnel Security: A Comprehensive Plan For A Safer Workplace. Retrieved from https://www.youtube.com/watch?v=ma7Y2HJFj4o&feature=youtu.be

Olavsrud, T. (2015, December 21). 5 information security trends that will dominate 2016. Retrieved from https://www.cio.com/article/3016791/security/5-information-security-trends-that-will-dominate-2016.html

Thompson, M. (n.d.). Security Issues Facing Companies. Retrieved October 07, 2016, from http://smallbusiness.chron.com/security-issues-facing-companies-75647.html

United States Department of Labor. (n.d.). Retrieved October 07, 2016, from https://www.osha.gov/

Zetter, K. (2015, October 19). Teen Who Hacked CIA Director's Email Tells How He Did It. Retrieved October 07, 2016, from https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/

Cite this page

Essay Sample on Security and Control Issues. (2022, Nov 17). Retrieved from https://proessays.net/essays/essay-sample-on-security-and-control-issues

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism