StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Traditional Methods of Securing the Assets and Current Technology - Article Example

Cite this document
Summary
The paper "Traditional Methods of Securing the Assets and Current Technology" investigates the performance of the implemented security system. These are coordinated activities to avoid any illegal and unauthorized access through the evaluation of the working of security systems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful

Extract of sample "Traditional Methods of Securing the Assets and Current Technology"

RЕVIЕW THЕ LITЕRАTURЕ RЕLАTING TО BОTH SYSTЕMS ТHЕОRY АND РHYSIСАL SЕСURITY Review the Literature relating to both Systems Theory and Physiсаl Security Author Author’s Affiliation Date Introduction This paper presents some of the important aspects of organizational security with respect to systems theory. The systems theory is a confusing concept as it is used in different ways in different disciplines. In fact, different disciplines give different explanations of systems theory. This confusion arises due to the term “system” because of difficulty in understanding what system is it, whether it is a biological system, an electronic system or social system? This paper discusses the concept of systems theory from a different perspective and that is security. Basically, the systems theory was proposed in the 1928 Ludwig von Bertalanffy who was basically a biologist (Heylighen & Joslyn, 1992; Yurtseven & Buchanan, 2011). The author has discussed this concept in the context of biology however with the passage of time a large number of researchers carried out research on this idea. They discussed their viewpoints in the context of different disciplines. This paper will discuss the concept of system theory with regards to the security of organizational assets. Uses of Systems Theory Up till now, there have been a number of developments of systems theory from diverse perspectives such as Facets of Systems Science focused on a theoretical basis and philosophy (some of the well-known philosophies are Bunge, Bahm and Laszlo). In addition, systems theory has also been used in mathematical modeling and information theory (for instance Klir and Mesarovic have carried out extensive work in this area); and practical applications. In this scenario, the mathematical systems theory emerged as a result of development of isomorphies between the other systems and models of electrical circuits. Some of the important application areas of systems theory comprise computing, engineering, management, family psychotherapy and ecology (Heylighen & Joslyn, 1992; Yurtseven & Buchanan, 2011). Additionally, systems analysis, which is a unique analysis technique does not develop on the basis of systems theory, however follows systems principles to support a decision-maker to deal with a wide variety of problems such as determining, reconstructing, optimizing, and managing a system (typically a socio-technical corporation), at the same time as keeping in mind various goals, restrictions and resource limitations. In this scenario, it is aimed at specifying likely processes, in conjunction with their costs, risks, benefits. Some researchers believe that the systems theory is directly related to cybernetics, as well as with system dynamics, which are used to perform modifications in a system that is based on joined variables (for instance "world dynamics" which was presented by Club of Rome and Jay Forrester). Moreover, the systems theory also plays a significant role in a number of disciplines such as "sciences of complexity", learning self-organization and heterogeneous networks of communicating actors, as well as a number of related areas for instance, chaotic dynamics, artificial life, far-from-equilibrium thermodynamics, artificial intelligence, computer modeling and simulation and neural networks (Heylighen & Joslyn, 1992; Yurtseven & Buchanan, 2011). Figure 1Systems Theory, Image Source: (Friedman & Allen, 2010) Figure 1 demonstrates the systems theory in the context of the social environment. In this diagram the system is presented within a social environment. In this scenario, different aspects of the social environment influence the system and its outputs and outcomes. As the diagram shows, the system also interacts with various other systems or collateral systems. However, there are prospects on the function and role of the system to follow standards inside the larger social environment. In this scenario, if the system fails to conform to those standards, then the system is believed to be dysfunctional (Friedman & Allen, 2010). Use of Systems approach in the protection of assets? The new world is experiencing the potential gains from technological revolution more vigorously since last decade. Technology makes a task easier and cost effective (Gabriel, 2003). With the improvement in technology there is an increase in the awareness regarding the protection against security issues due to which investment in the security measures is also increasing. Security is a set of tactics adopted to resist any harm to property, lives or information etc. A security system is designed by industries, business organizations, warehouses, hospitals, airports, museums, retail outlets etc. in order to protect their valuable assets from theft, breakage or other injuries. Assets hold much value for any organization as they are the determinants of future income generation (Tollington, 1998). So, their protection is foremost priority of the management as the crime rate is increasing nowadays. Causes of such crimes are not known and depend upon the extreme unpredictability of human behavior. There is no way to prevent it except adopting a proactive approach to mitigate the threats and consequent losses. Thus, increasing the risk of apprehension and assessment of all future risks assists in future growth and development. A security system is a complex configuration comprising of three important elements of detecting the threat, delaying its any harmful impact and responding to this situation in the most effective manner (Davies & Minion, 2008). However, a risk-based cost and benefit estimation is essential before the deployment of any security system (Dai, Hu, Chen & Cai, 2012). A security system could consist of a combination of video surveillance, alarm systems, anti-theft systems etc. Protection of Assets or Security Management based on System Theory A system approach comprises of interacting systems and activities based upon the scientific methods. By applying standard scientific theories and systems security management could be made more appropriate. It leads towards an integrated set of security functions that work as a whole in order to achieve the desired goals. According to system approach sophisticated techniques are incorporated to make assessments of threats and vulnerabilities, certain alternative security measures are compared to derive a suitable tactic depending upon its benefits and costs, past experiences are brought in and creative responses are suggested. Hence, it is an integrated approach rather than fragmented (Ramo & Clair, 1998). There are multiple security systems used by organizations i.e. access control system, intrusion detection systems, object protection systems, audio-visual surveillance and alarm systems etc. Below is the brief description of each of these systems: Access Control System This system comprises of electromagnetic locks, access control card technology, biometric readers etc. It hampers any unauthorized access to the area that needs security from any intrusion. It allows movement of selective and authorized people through entrances and exits, thus providing real time control and better security. Often the controlled doors need an encoded cards and readers. Readers analyze the code and give access after disengaging the lock. At some places a personal identification number or biological imprint data is required. For that very purpose, hand geometry, finger prints, retinal scanning, voice analysis, handwriting analysis etc. is required by the biometric readers to open a gate or door. So, the system design is totally site dependent. There are equal chances that this system may be made disable by the intruders through the use of cement, pastes etc. that could jam the readers. Some readers possess this ability to resist vandal features. Anti-pass back are also designed to stop any mishandling of the access control systems. These establish a specific sequence in which access cards should be used to get access (Commonwealth of Australia, 2011). Access control systems are associated with visual security systems and alarm systems to bring any illegitimate entry under the notice of the respective authorities. Intrusion Detection Systems This system is based upon interlinked set of sensors, control panels, local or remote reporting device like a siren or digital communicator. A phone line may also be used to send a signal to central monitoring station in case of any break-in which further send an alarm to police. This system is mostly deployed for the outermost boundaries protection. In this an electronic fence emitting microwave beam patterns that show an interruption in energy in case any person walks through or an invisible fence transmitting infrared beams alerts the security personnel about any possible intervention. Glass break detectors which are sensitive to vibrations or a shock or magnetic switches on the doors are also used. Magnetic switches are composed of a magnet and electrical contacts that stay aligned when the door is closed and only break when an attempt to open it is made. It has a drawback that intruders could attach another magnet on the top of switch and alarm is not set on. So, to solve this triple biased reed switch could be used that have three small and balanced hidden magnets. Any attempt to place another magnet on it would create the imbalance and alert the authorities. There are also stress detectors which are placed under the floor and sense vibrations in case of any pressure (Kostanoski, 1996). Object Protection System It is used in order to prevent any theft of valuable yet vulnerable assets. In this system tags and labels with microcircuits are attached to the objects that are brought in contact with energy field that is set up at exit areas thus, hampering any theft by sending an alert to security personnel. Mercury switches are also utilized that get tilted as soon as an object is moved and set the alarm on. Sometimes, fiber optic cables with pulsating beam of light are used to tie the objects. Wristwatches are also used which have a radio frequency transmitter that alerts the signal when the dial is pressed. It is often used by employees to avoid any damage to life or property (Kostanoski, 1996). Visual Surveillance Cameras are used to get real time information about any illegal activity going on at a place of concern. It detects the nature of threat, pattern of attack and its progress. By doing so it makes an intrusion easy to understand. It is also used as a deterrent because people are less likely to commit a crime if they know that they would be caught by a camera (Lipton, Fujiyoshi & Patel, 1998). This technology needs to be brought in notice of customers especially at places where they have privacy concerns like toilets or changing rooms. Computer vision technology that is associated with the cameras is often subjected to poor detection and high false alarm rates in realistic environment (Lipton, Heartwell, Haering & Madden, 2000). Organizations should administer this security measure with a consideration of certain limitations that could stop privacy invasions (Kostanoski, 1996). Multiplexers, which can get multiple images from different cameras at a time, are also used and individual pictures can be extracted from them to examine them closely. Video recording are also used in law courts as evidence. Alarm Systems This system is used in association with above mentioned systems that provide a warning in case of any suspicious activity. These systems are linked to some pre-determined responses to an intrusion. There are duress alarms that are triggered by to separate buttons to prevent any false alarms. Vehicle alarms, individual item alarms, pressure switches, motion sensors and CCTV activated alarms are also some types (Hong, Chi, Chao & Tang, 2003). In order to make these security systems successful an integrated system approach should be adopted which comprises of a set of certain theories like a security policy theory, risk management theory, control theory, management system theory, contingency theory etc. A well-balanced mix of these theories enables the management to detect any potential risks beforehand and determine the possible responses accordingly. Moreover, these security systems could give best outcomes when they are used in close collaborations and in a holistic or integrated fashion (Hong, Chi, Chao & Tang, 2003). Security policy theory is essential to make the security efforts effective by defining scope and limitations of the security systems. It includes security of data, platform security, communication and personal security and is implemented at different levels in an organization (Kilman & Stamp, 2005). Risk management theory that deals with the assessment and evaluation of risks and threats to the assets, helps in identifying security requirements and control measures (Hong, Chi, Chao & Tang, 2003). Control and audit theory encompasses the monitoring and measurement of the performance of the implemented security system. These are coordinated activities to avoid any illegal and unauthorized access through the evaluation of working of security systems (Young & Leveson, 2014). A management system theory helps in implementation of risk management and defines the scope of security. And according to contingency theory more than one security plans must be there to deal with different situations. It assesses the environment on time and links it with managerial capabilities to minimize any losses (Hong et al. 2003). These all theories have meaning when they are used collectively in an integrated manner and no single theory could best serve the objective of organizational security. This indicates a system approach where different components work together to make a whole while each component is dependent on the other for its proper working. Conclusion Reasoning out all this, it can be said that any traditional methods of securing the assets have become obsolete keeping in view the complexities of current technology. It needs a holistic approach where multiple sub systems could be merged into a single system approach to make the security system of any organization more effective and efficient. In such a system approach, all security systems like access control, intrusion detection, object protection, visual surveillance work in an integrated manner. On the other hand, designing a security policy, identification of possible threats, monitoring and evaluation of security performance makes the asset protection more effective. So, it can be said that system approach provides better security against any damage to the valuable assets by employing proper management tactics aligned with security systems. References Australian Government, (2011). Physical security management guidelines. Commonwealth of Australia. Dai, J., Hu, R., Chen, J., & Cai, Q. (2012). Benefit-cost analysis of security systems for multiple protected assets based on information entropy. Entropy, 14, 571-580. Davies, S. J., & Minion, R. R. (2008). Security supervision: Theory and practice of asset protection. Oxford, UK: Jordan Hill. Friedman, B. D., & Allen, K. N. (2010). Systems Theory. Retrieved August 22, 2014, from http://www.corwin.com/upm-data/32947_Chapter1.pdf Gabriel, G. C. (2003). Decentralizing asset management in a university environment using Web enabled technology. Facilities, Volume 21 Issue 10, pp. 233-243. Heylighen, F. (1998). Basic Concepts of the Systems Approach. Retrieved August 22, 2014, from http://pespmc1.vub.ac.be/SYSAPPR.html Heylighen, F., & Joslyn, C. (1992). What is Systems Theory? Retrieved August 23, 2014, from http://pespmc1.vub.ac.be/SYSTHEOR.html Hong, K. S., Chi, Y. P., Chao, L. R., & Tang, J. H. (2003). An integrated system theory of information security management. Information Management and Computer Security, Volume 11 Issue 5, pp. 243-248. Kilman, D., & Stamp, J. (2005). Framework for SCADA security policy. Kostanoski, J. (1996). Managing security technology in the workplace. Facilities, Volume 14 Issue 7, pp. 26-34. Lipton, A., Heartwell, C. H., Haering, N., & Madden. D. (2000). Critical asset protection, perimeter monitoring, and threat detection using Automated Video Surveillance. Lipton, A., Fujiyoshi, H., Patel, R. (1998). Moving target detection and classification from real-time video. At IEEE Workshop on Applications of Computer Vision. Ramo, S., & St. Clair, R. K. (1998). The systems approach. California: TRW INC. Tollington, T. (1998). What are assets anyways? Some practical realities. Management Decisions, Volume 36 Issue 7, pp.448-455. Walonick, D. S. (1993). General Systems Theory. Retrieved August 26, 2014, from http://www.statpac.org/walonick/systems-theory.htm Young, W., & Leveson, N. G. (2014). An integrated approach to safety and security based on systems theory. Communications of the ACM, Volume 57 Issue 2, pp. 31-35. Yurtseven, M., & Buchanan, W. (2011). Control system design: A General Systems Theory perspective. Proceedings of PICMET '11: Technology Management in the Energy Smart World (PICMET) (pp. 1-9). Portland, OR: IEEE. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Traditional Methods of Securing the Assets and Current Technology Article Example | Topics and Well Written Essays - 2250 words, n.d.)
Traditional Methods of Securing the Assets and Current Technology Article Example | Topics and Well Written Essays - 2250 words. https://studentshare.org/education/2052406-traditional-methods-of-securing-the-assets-and-current-technology
(Traditional Methods of Securing the Assets and Current Technology Article Example | Topics and Well Written Essays - 2250 Words)
Traditional Methods of Securing the Assets and Current Technology Article Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/education/2052406-traditional-methods-of-securing-the-assets-and-current-technology.
“Traditional Methods of Securing the Assets and Current Technology Article Example | Topics and Well Written Essays - 2250 Words”. https://studentshare.org/education/2052406-traditional-methods-of-securing-the-assets-and-current-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF Traditional Methods of Securing the Assets and Current Technology

Methods for Database Security

atabase security has become one of the most important issues in today's world of technology.... atabase security has become one of the most important issues in today's world of technology.... atabase security has become one of the most important issues in today's world of technology.... Many organizations depend a lot on their databases for the storage of their information and assets.... Like all assets that any company treasures, the database is probably one of the most important assets, since it is used to store a myriad of information (Burtescu, 2009)....
10 Pages (2500 words) Essay

Principles of Commercial and Investment Banking

This can mainly done through, acquiring liquid assets that have acceptable low level of risk such government securities, diversifying its asset holding portfolio as risk asset management strategy, issuing loans yielding higher interest to borrowers who are deemed safe, last the bank s meet to maintain enough reserve to meet its depositors need without resulting to borrowing in order to save on cost of borrowing.... Therefore, the bank needs to undertake a gap and duration analysis, in this case sensitivity of profits to interests, where the liabilities which are sensitive to changes in the rate interest are subtracted to from assets that are responsive to changes in the rate of interest in gap analysis....
21 Pages (5250 words) Essay

Biometric Technologies vs Traditional Security Methods

Unlike traditional methods of authentication based of known characteristics – such as passphrases, smart cards – biometric techniques utilize distinct human traits such as voice recognition and prints of fingers that cannot be misplaced, forgotten, or lost.... Experts suggest that biometric technology is the most viable and efficient security measure compared to traditional methods, therefore, the paper aims to validate this claim.... Biometric security methods are indeed most effective authentication method compared to traditional methods such as smart cards and PINS or both....
5 Pages (1250 words) Essay

The Market Risk and the Developments in It

From the paper "The Market Risk and the Developments in It" it is clear that considering the present economic environment, current methods and models of assessing market risk may not be totally adequate under the current economic environment because they failed to predict the risk.... hellip; One of the greatest drawbacks of historical simulation methods is the assumption that if the current distribution is greatly deviating from the historical distribution of the asset prices than historical simulation methods can provide extremely distorted results and can result into poor decision making....
8 Pages (2000 words) Research Paper

Security Functions Specializing in Safeguarding Sensitive Assets

340129 According to Hayes, (2003), the traditional methods of loss prevention seem not to be working and especially in multi-million dollar companies hence putting the security of their assets in jeopardy.... According to Loughlin, (2009), there are various ways of safeguarding the assets of people depending on what kind of asset it is.... nbsp;… In cases of documents, they are locked away in vaults, locked rooms and other locked buildings which also have various security measures such as security fences, security guards, and even identification security systems for the owners of the assets....
1 Pages (250 words) Annotated Bibliography

The US Department of Homeland Security

his research paper intends to explain the responsibility of securing the nations and determine the infrastructure of cyberspace that can restrict in facing cyber threats or attacks on business and governmental policies.... Approach Nations Major Wars I.... .... WWII/War on Terror....
9 Pages (2250 words) Research Paper

Arguments for Accounting Recognition of Intangible Assets

The paper "Arguments for Accounting Recognition of Intangible assets" discusses that with the view towards simplicity, feasibility, and propriety, Garten's insight appears to address squarely the needs of stakeholders.... Observers have been keen, in particular, on the proposal for accounting recognition and measurement of intangible assets in the balance sheet, and development of performance metrics to convey output information.... 460) stresses the important point that intangible assets provide rights, privileges, and special opportunities to businesses....
9 Pages (2250 words) Research Paper

Role of Security Automation Systems in Oil and Gas Industry

There is also the ever-increasing risk of cyber attacks that target their information and communication technology (ICT) infrastructure as well as intellectual property.... The technology implemented in the oil and gas industry significantly necessitates management of cyber risks.... This review ''Role of Security Automation Systems in Oil and Gas Industry'' discusses the key role of such security automation systems in securing data in the oil and gas industry....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us