Welcome to EssayHotline!

We take care of your tight deadline essay for you! Place your order today and enjoy convenience.

Explain who is most likely to determine the scope of a security survey, and provide a hypothetical example of an initial outline plan of scope for a security survey of a high street department store.

Explain the scope and definitions of security and security management.

Expand on the following:

  1. Prevention
  2. Protection
  3. Detection
  4. Monitoring
  5. Regulation
  6. Legislation

Weighting: 30

  1. Discuss the responsibilities implicit in the role of a Security Supervisor.

Include the following:

a.   Door supervision

b.   Incident Recording

c.    Anticipating potential incidents

Weighting: 15

  1. Define the organization and constituent parts of a functional Security System (min. 250 words).

Weighting: 10

  1. Explain what constitutes a risk, give three examples of risk and suggest how to effectively monitor and address each risk.

Weighting: 10

  1. Define the meaning of ‘dynamic assessment’ and explain how that would be used to assess and meet individual Protection Needs.

Weighting: 10

Assignment 2:

Explain the terms ‘Threat Assessment’ and ‘Asset Assessment’ and give two hypothetical examples of each.

Weighting: 10

Evaluate the possible impact of an environmental threat on the transportation of an asset and its safe delivery. For the purpose of this, describe in detail the scale of the hypothetical threat and explain and explore all the possible risks.

Weighting: 10

In relation to the previous explanation of a threat, explain which security controls would be appropriate to apply to protect the asset.

Weighting: 5

a.   Explain why it is important to update a Security Analysis regularly and its importance in relation to Risk Management.

b.   Explain how you might apply a ‘Physical Premises Security’ analysis to a small corner shop. (Min 250 words)

Weighting: 10

Evaluate the relationship between a Security Audit and Survey.

Weighting: 5

Define a process for the procurement of external security contractors and suggest additional equipment that may be included.

Weighting: 10

Produce a security procedure for a jeweller’s, including what documentation would be required to support the procedure.

Weighting: 10

Explain how the Security Analysis can contribute to personal safety and security.

Weighting: 5

Give three examples of possible terrorism at varying levels of severity.

Weighting: 15

Assignment 3

Explain how the risk to personnel security can be reduced and how personnel can be monitored without infringing their rights. Give an example of how an organization might ensure that employees are not at risk, and explain how one would obtain a ‘CRB’ check.

Weighting: 10

Provide three examples of security equipment or tools that you would recommend for a corner shop, and briefly explain why you chose them, taking into account costs to the shop owner.

Weighting: 15

Explain the main Act that outlines the basis for the security of information in the UK and outline the main points.

Weighting: 10

Explain the main differences between crisis management and risk management and give a hypothetical situation to illustrate your point. (min. 250 words)

Weighting: 10

An independent menswear retail outlet is going to start offering an online ordering facility. Discuss what contingency planning is appropriate, and discuss the issues that you think may arise that would form part of a contingency plan. (min. 500 words)

Weighting: 10

The independent outlet mentioned above has a stock level discrepancy, with no records of orders, payments or goods being dispatched. What kind of information would you need, and how might you obtain that during an investigation? (min. 250 words)

Weighting: 10

Assignment 4:

Explain the different reasons that a security survey may need to be conducted. Provide and expand on three aspects in detail, including examples of:

a.   Documentation

b.   Physical / premises

c.    Personnel

Weighting: 10

a.   Explain the rationale behind the methodology of a security survey for a medium-sized distribution company giving examples of possible:

o    Threats

o    Risks

o    Impacts

o    Reviews

o    Recommendations

b.   And how each will impact on the survey.

Weighting: 30

Explain who is most likely to determine the scope of a security survey, and provide a hypothetical example of an initial outline plan of scope for a security survey of a high street department store. This can be in report or table format and should include examples and justification of risk scoring.

Weighting: 10

With regard to the store in the previous example, discuss what planning and research will be required to develop and produce a detailed survey.

Weighting: 10

Evaluate the value of a physical fieldwork survey over a survey based on documents, photographs or video evidence.

Weighting: 10

Assignment 5:

Explain the principles behind CPTED and give additional examples to illustrate each principle. (min. 300 words)

Weighting: 10

Using a primary school as a case study, discuss the viability and application of various perimeter security options, taking into account the purpose of those plus the impact on those on the inside and outside of the perimeter. (min. 250 words)

Weighting: 10

Briefly outline the design for the security of each of the following:

a.   A commercial retail premises

b.   A domestic bungalow

c.    An industrial unit manufacturing data components

d.   A church

Weighting: 20

Give two examples of each of the following and discuss ways in which they can be addressed by the security professional, suggesting actions and planning.

a.   Shrinkage

b.   Loss prevention and fraud

Weighting: 10

Design and produce a security report template, and then complete as an example with information from a real source � for example local shopping centre, sport centre or a retail premises. Support the report with photographic evidence as you would if you were to present your findings to a contractor, manager or board.

Weighting: 20

a.   Describe and explain ways in which the security professional can inhibit the incidence of product tampering.

b.   Design a security strategy to limit the risks of extortion in the area of motor design, taking into account the different points at which vulnerability may occur for key personnel.

Weighting: 10

There is a protest regarding the destruction of greenbelt land where protesters will meet in a park and ride car park and make their way to the town hall to protest. You anticipate 400 people to be involved and they will walk two miles from the car park to the centre of the town. Explain:

·         What issues may arise

·         What strategy you would employ

·         How you would control the event

·         What you would need for monitoring

 

© 2024 EssayHotline.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.