Sie sind auf Seite 1von 4

ASSESSMENT TASK #1 - WRITTEN QUESTIONS - UNDERPINNING KNOWLEDGE

1. Make your recommendations for increased security to address the needs of the client.
a. What resources will you require?
b. Explain the reasoning behind your answer
c. Support your answer with facts and data
d. Be sure to include budgetary considerations

RESOURCES REASON AND USE FACTS AND DATA BUDGETARY POLICIES AND
OF RESOURCE CONSIDERATIONS PROCEDURES
Human Resource: This is the most As a security risk The recruitment Fair Work Act
Security Personnel, important consultant, there must be 2009
operatives, office resource as is a need to revitalized and
personnel, CCTV everything will not heighten the must choose the
control room work if there are security measures most competent
personnel no people who as the political person without
will make it tension has sacrificing the
possible. extended to Exon quality of
which is competencies of
considered a high- the applications.
risk place given However, the
that is contains number of
petroleum and personnel must
other flammable only be the right
fluids. amount
considering the
budgetary
constraints of the
company.
Physical Resource: Aside from the Aside from the The building can
Buildings and facilities, Human Resource, security be just an old
office equipment Physical Resources personnel, there is space that can be
(computer, printer, are also vital since also a need to renovated. The
fax, photocopier) they are needed in build a Control construction of
the establishment Room which the building will
of the security always needs cost a lot of
center. equipment and money and it will
security officer on be better to
duty. utilize an old but
in good condition
building for the
security center.
Security Equipment: These are One (1) officer is Budget
communications important tools in required to considerations
equipment (two-way the security patrol the must be
radio, pager, industry and these external considered in the
telephone, mobile will aid the perimeter of the purchase of these
telephone, security personnel fence. An officer security items.
megaphone); security to excellently and must always However, the
equipment (electronic efficiently perform be on duty and quality of the
screening equipment, their duties and you have five (5) equipment must
video cameras, responsibilities in officers at your also be taken into
monitors, alarms and the field. disposal. utmost
signals, metal consideration
detectors, motion Each officer given that they
sensors, personal works ten (10) will be used
duress alarms, static hours and has
alarms, batons, staggered start
handcuffs, spray, and finish times.
firearms); and The
advanced security roster rotates
system such as the around the
installation of Closed- officer’s work
circuit television and days off.
(CCTV), also known as The officers
video surveillance, is patrol on foot.
the use of video 6 metre high
cameras to transmit a fencing with
signal to a specific barbed wire on
place, on a limited set top.
of monitors. CCTV cameras
placed on top of
the fence on
each of the four
(4) corners of the
property.
One vehicle
entry only
Two personnel
entries only
Others: These are auxiliary There is a need for In terms of
Electricity, water resources and these resources budget, what we
considered vital in even if they are can consider is
the overall only auxiliary. the controlled use
maintenance of of these and we
the security can also inject
facility saving measures.

2. Plan and implement the increased security requirements within the parameters outlined
above.
a. Develop a roster for at least four (4) months.
b. Be sure to include preparations and planning required to introduce the roster i.e.
recruitment and outplacement procedures for extra casual security operatives

3. Explain how you would monitor, adjust and review the operation as required.
a. Be sure to include the reporting mechanism you would use.
b. What external factors could influence the operation and therefore require monitoring.
This goes all the way back to security guard training 101 but make sure that when you’re
writing your incident report that you’re only including the facts. Your job is to observe and
report the incident as you saw or experienced it. The proper authorities will take care of
the investigative work when needed.

A security incident is attempted or actual:

 Unauthorized access, use, disclosure, modification, or destruction of information


 Interference with information technology operation
 Violation of campus policy, laws or regulations
Examples of security incidents include:

 Computer system intrusion


 Unauthorized access to, or use of, systems, software, or data
 Unauthorized changes to systems, software, or data
 Loss or theft of equipment used to store or work with sensitive university data
 Denial of service attack
 Interference with the intended use of IT resources
 Compromised user accounts

Report the basics and include the following:

 The Who: Who were the individuals involved? Were you able to collect contact
information or a visual description of the persons involved? Make sure you
remain courteous and objective when describing others.
 The What: What actually happened? This is your chance to really explain the
chronological events that took place. Do your best to be as descriptive as
possible without including unnecessary information. When you are unsure
whether certain information is relevant, go ahead and include it just to heir on
the side of caution. Its better to have too much than too little.
 The When: Do your best to include the time the incident took place. If you’re not
sure, use a window of time rather than guessing.
 The Where: Include details like the address, location, scenery, and other
pertinent details like the weather, or lighting conditions.
 The Why: This can often be the most difficult to answer, so unless you have a
clear understanding of the motive behind the incident, it’s best not to speculate.
 The How: How did the incident occur? This could also be difficult to answer so
only include details that you are positive took place.

4. What communications system would you recommend to ensure ongoing information


exchange and maximum safety for operatives?

 Portable and mounted two-way radios - Close protection officers and security guards
working at events or in retail should always carry a two-way radio, which is important
for the communication with the Center or with other security guards. Although it is a
must for every person working in security industry, a two-way communication is
outdated in comparison with today’s communications evolution and cloud based
innovative applications and systems.
 Mobile phones - Even If most of the time security guards use walkie-talkies for
communication, cell-phones are crucial for a quick call at any time. You can put all the
important contacts on speed dial for even faster access.

Das könnte Ihnen auch gefallen