ebook img

Introduction to Security PDF

562 Pages·2019·14.894 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Introduction to Security

Introduction to Security Introduction to Security Tenth Edition Robert J. Fischer Edward P. Halibozek David C. Walters Butterworth-HeinemannisanimprintofElsevier TheBoulevard,LangfordLane,Kidlington,OxfordOX51GB,UnitedKingdom 50HampshireStreet,5thFloor,Cambridge,MA02139,UnitedStates Copyright©2019ElsevierInc.Allrightsreserved. Nopartofthispublicationmaybereproducedortransmittedinanyformorbyanymeans,electronicor mechanical,includingphotocopying,recording,oranyinformationstorageandretrievalsystem,withoutpermission inwritingfromthepublisher.Detailsonhowtoseekpermission,furtherinformationaboutthePublisher’s permissionspoliciesandourarrangementswithorganizationssuchastheCopyrightClearanceCenterandthe CopyrightLicensingAgency,canbefoundatourwebsite:http://www.elsevier.com/permissions. ThisbookandtheindividualcontributionscontainedinitareprotectedundercopyrightbythePublisher (otherthanasmaybenotedherein). Notices Knowledgeandbestpracticeinthisfieldareconstantlychanging.Asnewresearchandexperiencebroadenour understanding,changesinresearchmethods,professionalpractices,ormedicaltreatmentmaybecomenecessary. Practitionersandresearchersmustalwaysrelyontheirownexperienceandknowledgeinevaluatingandusingany information,methods,compounds,orexperimentsdescribedherein.Inusingsuchinformationormethodsthey shouldbemindfuloftheirownsafetyandthesafetyofothers,includingpartiesforwhomtheyhaveaprofessional responsibility. Tothefullestextentofthelaw,neitherthePublishernortheauthors,contributors,oreditors,assumeanyliability foranyinjuryand/ordamagetopersonsorpropertyasamatterofproductsliability,negligenceorotherwise,or fromanyuseoroperationofanymethods,products,instructions,orideascontainedinthematerialherein. BritishLibraryCataloguing-in-PublicationData AcataloguerecordforthisbookisavailablefromtheBritishLibrary LibraryofCongressCataloging-in-PublicationData AcatalogrecordforthisbookisavailablefromtheLibraryofCongress ISBN:978-0-12-805310-2 ForInformationonallButterworth-Heinemannpublications visitourwebsiteathttps://www.elsevier.com/books-and-journals Publisher:KateyBirtcher Sr.ContentDevelopmentSpecialist:NateMcFadden ProductionProjectManager:SujathaThirugnanaSambandam CoverDesigner:GregHarris TypesetbyMPSLimited,Chennai,India About the Authors RobertJamesFischer,PhD,isPresidentofAssetsProtectionAssociates,Inc.,asecurity con- sulting firm established in 1986. He has over 40 years of experience in the security/loss pre- vention field. He is a member of ASIS International, and the Academy of Criminal Justice Sciences. He has also served as the Director of the Illinois Law Enforcement Executive Institute, retiring in 2001. He is also Professor Emeritus of Law Enforcement and Justice Administration at Western Illinois University. He has published numerous articles, several books, and served as the editor of two journals. He has also provided extensive consulting servicestomajorcorporations,policedepartments,andschools. Edward P. Halibozek, MBA, has over 38 years of security experience. This includes experi- ence in assets protection, government security, contingency planning, executive protection, and security management. He retired from Northrop Grumman Corporation where he was the Vice President of Security. He is the former Chairperson for the Aerospace Industries Association, Industrial Security Committee, and also served as a member of the National Industrial Security Program Policy Advisory Committee (NISPPAC). He is a lecturer on secu- rity and management issues and has written and published numerous assets protection plans, policies and procedures, and position papers related to corporate and government security. He also provides security consulting services in the health care industry and the communications industry. He holds a Master of Science degree in Criminal Justice from CaliforniaStateUniversity andanMBAfromPepperdineUniversity. David C. Walters, MPA, is the Corporate Senior Director of Global Safety, Security & BusinessResiliencyforafortune20InternettechnologycompanyheadquarteredinSanJose, California. He has 30 years of experience in industry-leading security, environmental health/safety, risk management, executive protection, investigation, and brand protection. HeisamemberoftheConference Board’sGlobal Executive SecurityCouncil.Hisexperience iscomplementedbyextensiveinternationalbusinesstravelthatfocusesonsituationalaware- nesstraining inaturbulentworld. xv Preface Only 5 years ago, we were writing the preface for the 9th edition. At that time we mentioned how fast the profession was changing. That statement was prophetic, as changes in technol- ogyarecomingatsucharapidpacethatitisimpossibletokeepupwithalldevelopmentsin awrittentext.Mostofwhatwesaid inthe9thedition prefaceisstillrelevant aswebring this 10th edition to conclusion. World events during the past 5 years such as growing use of ter- rorist attacks throughout the world, as well as ever-increasing cyber-attacks, keep security professionals on their toes, ready to mitigate the next threat. The Parkland, Florida high school, the Boston Marathon, the Pulse nightclub and the Paris nightclub mass casualty events, sometime prompted by individual agendas and other times terrorist inspired, make manyofusnervous. The computer, which is a part of our everyday life, has made information available to anyonewithasimple Googleinquiry.Wecannowmonitorourhomesinrealtimeusingour cellular phones. Unfortunately, this same technology has been exploited by the criminal ele- ment in society. Internet purchases, credit card scanners, and use of our cellular phones are all vulnerable to hacking. Companies which maintain information, like EQUIFAX, as well as mostlargefirms,areevenmoreatriskoftheftsofinformation.The2016electionsweretarn- ishedbyclaimsofhacking(allegedlybyRussians)ofelectiondatabasesandpartyemails. The 10th edition, while maintaining its presentation of basic concepts of security as ini- tially presented in the 1st edition, spends more time focusing on the changes that must be recognized in the security field. Our newest coauthor, Dave Walters, deals with “brand pro- tection,” which he first brought forth in the 9th edition. This concept brings together the needforunderstandingtheintegrationofallcomponentsofsecuritywithinafirmalongwith otherdivisionsofoperation. In the last edition’s preface, we noted the growing tension created by world terrorism. That tension has seen a twist with the birth of the Islamic State (ISIS). This group has been successful in its terrorist approaches, claiming responsibility for all type of attacks on citi- zens, business, and governments. This threat to companies continues to evolve. As this book goes to press, the efforts, lead by the United States, to defeat ISIS have achieved success on severalfronts. This new edition has refocused the chapter on Homeland Security. The new focus is the impact of terrorism on the business world. We have also added one new chapter. This new chapter comes from creating a separate chapter for Fire Prevention and Protection. The chapter on computer security has been thoroughly revised, becoming Holistic Security through the Application of Integrated Technology. This chapter covers the ever changing technology field and the importance of understanding and integrating changes in security operations. In Chapter 20, Security: Today and Tomorrow, we have added material on the xvii xviii Preface need to understand the leadership skill set. This material presents the argument that today’s securitymanagermustbemorethanamanager,butmustalsobealeaderifsecurityistobe integratedandmarketedthroughoutthecompany operation. As we finished this 10th edition, the reality of our times makes it impossible to assure readers that we have presented all the latest in technology. However, we firmly believe that within the pages of this edition, the reader will find the tools necessary to understand the basics of security operations and how to apply changing technology to a loss prevention program. Acknowledgments Ed and I would like to give special recognition to our co-author Dave and dedicate this book to him. During the past year, Dave has faced a major health challenge. Although he was often times quite sick, he continued to carry his share of this project without complaint. We couldn’t have asked for a better writing partner. We are proud to know Dave as a fellow security professional,writer,andfriend. Inaddition,wewishtoacknowledgethoseindividualswhotooktimetocompletesurveys distributed by the publisher, providing us with suggestions for updating the book for this 10thedition.Theseindividualsinclude: (cid:129) DanielBarry,CampusCollegeChair,CollegeofSecurityandCriminalJustice,University ofPhoenix,LasVegasCampus. (cid:129) RyanBaggett,AssociateProfessorofHomelandSecurity,EasternKentuckyUniversity. (cid:129) ThomasFoley,Assistant,College ofSecurityandIntelligence,Embry-RiddleAeronautical University. (cid:129) SimonKing,SeniorLecturerandCourseLeader,DepartmentofSecurityandResilience, BucksNewUniversity. (cid:129) PhillipWood,SecurityandResilienceAdvisory totheViceChancellorandCouncil, BuckinghamshireNewUniversity. We also wish to thank Bob’s longtime professional associate, Richard Janoski, John Deere Corporate Security, ret., and Instructor of security at Western Illinois University, for his insightfulandthoroughreviewofthe9thedition. In particular, special thanks to the content experts who reviewed and at times made sub- stantial updates to materials contained in various chapters. These include: James Falk, Security Director, Ace Hardware, and Alan Saquella, Director Safety and Investigations, Cox Communications, both of whom updated substantial portions of Chapter 15, Retail Security; Steven C. Babb, retired Deputy General Counsel for Northrop Grumman Corporation, who reviewed and updated our chapter on security and the law; Dr. Deborah Pavelka, CPA, retired Professor Roosevelt University, for revising our chapter on cyber security; Steve Martino, VP Information/Cyber Security, Cisco Systems, who provided an informative inter- view for the update to Chapter 17, Holistic Security Through the Application of Integrated TechnologyObjectives. We also thank Tom Stover, Elsevier Publishing for initiating the project. Nate McFadden, Sr. Content Development Specialist, Butterworth-Heinemann, Elsevier, gets special thanks for his constant and consistent support while we worked on this 10th edition. Without his supportwewouldhavehadamuchhardertimeupdatingourmaterials. xix xx Acknowledgments Bob, once again, thanks those at Assets Protection Associates, Incorporated, who pro- vided support services during his work on this revision, as well as comments and edits of various drafts. Special thanks go to Dr. Kathy Fischer, who reviewed each chapter prior to submission.Asaretired ProfessorofHealthSciences,WesternIllinoisUniversity,whotaught “Drug Use and Abuse” for over three decades, Dr. Fischer also finished revising the drug section in Chapter 14, Violence and Drug Use in the Workplace. Finally, we give special thanks to our partners in life, Kathy, Phillis, and Lola, who have supported us in our outside interests. PART I Introduction The chapters in Part I provide an overview of the security and loss prevention industry. Chapter 1, Origins and Development of 21st Century Security, is a brief history of the devel- opmentofthefieldinEuropeandAmerica,endingwithaquick,crisp summaryofthestatus of security in the 21st century. Chapter 2, Defining Security’s Role, identifies the roles of security, whether contract, proprietary, or hybrid. Chapter 3, Career Opportunities in Loss Prevention, covers career options. Chapter 4, Security Education, Training, Certification, and Regulation, discusses the development of security as a profession. Issues discussed include training, certification, and regulation. Chapter 5, Terrorism as a Threat to Business defines howcurrentterroristactivitiesimpactbusinessinthe21stCentury. Asnotedinthepreface,theeventsofSeptember11,2001andsubsequentterroristattacks throughout the world changed the face of security operations. Security is a common theme considered by almost every person in the developed and developing world. Yet, as security professionals know, the basic concepts and theories of security and loss prevention are not changed by a single event. The most significant changes are in the innovative tools that pro- fessionals use to achieve their goals. What is important in looking at the past is that we learn the lessons that are presented in the development of past security operations. We can then apply those lessons to the present situation, modify those that have potential to assist us in ourefforts,anddiscardoutdatedandoutmodedideasandtechnology. The information presented in Part I, along with recommendations just presented, will serve as a basis for understanding and applying the specific materials presented in PartsIIandIII.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.