8 Oct 2022

126

The Concentric Layer Security Model: What You Need to Know

Format: APA

Academic level: College

Paper type: Coursework

Words: 297

Pages: 1

Downloads: 0

In every organization, security is the key to social and economic development. There exist differences between contractual and proprietary security services. Nevertheless, each organization has the responsibility of deciding the one to implement depending on their business. Understanding the differences together with the pros and cons involved in the implementation of either will help in deciding what to choose. 

Proprietary security guards services involve organizations hiring security officers and the equipment required to protect their organization. Further, the organization hires a senior security officer to manage and oversee security functions within the organization ( Tim 2017) . Here, security operations get managed by organization management. On the other hand, contractual security guard operation is a situation where a business outsources security services to another business that majors with security provision. The security offering organization is responsible for all issues relating to security as well as managing security guards. In contractual guards, an organization experiences minimal cost and less responsibility since it does not require investing in insurance training and purchasing security equipment. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

While protecting the medium-sized public library, one requires coming up with a good plan and apply the concentric layer approach to enhance the easy provision of security. First, it is essential to ensure that the library is well-fenced and has a single operational entrance gate at the perimeter fence. Second, the main entrance door of the library should be guarded and controlled ( Bruce 2017) . The office should have its door a few meters from the exterior door and ensure that all the cabinets stay locked and opened when needed. Monitoring the four layers of concentric layers with CCTV cameras to enhance the 24-hour system of surveillance is essential. At least the perimeter fence and the exterior door should have guards from security officers and equipped with a scanner to facilitate easy scanning all the visitors to the library. 

References 

Tim, Prenzler,& Karen, E. (2017).  "Private security in Australia: trends and key characteristics" . Australian Institute of Criminology 

Bruce, Schneier,(2017).  Beyond Fear: Thinking about Security in an Uncertain World , Copernicus Books, 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). The Concentric Layer Security Model: What You Need to Know.
https://studybounty.com/the-concentric-layer-security-model-what-you-need-to-know-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

The 1931 Central China Flood

The country of China was a vibrant agricultural hub in the early 18th century. The agriculturists cultivated on every available fertile piece of land. Their activities disrupted wetlands and Nanyang trees were felled...

Words: 625

Pages: 2

Views: 142

2009 Washington DC Metro Train Collision

The 22 nd of June 2009 saw the collision of two southbound Red Line Washington Metro trains. The total number of casualties was nine with tens of others being injured. According to DC Metro, the cause of the accident...

Words: 554

Pages: 2

Views: 80

Comparing and Contrasting the Rural, Urban, and Insurgent Models of Terrorism

In the purest sense, the term terrorism refers to the application of intentional brutality and violence, in general against unarmed civilians, mainly for political reasons. The term was coined during the French...

Words: 325

Pages: 1

Views: 518

Understanding Response and Recovery

The emergency management system will have to change the response and recovery protocols for better response to an emergency. The changes in the system will entail new official organizations and primed plans for...

Words: 374

Pages: 1

Views: 209

Why Radicalization Fails: Barriers to Mass Casualty Terrorism

Radicalization is a concept that refers to the gradual social processes used to explain changes in behaviours or ideas. There is a clear distinction between behavioural and cognitive dimensions of...

Words: 1951

Pages: 7

Views: 134

Information Sharing and Collaboration: Department of Homeland Security

The Department of Homeland Security (DHS) has many intelligence agencies used for protecting American citizens. The various agencies should collaborate by sharing information to combat threats to Americans....

Words: 307

Pages: 1

Views: 62

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration