Chat with us, powered by LiveChat Please prepare a response to each of the attached documents for total of 2 responses. The responses need to be at least 150 words each. The responses should be as if you are talking dir - Writingforyou

Please prepare a response to each of the attached documents for total of 2 responses. The responses need to be at least 150 words each. The responses should be as if you are talking dir

Please prepare a response to each of the attached documents for total of 2 responses. The responses need to be at least 150 words each. The responses should be as if you are talking directly to the person.

Due in 24 hrs.

Wild-card events are significant events that fall outside the realms of probability and plausibility. They tend to fall into the “possible” realm, which often is overlooked when considering future impacts to security.  Aliens attack or a meteor strikes the Earth are examples.  These events might be considered possible, but spending time developing a plan to mitigate them are not a good business practice.  A wild card might be something not even predictable.  One wild card that might be considered is Artificial Intelligence (AI) in the form of robots in control access and security response is a “wild-card” worth considering.  This could have an immense impact on the security industry.  The security professional might address initially by keeping up to date on the technology.  Making professional contacts in the AI industry is a must.  If a development is on the horizon, the security manager would be better prepared to mitigate or even take advantage of it.  In addition, being prepared to act when the AI movement happens is essential.  The security manager should be prepared to reach out to his/her contacts when the time arises.  When a wild card event happens, innovation happens, or you fall behind.  The security manager can preempt this AI wild card event by collaborating with other key parts of the organization in brainstorming sessions to help promote innovation and creativity. 

One of the primary areas of weakness is about perception.  It is not uncommon to see a security professional as a security guard.  The traditional bumbling idiot that is easily duped, out of shape, and unaware of his surroundings.  This perception is perpetrated in the movie and television industry.  In life, perception is everything.  If the security industry is perceived as a group of bumbling idiots, then they will not get the recognition needed to be a competent professional.  To change this perception, those in the security industry my strive to select those individuals that will represent the field in a professional manner and demand respect from those that which the service is provided for.

This final forum brings our collaborative effort in SCMT 390 Security Administration to and end.  Thank you all for your input and responses.  Good luck in your courses and in life.

Marc

References

Smith, C., & Brooks, D. (2013).  Security Science: The Theory and Practice of Security. Chapters 8 & 9.  Retrieved from http://ezproxy.apus.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=485991&site=ehost-live&scope=site&ebv=EB&ppid=pp_177

,

Good day, Professor and Class;

 

As we come to the end of this course, we now understand that a security manager’s position is more than just managing the guard force, as many people think this is the primary function of a security manager. Security management is more than a profession; it is a science. Science is an ever-changing field, as so is security management. Many security and business continuity professionals never thought the world would shut down due to a global pandemic, a wild-card no one ever thought of. As technology evolves, threats and challenges evolve; therefore, making the job of a security manager more challenging with ongoing opportunities, not obstacles. A wild-card, I see coming in the upcoming years, is the merge of IT Security and physical security and the development of “bots.” A bot is a software that conducts the usual tasks a human does, like making reservations and fetching information from an email to add to your calendar. In some cases, bots have been designated to assist in the customer service field in replying to customers and act as if a human was replying to the customer. Bots are just a simple example of the development of AI. (Wagner, 2016) As AI continues to evolve, the challenge continues to grow. We have seen many movies like the terminator, her, and transcendence, where machines developed human-like thoughts and decided the human race was dangerous or, in the case of the movie “her”, developed a personality to make a human fall in love with her. Such a wild-card will be something new to the security manager to deal with and figure a way to overcome the threat or the challenge. Security managers need to ensure there will be a way to control the AI system in case if it develops its own thoughts to mitigate any risks accompanied with that developed thinking.

The security industry is evolving and relying more and more on IT security. (ASIS, 2015)This should give the security industry professionals the idea that having knowledge of only the physical part of security will soon not be enough to have a good security program to address all threats and vulnerabilities. Security managers should broaden their knowledge and start acquiring more education and certification in the IT field to float when the flood comes. Certification such as CISM will be much desired shortly, in addition to ASIS certifications like PSPS and CPP, even for security managers.

 

References

ASIS International, Knoke, M. E., C., & Peterson, K. E. (2015a). Physical Security Principles (First ed.). ASIS International.

Wagner, K. (2016, April 11). Bots, explained. Vox. from https://www.vox.com/2016/4/11/11586022/what-are-bots