Question

In: Operations Management

what are some commin threats to residential securtiy and how can they be mamaged? what are...

what are some commin threats to residential securtiy and how can they be mamaged?

what are some of the common laws that govern shipping/ cargo security?


Solutions

Expert Solution

Some of the most common threats to residential security are:

Home security system - Many people may consider locks for their windows and doors as a good security system for their homes and belongings. Locks have been an age-old safeguarding device for homes. But with growing awareness of the latest technology and weapons these locks may not be enough for the latest criminals to break through them.

Thus, this threat can be managed better by installing a home security system with alarms, detectors, sensors and video surveillance. During the vacation period it may also be wise to have a house sitter.

Home coverage - Just getting a home security system with alarms and detectors may not be enough. It is important to ensure that every part of the home is covered without any gap, especially the doors and windows. Some times people may go for low-cost security packages which may have bare minimum coverage, leaving out may entry points.

This shortcoming may be resolved by tailoring the required security system and installing them keeping the reliability in mind rather than the affordability, including all possible entry points like not only the doors and windows but also the balcony, entrance via the garage, etc.

Equipment calibration - Sometimes improper calibration of the equipment to avoid false alarm may also cause a threat. For eg. People having pets at home may set the moving sensor too high to avoid triggering them. Similarly, sound sensors may be set too high so that clattering of glass does not raise an alarm. Besides these, equipment that is not well maintained gets redundant posing a threat. Many times people may even forget to replace their dead batteries.

This can be avoided by having a security system specialist calibrate the equipment correctly and test it. Even frequent professional inspection and maintenance will help. Having extra batteries stocked at home to replace on time will keep the equipment operational at all times.

Assembled security products - Sometimes, when the security system has been assembled, some of the products may not be compatible with each other. For eg. a tracking camera may interrupt a motion detector, or two pieces kept beside each other may cause electromagnetic interference causing inefficiency of both these products.

This can be avoided by working with one security system provider or seeking their approval before fixing another product.

Some of the Laws governing Cargo/ Shipping security are :

C-TPAT membership - Customs-Trade Partnership against Terrorism (C-TPAT) emerged after the 9/11 attack and was launched in November 2001. Members of CTPAT work with US customs to protect their cargo from the concealment of terrorist weapons. In return, US customs expedites processing of their cargo on arrival at port and also provides reduced inspection of cargo, besides also some other benefits such as penalty mitigation.

The Hague-Visby rules - These are a set of rules framed that applies to the carriage of goods by sea. This is applicable only to contracts of carriage covered by a Bill of Lading or any document of title of goods. This enforces the terms negotiated between parties in the the Bill of Lading.

Carriage of Goods by Sea Act (COGSA) - This is an act that clearly states the law regarding who has the right to sue the carrier and who the carrier can sue for their freight amount or carrier charges.


Related Solutions

What are some of the external “opportunities” and “threats” to organizations that can be associated with...
What are some of the external “opportunities” and “threats” to organizations that can be associated with the COVID-19? (state at least three (3) each
What are system access threats? and some examples.
What are system access threats? and some examples.
What some Opportunities and Threats in the financial industry?
What some Opportunities and Threats in the financial industry?
What are the greatest threats to the global worker? How can – or should – organized...
What are the greatest threats to the global worker? How can – or should – organized labor collaborate across borders to address those threats? How can organized labor seek to work with developing nations in growing their economies and expanding the reach of prosperity to millions of citizens while protecting the basic human rights of workers?
One of the security threats is confidentiality breach. Explain what it is, how it can be...
One of the security threats is confidentiality breach. Explain what it is, how it can be detected and how it can be prevented.
Why are internal threats a major challenge for organizations? How can internal threats be minimized?
Why are internal threats a major challenge for organizations? How can internal threats be minimized?
What are the manor threats to infrastructure systems and how can risk analysis be used to...
What are the manor threats to infrastructure systems and how can risk analysis be used to improve security?
What are some Motivations and techniques used for Advanced Persistent Threats (APT)? What are some events...
What are some Motivations and techniques used for Advanced Persistent Threats (APT)? What are some events that may indicate an active attack in terms of APTs? What are some Attack Surfaces and Vectors for Advanced Persistent Threats (APT)?
what are some of the risks, threats, and vulnerabilities commonly found in the workstation domain?
what are some of the risks, threats, and vulnerabilities commonly found in the workstation domain?
How does emergency management learn from history? Give some examples. What are the threats you believe...
How does emergency management learn from history? Give some examples. What are the threats you believe are most likely to create an incident in your community?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT