Question

In: Operations Management

1. Give examples of security measures that might be used to control information security, personnel security,...

1. Give examples of security measures that might be used to control information security, personnel security, and health hazard security issues.

2. Should the federal and state governments enact tougher laws or regs to deal with security violators? If so, what are your recommendations?

Solutions

Expert Solution

Answer:-

1)Every business requires security measures in order to run a safe business organization free from hazards and personal insecurities.The security measures and safety measures should be made adequate and the staff should be made aware of them.

Explanation:-

Security measure to control information security are the safeguards or countermeasures to avoid detect , counteract or minimize security risks to physical property, information , computer systems or other assets.Information security measures controls protects the confidentiality, integrity and availability of information..The information security measures promotes good security practices and define frameworks or systems to structure the analysis and design for managing information security controls.

Personal security is maintained using the following measures,By knowing all the precautions well , using protective measures preventing risks by replacing off materials , using the materials properly to prevent injuries,protection from chemicals and technical protective measures.Hazards control measures are important to the business as the measures protects both the individuals and the business.The measures includes elimination of the hazards, substitution, engineering control , administrative controls and personal protective equipment.The measures helps to control business hazards hence establishing a safety organization.

2) Seurity is one of the basic needs and rights of the citizens of a country which should be provided by the federal and state governments. With the rise in crime rates, especially the organized crime activities as well as terrorist attacks, the government should put tougher laws and regulations to enforce security measures. The violators of security should not be handled lightly as they would still be a threat to the society.

Explanation:-

One of the measures and recommendations which the government can apply is to have a longer standard minimum period in incarceration before being given a right to parole. When the guilty offenders are given parole or released on a bond after a very short period of time they may not see the offense they committed that caused a threat to security as a very serious offense. The government should also employ more security forces and personnel including the acquisition of more security resources; equipment and other types of resources. The use of modern technology, especially technology that help to overcome the rising cyber-security crimes can also help a lot. More stringent laws and regulations governing security should also be passed.


Related Solutions

Question: What is Control Measures? Explain 5 types of control measures with examples
Question: What is Control Measures? Explain 5 types of control measures with examples
HIPAA security , physical safeguard give examples of the following : 1) user-based access control 2)...
HIPAA security , physical safeguard give examples of the following : 1) user-based access control 2) role-based access control 3) context-based access control
Give three examples of Clinical outcome measures that could be used in Economic evaluation analysis, and...
Give three examples of Clinical outcome measures that could be used in Economic evaluation analysis, and discuss the context in which each could be used to assess the health benefits or impact of an appropriate intervention or Technology for health, including the use of medicines.
How are environmental factors used to control microbal growth? Give some everyday examples.
How are environmental factors used to control microbal growth? Give some everyday examples.
Give three (3) examples of experimental or observational studies that used (or might use) random sampling....
Give three (3) examples of experimental or observational studies that used (or might use) random sampling. How might the outcome have been different for each had random sampling not been used? Explain.
1) Give the intuition behind the multiplier. Give examples of activities that you suspect might produce...
1) Give the intuition behind the multiplier. Give examples of activities that you suspect might produce a small multiplier effect and another that you think might produce a large multiplier effect. 2) Using the simple household model, C = co + c1 (Y-t), assume that co is $1000, taxes are $1000, and is c1 .5. What would be the impact on consumption spending if household incomes were to rise by $500? (Ignore the multiplier effects here.) What about if taxes...
define epigenetics and give some examples of what and how it can alter "genetic" information/control
define epigenetics and give some examples of what and how it can alter "genetic" information/control
Security Controls to Protect Assets What are the control measures currently in use to protect against...
Security Controls to Protect Assets What are the control measures currently in use to protect against payroll fraud? What are the vulnerabilities related to payroll fraud found by the risk assessment team? Please make copy paste available Must be 250 words
1.Explain the methods are used to avoid material hazards. 2. Explain the control measures for overpressure...
1.Explain the methods are used to avoid material hazards. 2. Explain the control measures for overpressure 3. Explain the Process Design Strategies 4.Describe the Flash point and Auto Ignition temperature 5.Explain the causes of Dust explosions in detail.
1. Give examples of what might be unethical behavior in accounting, and list possible internal controls...
1. Give examples of what might be unethical behavior in accounting, and list possible internal controls to prevent these behaviors. 2. Discuss how different inventory methods affect the income statement and balance sheet.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT