Security - PowerPoint PPT Presentation

About This Presentation
Title:

Security

Description:

Security & Loss Prevention: An Introduction 5th Edition Philip Purpura Part 1 INTRODUCTION TO SECURITY AND LOSS PREVENTION Chapter 1 The History of Security and Loss ... – PowerPoint PPT presentation

Number of Views:501
Avg rating:3.0/5.0
Slides: 87
Provided by: AlaineP
Category:
Tags: hotel | security | types

less

Transcript and Presenter's Notes

Title: Security


1
Security Loss Prevention An Introduction
  • 5th Edition
  • Philip Purpura

2
Part 1
  • INTRODUCTION TO SECURITY AND LOSS PREVENTION

3
Chapter 1
  • The History of Security and Loss Prevention A
    Critical Perspective

4
Chapter 1
  • WHY CRITICAL THINKING?
  • HOW CAN WE THINK CRITICALLY?
  • WHY THINK CRITICALLY ABOUT THE HISTORY OF
    SECURITY AND LOSS PREVENTION?
  • SECURITY AND LOSS PREVENTION DEFINED

5
Chapter 1
  • HISTORY
  • Why Study the History of Security and Loss
    Prevention?
  • EARLY CIVILIZATIONS
  • Ancient Greece
  • Ancient Rome
  • The Middle Ages in Europe

6
Chapter 1
  • MORE CONTEMPORARY TIMES
  • England
  • Early America
  • The Growth of Policing
  • The Growth of Security Companies
  • Railroads and Labor Unions
  • The Great Wars

7
Chapter 1
  • The Third Wave
  • Convergence of IT and Physical Security
  • Convergence of Enterprise Security
  • 21st Century/Post-9/11 Security Challenges

8
Chapter 2
  • The Business, Careers, and Challenges of Security
    and Loss Prevention

9
Chapter 2
  • INTRODUCTION
  • METRICS
  • Internal Metrics
  • External Metrics
  • THE SECURITY INDUSTRY
  • Contract versus Proprietary Security

10
Chapter 2
  • CAREERS LOSS PREVENTION SERVICES AND SPECIALISTS
  • THE LIMITATIONS OF THE CRIMINAL JUSTICE SYSTEM
    IMPLICATIONS FOR LOSS PREVENTION PRACTITIONERS

11
Chapter 2
  • CHALLENGES OF THE SECURITY INDUSTRY
  • Cooperation between Public Police and Private
    Security
  • Regulation of the Industry
  • The Need for Training
  • Ethics
  • The False Alarm Problem

12
Part 2
  • REDUCING THE PROBLEM OF LOSS

13
Chapter 3
  • Foundations of Security and Loss Prevention

14
Chapter 3
  • THE SECURITY AND LOSS PREVENTION PROFESSION
  • Theoretical Foundations
  • Security Periodicals
  • METHODS FOR PROTECTION PROGRAMS
  • Risk Analysis
  • Planning

15
Chapter 3
  • STANDARDS AND REGULATIONS
  • Standards
  • Regulations
  • Post-9/11 Standards and Regulations
  • Standard-Setting Organizations
  • EVALUATION OF LOSS PREVENTION PROGRAMS
  • Scientific Method

16
Chapter 3
  • Sources of Research Assistance
  • PROPRIETARY SECURITY
  • Basics of Organization The Vocabulary
  • Basics of Organization The Practical Management
    Tools

17
Chapter 4
  • Law

18
Chapter 4
  • INTRODUCTION
  • JUDICIAL SYSTEMS
  • State Court Systems
  • Federal Court System
  • ORIGINS OF LAW
  • TORT LAW AND CONTROLS OVER PRIVATE SECURITY

19
Chapter 4
  • LEGAL THEORY OF PREMISES SECURITY CLAIMS
  • CONTRACT LAW
  • CIVIL JUSTICE PROCEDURES
  • ADMINISTRATIVE LAW
  • Recordkeeping, Reporting, Inspections, and
    Searches

20
Chapter 4
  • Compliance Auditing
  • Federal Sentencing Guidelines
  • Labor Law
  • CRIMINAL JUSTICE PROCEDURE
  • Arrest Law
  • Force
  • Searches
  • Questioning

21
Chapter 5
  • Internal and External Relations

22
Chapter 5
  • INTERNAL AND EXTERNAL RELATIONS
  • Benefits of Good Relations
  • INTERNAL RELATIONS
  • Customer Driven Security and Loss Prevention
    Programs
  • Marketing

23
Chapter 5
  • Human Relations on the Job
  • Management Support
  • Orientation and Training Programs
  • Loss Prevention Meetings
  • Intranet and E-Mail
  • Involvement Programs

24
Chapter 5
  • EXTERNAL RELATIONS
  • Law Enforcement
  • Public Safety Agencies
  • The Community
  • The Media
  • External Loss Prevention Peers

25
Chapter 5
  • SPECIAL PROBLEMS
  • Prosecution Decisions
  • Loss Prevention Attire

26
Chapter 6
  • Applicant Screening and Employee Socialization

27
Chapter 6
  • INTRODUCTION
  • EMPLOYMENT LAW
  • Federal Legislation
  • U.S. Supreme Court Decisions
  • Equal Employment Opportunity Commission
  • EEO, AA, and Quotas

28
Chapter 6
  • Diversity
  • Sexual Harassment
  • SCREENING METHODS
  • Resumes and Applications
  • Interview
  • Tests
  • Background Investigations

29
Chapter 6
  • EMPLOYEE SOCIALIZATION
  • Loss Prevention Orientation for New Employees
  • Employee Training
  • Planning Training
  • Learning Principles
  • Wasted Training

30
Chapter 6
  • Examples Set by Superiors
  • Employee Needs

31
Chapter 7
  • Internal Threats and Countermeasures

32
Chapter 7
  • INTRODUCTION
  • INTERNAL THEFT
  • How Serious Is The Problem?
  • Why Do Employees Steal?
  • How Do Employees Steal?
  • Possible Indicators of Theft

33
Chapter 7
  • MANAGEMENT COUNTERMEASURES
  • PHYSICAL SECURITY COUNTERMEASURES
  • Integration, Open Architecture, and Convergence
  • Access Controls

34
Chapter 7
  • Locks and Keys
  • Intrusion Detection Systems
  • Interior Sensors
  • Closed-Circuit Television
  • Security Officers
  • Safes, Vaults, and File Cabinets

35
Chapter 8
  • External Threats and Countermeasures

36
Chapter 8
  • INTRODUCTION
  • METHODS OF UNAUTHORIZED ENTRY
  • COUNTERMEASURES
  • Construction and Environmental Security Design
  • Perimeter Security

37
Chapter 8
  • Barriers
  • Protecting Buildings Against Terrorism
  • Windows
  • Doors
  • Intrusion Detection Systems
  • CCTV
  • Lighting

38
Chapter 8
  • Parking Lot and Vehicle Controls
  • Security Officers
  • Communications and the Control Center
  • Protective Dogs

39
Chapter 9
  • Services and Systems Methods Toward Wise
    Purchasing Decisions

40
Chapter 9
  • INTRODUCTION
  • PITFALLS WHEN PURCHASING SECURITY SERVICES AND
    SYSTEMS
  • PURCHASING SECURITY SERVICES
  • Questions When Considering Contract Security
    Officers

41
Chapter 9
  • Contract Undercover Investigators
  • Consultants
  • Certifications in Security
  • PURCHASING SECURITY SYSTEMS
  • Questions When Considering a Security System
  • System Acquisition
  • OUTSOURCING

42
Chapter 10
  • Investigations

43
Chapter 10
  • INTRODUCTION
  • TYPES OF INVESTIGATIONS
  • Proprietary and Contract Investigations
  • Private and Public Investigations
  • Overt and Undercover Private Investigations
  • Important Considerations

44
Chapter 10
  • LAW
  • EVIDENCE
  • INTERVIEWING AND INTERROGATION
  • INFORMATION SOURCES
  • Legal Restrictions When Collecting Information

45
Chapter 10
  • IDENTITY THEFT
  • INVESTIGATIVE LEADS
  • SURVEILLANCE
  • INFORMATION ACCURACY
  • REPORT WRITING
  • TESTIMONY

46
Chapter 11
  • Accounting, Accountability, and Auditing

47
Chapter 11
  • INTRODUCTION
  • ACCOUNTING
  • ACCOUNTABILITY
  • Cashier Operations
  • Purchasing
  • Inventory

48
Chapter 11
  • AUDITING
  • Auditors
  • Internal Control Questionnaire
  • FRAUD
  • GOVERNANCE, RISK MANAGEMENT, AND COMPLIANCE

49
Chapter 12
  • Risk Management, Business Continuity, and
    Emergency Management

50
Chapter 12
  • RISK MANAGEMENT
  • The Role of the Risk Manager
  • The Risk Management Process
  • Risk Modeling
  • Risk Management Tools
  • Enterprise Risk Management
  • INSURANCE

51
Chapter 12
  • Types of Insurance
  • Crime Insurance and Bonds
  • Fire Insurance
  • Property and Liability Insurance
  • Claims
  • Claims for Crime Losses
  • BUSINESS CONTINUITY

52
Chapter 12
  • Guidance for Business Continuity Planning
  • Methodology for Business Continuity
  • EMERGENCY MANAGEMENT
  • All-Hazards Preparedness Concept
  • The History of Emergency Management
  • Emergency Management Disciplines
  • THE MILITARY

53
Chapter 13
  • Life Safety, Fire Protection, and Emergencies

54
Chapter 13
  • LIFE SAFETY
  • Standards, Regulations, and Codes
  • OSHA Regulations
  • NFPA 101 Life Safety Code
  • Building Design and Building Codes
  • FIRE PROTECTION
  • The Problem of Fire

55
Chapter 13
  • Private Organizations Involved in Fire Protection
  • Fire Departments
  • Fire Department Protection Efforts
  • FIRE PREVENTION AND FIRE SUPPRESSION STRATEGIES
  • Fire Prevention Strategies

56
Chapter 13
  • Fire Suppression Strategies
  • PUBLIC SAFETY AGENCIES
  • Police
  • Emergency Medical Service (EMS)
  • EMERGENCIES
  • Human-Made Emergencies
  • Natural Disasters

57
Chapter 14
  • Safety in the Workplace

58
Chapter 14
  • INTRODUCTION
  • ACCIDENT STATISTICS AND COSTS
  • HISTORY OF SAFETY LEGISLATION
  • Workers Compensation
  • The Development of OSHA
  • OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION

59
Chapter 14
  • OSHAs Strategic Management Plan
  • The Acts Jurisdiction
  • OSHA Standards
  • OSHA Recordkeeping and Reporting
  • Additional Employer Responsibilities
  • OSHA Inspections
  • OSHA Criticism and Controversy
  • Assistance with Problems

60
Chapter 14
  • SAFETY STRATEGIES
  • Safety and Health Committee
  • Socialization and Incentive Programs
  • Investigations
  • Additional Safety Measures

61
Part III
  • SPECIAL PROBLEMS AND COUNTERMEASURES

62
Chapter 15
  • Terrorism and Homeland Security

63
Chapter 15
  • TERRORISM
  • Terrorism Defined
  • History
  • Religion and Politics
  • Causes of Terrorism
  • International Terrorism
  • International Terrorists

64
Chapter 15
  • Domestic Terrorism
  • Domestic Terrorists
  • Terrorist Methods
  • Terrorist Weapons
  • Weapons of Mass Destruction
  • HOMELAND SECURITY
  • Homeland Security Defined

65
Chapter 15
  • The Measurement of Terrorism
  • National Counterterrorism Center
  • National Memorial Institute for the Prevention of
    Terrorism
  • National Security and Homeland Security
  • U.S. Government Action Against Terrorism
  • Legislative Action Against Terrorism

66
Chapter 15
  • State and Local Governments
  • Response to Weapons of Mass Destruction
  • PRIVATE SECTOR
  • Losses and Costs from the 9/11 Attacks
  • The Homeland Security Market
  • Public-Private Sector Partnerships

67
Chapter 15
  • Business and Organizational Countermeasures
    Against Terrorism
  • Citizen Volunteers

68
Chapter 16
  • Protecting Critical Infrastructures, Key Assets,
    and Borders

69
Chapter 16
  • CRITICAL INFRASTRUCTURE
  • Critical Infrastructure Defined
  • The Role of Government in Protecting Critical
    Infrastructure and Key Resources
  • NIPP Risk Management Framework
  • NIPP Recommendations for the Private Sector

70
Chapter 16
  • CRITICAL INFRASTRUCTURE SECTORS
  • Agriculture and Food
  • Water
  • Energy
  • Chemical Industry
  • Telecommunications

71
Chapter 16
  • Cyberspace and Information Technology
  • Defense Industry Base
  • Key Assets
  • BORDER AND TRANSPORTATION SECURITY
  • Government Agencies with Roles in Border and
    Transportation Security

72
Chapter 16
  • TRANSPORTATION SECTORS
  • Aviation
  • Passenger Rail and Railroads
  • Mass Transit Systems
  • Highways, Trucking, and Intercity Busing
  • Maritime
  • Postal and Shipping
  • Pipelines

73
Chapter 17
  • Loss Prevention at Businesses and Institutions

74
Chapter 17
  • INTRODUCTION
  • LOSS PREVENTION AT RETAIL BUSINESSES
  • Shrinkage
  • Human Resources Problems in Retailing
  • Internal Loss Prevention Strategies
  • Preventing Losses at Checkout Counters

75
Chapter 17
  • E-Business
  • Counterfeiting
  • Shoplifting
  • Confronting the Suspected Shoplifter
  • ROBBERY AND BURGLARY
  • Robbery Countermeasures
  • Burglary Countermeasures

76
Chapter 17
  • SHOPPING MALL STRATEGIES
  • BANKS AND FINANCIAL BUSINESSES
  • Banking and Finance Sector Challenges
  • Banking and Finance Sector Initiatives
  • The Scope of Threats and Legal Responsibilities
    of the Banking and Finance Sector

77
Chapter 17
  • Regulation H
  • Bank Robbery Countermeasures
  • Automatic Teller Machines
  • Kidnapping and Extortion
  • Embezzlement, Online Risks, and Fraud
  • EDUCATIONAL INSTITUTIONS
  • Threats and Hazards at Educational Institutions

78
Chapter 17
  • Countermeasures
  • School Districts
  • Colleges and Universities
  • Fire Protection at Educational Institutions
  • HEALTHCARE INSTITUTIONS
  • Public Health Sector Challenges
  • Public Health Sector Initiatives

79
Chapter 17
  • The Scope of Threats and Legal Responsibilities
    of Healthcare Institutions
  • Strategies for Healthcare Institutions

80
Chapter 18
  • Topics of Concern

81
Chapter 18
  • WORKPLACE VIOLENCE
  • Legal Guidelines
  • Protection Methods
  • PERSONNEL PROTECTION
  • Planning
  • Education and Training
  • General Protection Strategies

82
Chapter 18
  • SUBSTANCE ABUSE IN THE WORKPLACE
  • Countermeasures
  • Alcoholism
  • Types of Substances and Abuse
  • INFORMATION SECURITY
  • Corporate Intelligence Gathering Putting It in
    Perspective

83
Chapter 18
  • Espionage Techniques and the Vulnerabilities of
    Technology
  • Countermeasures
  • COMMUNICATIONS SECURITY
  • Electronic Surveillance and Wiretapping
  • Technical Surveillance Countermeasures

84
Chapter 19
  • Your Future in Security and Loss Prevention

85
Chapter 19
  • SECURITY AND LOSS PREVENTION IN THE FUTURE
  • Trends Affecting Security and Loss Prevention
  • EDUCATION
  • Loss Prevention Education Today and Tomorrow

86
Chapter 19
  • RESEARCH
  • TRAINING
  • The Concept of the Security Institute
  • EMPLOYMENT
  • Sources of Employment Information
  • Career Advice
Write a Comment
User Comments (0)
About PowerShow.com