1 introduction to security chapter 14 securing the infrastructure
TRANSCRIPT
Introduction to Security
1Introduction to SecurityChapter 14Securing the Infrastructure
2Industry and ManufacturingAn effective security program will affect all aspects of industry and manufacturing.Since World War I, security officers have played a role in manufacturing plant security.
3Types of LossesIndustry and manufacturing are susceptible to all of the same types of crime as most businesses.
4Types of LossesThere are, however, some unique aspects to these type of companies:Taking raw materialsTaking tools & equipmentGetting paid for more hours than workedGetting excess expense reimbursementTaking finished productsTaking scrap productsTaking precious metals
5Types of LossesSabotage the intentional destruction of materialsEspionage spying on manufacturing operationsLearn military secretsTheft of trade secrets and confidential information
6Food Supply SecurityFood security entails protecting the food supply from intentional contamination. Threats may come from:Disgruntled employeesHoaxes for financial gainTerrorists
7Food Supply SecurityFood security inspections of the facility should be done regularly by plant officialsEncourage employees to report any sign of possible product tampering Monitor integrity of the plants perimeterEstablish a policy on what personal items may/may not be brought into the factory
8Food Supply SecurityAccess of all kinds tightly controlledSeals and locks used on all containersIncoming and outgoing shipments verified against shipping logsIdentification tags for all employeesNew hires should have complete background checks
9Chemical Plant SecuritySince 9/11, chemical plants have come under increased scrutiny as possible terrorist targets.These plants have added to their security arsenal by using electronic technology to provide layers of protection.The industry has also adopted new, increased security guidelines called the Responsible Care Security Code.
10U.S.-Based Oil Company SecurityA major issue for U.S.-based oil companies is securing manned and unmanned offshore oil platforms in the Gulf of Mexico.Security at these facilities are inordinately sophisticated due to the loss potential with these facilities.
11Utility SecurityGas, electricity, and waterA survey by Security Management shows only 1/3 of companies have had a disaster drill.Threats:Theft from trucksVandalismTrespassing
12Transportation SecurityThe Transportation Security Administration (TSA) was formed after 9/11.TSA is responsible for:highwaysrailroadsbusesmass transitseaportsairports
13Transportation SecurityTrucking Industry issues:Theft from unattended trailers left at truck stopsDrivers working with a group of thieves
14Transportation SecurityRailroad Security threats:Cargo theft VandalismTheft of MetalsThere are over a quarter-million miles of track in the U.S.; securing it is nearly impossible.
15Transportation SecurityShipping Security Issues:Sheer number over 11 million containers arrive every yearShipping Security Threats:PiracyTerrorismMaritime insurance fraud
16Transportation SecurityMass Transit Security Issues:TheftRobberiesAssaultRapeMurderVehicle theft
17Transportation SecurityAirport/Airline Security Issues:SkyjackingsBombsBomb threatsTheft from passengersAir cargo theftTheft in airport retail establishmentsMotor vehicle theft and theft from motor vehicles