Running head: VULNERABILITY ASSESSMENT MODEL Vulnerability Assessment Model August 14, 2009 Vulnerability Assessment Model Before making decision concerning pros and cons of contract versus proprietary security services, it is crucial to understand the basic distinctions between these two types of operations. contract security services are usually provided by a professional security company contracting its services to a company. In this case the facility would contract with security company for specific security services. Proprietary security operations are in-house security services that are controlled entirely by the organization that establishes security for its operations. In this case the facility hires a CSO (chief security officer) and all necessary employees and equipment to operate a security department within the faculty. It is quite difficult to conclude which type of services would work better for this specific faculty, as both services have their own pros and cons that should not be underestimated.
The main advantages of contract services for the faculty mostly involve such aspects like cost, administration, staffing, unions, impartiality and expertise. In most cases, contract guards are less expensive than a proprietary security guard service, as proprietary guards earn more due to general wage rate of the facility that employs them. Proprietary security guards are typically receive more fringe benefits, and the facility employing them has less savings in costs of hiring, training, payroll taxes, equipment, uniform, and liability insurance. In-house security service also requires from the facility to develop and administer a recruitment program, training programs, personnel screening programs, etc (Broder, 2006).
The Essay on Support Individuals To Access And Use Services And Facilities
When an individual has access to services and facilities it makes them feel part of community as a whole and enhances their well-being. For instance, one of our service users has a bus pass which he uses effectively to travel around our local area, which is quite rural. Occasionally someone will get on the bus who he knows and is able to talk to. He has a choice of which direction he would like to ...
It also implies the direct supervision of security personnel. At the same time, contract security services solve such problems as scheduling and substituting manpower during the guards sick leave or employment termination. Proprietary security services also less flexible in staffing compared to the contract ones.
Also, contract security services more effectively and more readily enforce regulations compared to proprietary services, as they are paid by different employer. At the same time, the advantages of proprietary security services mostly relate to such factors like quality of personnel, control, loyalty and prestige (Fischer & Green, 2003).
As proprietary security services have higher fringe benefits and higher pay, this attracts higher-quality personnel which are more likely to show a lower rate of turnover and are more carefully screened. Therefore, while making decision concerning the choice between these two services, the facility should take into consideration the specific aspects, advantages and disadvantages of using each service to make better decision. The Vulnerability Assessment Model should also be applied to the facility to decide whether proprietary or contract guard services is the way to go. Under this model, it is important to take into consideration characterization of the facility, including its missions and objectives, identification and prioritization of possible adverse consequences to avoid.
The Vulnerability Assessment Model should foresee the possibility to determine critical assets of the specific facility that may be subject to malevolent acts that could lead to the undesired circumstances. It is also important to assess the likelihood/qualitative probability of these malevolent acts from the adversaries; to evaluate existing countermeasures and to conduct analysis of current risks as well as to develop the prioritized plan for risk reduction. The extent and nature of the vulnerability assessment for specific facility will depend on a number of factors, based on the facilitys necessity of a greater control over security personnel, the specific needs of the facility, the scope of work, to mention a few. References Broder, J. (2006).
The Term Paper on Social Security Services Care Marketing
The Marketing of Rehabilitative Goods and Services by Gary L. Albrecht was written with the intention of giving its reader a better understanding of who has the most to gain in the business of rehabilitative services. One position states that the institutions benefit most, while others feel it is the consumer who has the most to gain. The main controversy discussed in this article is the usage of ...
Risk Analysis and the Security Survey. Butterworth-Heinemann. Fischer, R., & Green, G.
(2003).
Introduction to security. Butterworth-Heinemann..