Drivers of convergence and The Impact of Terrorism

User Generated

zvxrl210zr

Business Finance

Description

1. In a minimum of 700 words, predict two drivers of convergence within the security industry in the 21st Century. Measure the impact of each driver and judge how you would meet the challenge associated with each.

2. In a minimum of 700 words, evaluate the impact of terrorism on security management in a global environment utilizing two key discussion points.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: SECURITY MANAGEMENT

1

Security Management
Student’s Name
Institutional Affiliation
Date

SECURITY MANAGEMENT

2

Security Management
Question 1: Drivers of Security Convergence
The term security convergence may bear varied meanings depending on the context of
application. The term may refer to security professionals in a range industries working together
to enhance the security of their dealings. Security convergence might be used to indicate the
combination of traditional security (physical security) with the IT security mechanisms with the
purpose of enhancing the security of an organization, a state or a country. The term security
convergence in this context applies to matters of national security where the integration of
multiagency security strategies and the IT security occurs to protect a country from perceived
internal and external threats (Chandler et al., 2017). Security convergence is driven by digital
technology and change of enemy tactics making it necessary for stakeholders to join hands in
ensuring protection from various security threats.
Digital technology has since transformed entirely all the industries drawing interest of the
national security agencies to coordinate with various organizations to ensure protection of
citizens and properties from attack. The information technology advancement has resulted into
smart technology as a way of identification in most public places. The smart cards and smart
badges are examples of security ID passage software being used in public premises and
organizational premises for access by employees or authorized persons. The cross over
technologies are pulling together the physical and the logical security together (Chandler et al.,
2017). The cross over technologies are also inclusive of the CCTV cameras that act as a
surveillance for the physical security agencies in tracking the enemy path.
The building security systems are installed by organizations or business persons have
increased the integration with the national security agencies. When an incident occurs such as a

SECURITY MANAGEMENT

3

robbery or a terror attack, the digital techs installed in the owners build...


Anonymous
Really helpful material, saved me a great deal of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags