Evolution of Security Programs and Practices

Security standards equipment and protocol vary drastically from organization to organization. It is generally influenced by the needs of the organization as well as their security budget. Before we go into the needs of these organizations it is important to look at events that changed the way we conduct security operations as a society. September 11th 2001 drastically changed the way we conduct security operations. The change happened virtually overnight it came in the form of laws, certifications and convergence between the public and private sector.

Just as any other industry the security industry must deal government red tape to legitimately run a business. There are many factors that go into the changes and sustainment of the rules and regulations. After 911 government agencies started working closer than ever with the private security industry. This would mean those private security organizations who wish to partake in government ran operations would have to comply with their protocol. Private security guards filled many of the vacancies of law enforcement at static locations to harden security. A well-known example is when military police officers were deploying at a rapid rate pace to Iraqi and Afghanistan during the begging of the global war on terror. The departments of defense’s security guards were created to fill in the vacancies on instillation of military police units deployed as well as the ones that did not have these units at all.

One thing commonly found in these situations is there use of layered approach also known as defenses in depth. A layered approach to security is nothing new. An example would be a post and cable security fence lighting systems, locks and alarms. These security systems working together increase the chance of an intruder getting caught. Redundancy and diversity is a security manager’s best friend. Keeping the criminal elements on their toes is a good thing. Getting complacent in planning, equipment or tactics for too long will give unwanted parties the opportunity to defeat security measures. A good example of this in terms of access control would be as follows. First would be perimeter security such as a fence. This will funnel foot and vehicle traffic in as well as out of a predetermined amount of access points.

Doors into the actual facility is should be locked only to employees or official guessed or costumers. Security guards should be posted here or at the perimeter entrance screening all personal. Next interior doorways should be locked at all times when not in use as well as all valuable equipment and information should be locked in a cabinet, safe box ect. This is just one example of a security program by its self it is effective but where it truly reaches its full potential is when it is incorporated along with other standers and practices. Understanding the security industry as a hole is critical from the history to current day practices and procedures. With this being said do not count out the old school way of security standards. Physical security is still relevant and is usually the first line of defense.