JOVY

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 28

CHAPTER 11

IMPLEMENT

PROBLEM
SOLVING
AND AUDIT/
INSPECTION
Learning Objectives

•At the end of this chapter, the student


will be able to:
•Enumerate the top management's
responsibilities the implementation of
security programs; in
•Enumerate problem solving
techniques and pitfalls in
decision making;
•Enumerate problem solving techniques
and pitfalls in decision making;
•Enumerate factors that affect decision;
•Enumerate the question to be used in
conducting a security audit; and

•Explain formal, informal, structured and


unstructured security audits.
Program Implementation
Top Management's Responsibility
The top management should always be interested
in the implementation of any security program.
They must extend complete support to the
program on a continuing basis. They must be
willing to take actions to ensure that employees at
the other levels comply with the requirements that
have been established for the protection of
personnel and other assets. The responsibility and
accountability for the implementation are
delegated to the security executive. Thus, he
would function as a steward doing the necessary
Involvement of Others

Non-security employees can be of great


assistance in the implementation of the
security program and their active
participation can contribute to its
success. Thus, it is important to keep
other employees aware and involved.
Setting Priorities and Meeting
Schedules

The higher the criticality rating of the


identified vulnerabilities higher is its
priority in the implementation of
countermeasures. the important also
that the time frame established be met
otherwise it could affect the entire
program. It is
Drills and Rehearsals

Some areas of the security program


would need regular drills or rehearsals
which stimulate anticipated conditions,
i.e. crisis management, fire drill, bomb
threat handling, and response to a
robbery.
Validation and Updating of Plans

During program implementation,


opportunities arise to improve
countermeasures or reinforce those
found effective. If new conditions
present themselves, necessary
adjustments sometimes need to be
made in the security program.
Program Evaluation

At the end of the timetable or drills,


rehearsals, the security program or part
of it need to be evaluated. Issues such
as relevance or adequacy of
countermeasures, cost effectiveness,
etc., need to be addressed to check the
existence of vulnerability which may
trigger the need for a much responsive
Problem Solving and Decision-Making

Problem Solving Techniques


The successful security executive is a
problem solver. He is able to solve most
of the problems through quick
evaluation of the situation against
experience and logic employing the
following seven steps of problem
solving:
1. Clearly Defining Problem - He
ensures he has the complete grasp of
the problem at hand. He is able to
define and clarify issues involved.
2. Gathering Information - He gathers
information through research and
interviews. It may require putting the
information gathered in document form,
in tapes or indexes.
3. Interpretation - The gathered
information is put together to arrive at a
clearer picture and try to ascertain the
meaning and related implications.

4. Developing Solutions - The security


executive may come out with a solution
and several alternatives. In this step he
should be guided by the principles and
techniques of effective management and
5. Selecting the Best Solution From
several alternatives the security
executive selects the best practical
solution considering the short and long-
term effect of each possible solution.
6. Putting the Solution into Operation-
One the most appropriate solution is
chosen, implementation is next. This is
critical as it may involve changes be
difficult to accept. There might be a
7. Evaluating the Effectiveness - The
plan or solution should be reviewed
periodically for effectiveness. A
comparison between the ideal solution
and the actual practice may be made.
Some Pitfalls in Decision Making

The appropriate decision and taking


responsibility for it is a critical function
of any executive, much more a security
professional.
The security executive the following:
1. Jumping into conclusion
2. Accepting the first choice
3. Accepting the easiest way out
4. Procrastinating
5. Letting prejudices or emotions influence
6. Failing to get the facts
7. Failing to weigh the alternatives
8. Failing to consider consequences
9. Fearing to take risks and assume
responsibility
Factors Affecting a Decision

1. Prior Experience - A tried and


reliable course of action that worked
before may very much work again in
similar situation.
2. Self Interest - One's own interest may
not be the best for others. The ideal
situation here is to balance one's
interest with those of others.
3. Tradition - There are good traditions
but there are those that limit the way of
doing things and become the basis for
decision because they form the easiest
way out.
4. Creativity - This is the opposite
tradition. It has resulted in a lot of good
in some areas but for the sake of change
is not healthy way to arrive at a
decision.
5. Authority or Expert Opinion- This
should be given great consideration.
However, the security executive should
make certain that they are really
6. Logical Thinking - The decision is
based on sufficient facts and through
analysis leading to clear a conclusion
and good decision.

7. Emotion and Prejudice - Tye decision


should be free from bias and sentiment.
It may lead to favoritism and irrational
decision making.
8. Ease of Execution - All things being
equal, security executives confronted
with problems would like and easy way
out, but the easy way out not usually the
best way out.
Security Audit / Inspection

Rationale for Security Audit


The usually is a need for a formal audit
or inspection to: check the degree of
compliance with the recommended
countermeasures and to determine the
effectiveness and adequacy of the
countermeasures in effect.
Conduct of the Audit

A security audit has for its basis the


security survey and the vulnerability
assessment reports prepared during the
previous period. A checklist for the
purpose ensures that all areas are
covered.
The following questions should also be
used:

1. Why are we doing it?


2. Must we do it all?
3. If we must, is there a better way?
4. Is there a less expensive or more
cost-effective way?
Formal and Informal Security Audit

A formal security inspection is


announced and is communicated to the
organization or unit in advance. All
documents needed are prepared
beforehand. An informal audit are the
result of an entrenched and
institutionalized system understood and
accepted as a part of the organization
Structured and Unstructured Audit

A structured audit has a format for


logical sequence to the process. The
unstructured audit is conducted in a
random manner without any formal or
logical sequencing.
Ascertaining Compliance

The inspector should establish that the


countermeasures are a they ought to be.
It is possible that the unit or people
being audit do not what is expected of
them. Deficiencies notes should always
be highlighted and follow through
scheduled and implemented, otherwise
vulnerabilities will persist.
CONCLUSION

You might also like