O'Reilly logo

Security Operations Management, 2nd Edition by Robert McCrie

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10 Operating Physical-and Technology-Centered Programs

The ultimate purpose of any security system is to counter threats against assets and strengthen associated vulnerabilities.

—Joseph Barry and Patrick Finnegan

Most of the costs of security operations are personnel costs created by security services. But it is the nature of management to drive down costs, whenever possible, while maintaining or improving quality of services or product. Is this realistic? An important means by which security operating dollars can be made more effective is through the judicious use of physical- and technology-centered programs. These are concerned with physical security measures and with electronic technology—often computer-based—used to safeguard ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required