Abstract

This chapter focuses on the distinct applications that the personal computer (PC) can have in the administrative, managerial, and supervisory aspects of the security function. PCs, which are manufactured in both desktop and smaller portable models, are an essential part of business life. Word processing, database management, spreadsheets, desktop publishing, encryption, computer graphics, telecommunications, specialized management programs, and artificial intelligence are important software applications, which can be adapted to the administrative, managerial, and supervisorial aspects of the security function. Specialized software integrates access control with intrusion detection, photo ID badging, closed-circuit television (CCTV), and fire life safety. An ever-increasing number of access control systems are being built using an operating system such as Microsoft's Windows NT, which provides both multitasking and multiuser capabilities and built-in security features. An advantage of a fully integrated system is that the software may be programmed to produce automatic responses when certain events are triggered. Specialized programs, such as Monitoring Automation Systems (MAS) software, are being used in many central stations, which assist operators in monitoring alarm signals from remote facilities. Some of the threats associated with the use of PCs include power surges, power failures, theft, natural disasters, lightning, water leaks, fires, sabotage, explosions, accidents, user errors, and hardware and software problems. Contingency planning for these kinds of situations should include maintaining backup copies of software programs and sensitive data in a separate, safe location.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call