Security Needs Report: Mobile CCTV Systems and Risk Management

Verified

Added on  2025/06/23

|11
|863
|392
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
ADVISE ON SECURITY NEEDS
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Practical 1..............................................................................................................................................2
Activity 2...............................................................................................................................................5
Practical 3............................................................................................................................................10
Table of figure
Figure 1: Slide 1....................................................................................................................................5
Figure 2: Slide 2....................................................................................................................................5
Figure 3: Slide 3....................................................................................................................................6
Figure 4: Slide 3....................................................................................................................................6
Figure 5: Slide 4....................................................................................................................................7
Figure 6: Slide 5....................................................................................................................................7
Figure 7: Slide 8....................................................................................................................................8
Figure 8: Slide 7....................................................................................................................................8
Figure 9: Slide 8....................................................................................................................................9
Figure 10: Slide10.................................................................................................................................9
Document Page
Practical 1
To provide comprehensive information about the availability and functionality of mobile CCTV
systems
According to the video, there is need to implement the CCTV cameras into the truck which
carries the refuge of the house and street this will help the drive of the truck to have proper
security and safety and he can see from his seat only that is refuge have taken or not. This
help to monitor the driver and also prevent the theft. These have the beneficial monitoring
places which might get risky sometimes.
The availability of the mobile CCTV has both reduced the traditional security and
complements the guard requirements. This provides the flexibility of the security and
business needs. The software includes the wide range monitoring and also reviews the
capabilities and this helps to give the proper security.
The functionality of CCTV is to reduce the securities which are humans, and these CCTV
cameras have the recording for long and anytime the recording can be seen for any crime.
This will help the person to have all time security in trucks of the loading vehicles and the
driver of that vehicles is also have safety because there will be the main person who will be
noticing the truck at where is it going and all.
Using a recognized risk assessment strategy, review and evaluate the effectiveness the mobile
CCTV system:
TO have the proper risk management there is some steps which need to be focused such as:
1. Identify the risk: The risk need to be found from where it is occurring.
2. Assess the risk: The risk need to be assessed so that the tester can provide the solutions.
3. Control risk: The solution of the risk should be controllable.
4. Review the control: the risk need to be controlled and can be seen is the risk solution is
feasible for not.
Evaluating the effectiveness of risk:
1. Prepare: There is need to prepare the risk which are from the meeting, arrangements and
sechulded activities, delivery dates and the review of the document. The background
documentation has to be reviews with the portal of internet. The plans and the objective of
the strategic of the project.
Document Page
2. Verify: there is need to verify the risk and have the current framework or the tools, this
mange the risk of the associate with the complexity and size.
3. Analyse gaps and evaluate: This means how the risk will be integrated and manages to
take the decision. This includes the controlling assurance and reporting. There is the ability to
make frames of the risk.
4. Gain ownership and plan: the best practise of the risk management and Fundamental risk.
There is draft plan which provides enhancement the risk..
5. Report oversight committee: This generates the confidence of the members who have
challenges the risk and in the independent manner.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Reference:
Kashyap, A.K. and Wetherilt, A., 2019, May. Some Principles for Regulating Cyber Risk.
In AEA Papers and Proceedings(Vol. 109, pp. 482-87).
Ab Hamid, N.R. and Cheng, A.Y., 2020. A risk perception analysis on the use of electronic
payment systems by young adult. order, 6(8.4), pp.6-7.
Truong, L. and Hanrahan, P., 2019. A Golden Age of Hardware Description Languages:
Applying Programming Language Techniques to Improve Design Productivity. In 3rd
Summit on Advances in Programming Languages (SNAPL 2019). Schloss Dagstuhl-Leibniz-
Zentrum fuer Informatik.
Harman, G.E. and Uphoff, N., 2019. Symbiotic root-endophytic soil microbes improve crop
productivity and provide environmental benefits. Scientifica, 2019.
Nagesh, S. and Law, M., 2019. Machine tool design with preferentially asymmetrical
structures to improve dynamics and productivity. Procedia CIRP, 79, pp.592-595.
Document Page
Activity 2
Figure 1: Slide 1
Figure 2: Slide 2
Document Page
Figure 3: Slide 3
Figure 4: Slide 3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 5: Slide 4
Figure 6: Slide 5
Document Page
Figure 7: Slide 8
Figure 8: Slide 7
Document Page
Figure 9: Slide 8
Figure 10: Slide10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Practical 3
Security manager: Hey! I am hearing for the incident which held yesterday.
Security Manger: I want to know what exactly happen there.
Zac: Hello Sir, I was present over there when the situation takes place.
Security Manager: Ya! Please tell me
Zac: There was the employee who gets his arm bruising by himself through one patrons and
then he report the complaint again it.
Security Manager: ok! Then
Zac: The coaches have come there and try to solve it but there is issue of the security.
Security Manager: ok! So we need to enhance the security that no employee can harm
themselves due to frustrations. There will be some ACT should be passed so that there will be
no accident happen.
Zac: Sir, this was only I know
Security manger: Does anyone know more about this
Classroom: Sorry sir we don’t know.
Security manager: Ok thank you so much for your support.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]