Preview

Lesson 2 Dynamic Security

Satisfactory Essays
Open Document
Open Document
388 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lesson 2 Dynamic Security
Custodial Care Services
Dynamic Security

This session will help you with; P1 Describe the physical, dynamic and

procedural security considerations in a custodial environment
D1 Evaluate the need for security and

control in a custodial environment

Objectives
All students will be able to;
State what is meant by the term ‘Dynamic

Security
Discuss the type of information that could be gained from Prison intelligence
Some students will be able to;
List the benefits of a good prison regime

Recap on Physical Security
What is the difference between an Open or Closed

prison in terms of security?
Closed is completely locked
Open allows prisoners out for work/weekend home visits State the difference between a Category A prisoner

and a Category D prisoner
Category A – Pose threat to society, maximum security, crimes such as murder, rape or terrorism.
Category D – Can be trusted in open conditions and sometime allowed out. Low risk.

What does dynamic security mean?
Surveillance – Covert and overt
Intelligence gathering
Monitoring everyday activities

Prison definition of Dynamic
Security
The process of

looking for patterns in intelligence, close monitoring of gang members, sharing of information, close relationships with external agencies and partnerships to share intelligence, along with tackling the drug and violence issues.

Areas for concern
Visits – family or solicitors
Movement of prisoners for work, education,

gym
Mail – outgoing and incoming
Phone calls monitored

Group work
Consider what information can be gathered

from monitoring prisoners in these areas;
Visits
Movement of prisoners for work, education,

gym
Mail – outgoing and incoming
Phone calls

Question
If you were sent to prison what would be

your biggest concern?

Prison regime
Good relationship between offenders and

staff
Build trust and confidence
Secure environment
Allows prisoners to feel free of bullying or have their possessions damaged or stolen

You May Also Find These Documents Helpful

  • Good Essays

    The Nemours Children Hospital project was a finalist in the 2013 PMI Project of the Year awards. The Project management team was Stanley Beaman and Sears and it had a budget of $260 million dollars. The project management team kept their ethical guideline to build a hospital for children and their parents and remained within their stated budget. They kept in mind the fact that end it was a children’s hospital and kept that fact (beside the budget) uppermost in their mind. The result was a well thought out, beautiful, and functional hospital that has the health of children, both…

    • 780 Words
    • 4 Pages
    Good Essays
  • Good Essays

    For the recommendations on the tiered architecture I suggest three-tier architecture. This architecture is the most common. It consists of three tiers; a presentation tier, a logic tier, and a data tier…

    • 429 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Use the Web to research and evaluate security products from two competing vendors, such a...…

    • 428 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Does the system that is being scanned need to have access to the internet for the scan to be successful?…

    • 344 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 2 Part 2

    • 983 Words
    • 4 Pages

    TMA 01 – With the help of examples from the surveillance film, outline the ways in which surveillance is used to deliver crime control and social welfare (600-800 words).…

    • 983 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The security component that is most caution overall in the listed situations would be that of the physical security characteristic. I will address less applicable for these specific environments throughout a vulnerability assessment would be personnel security, data security, and interdepartmental dependencies. By hiring security staff or a law enforcement agent to monitor-guard a place of worship during service is unrealistic and extremely cost-effective. Due to places of worship sustaining with the aid of donations from members of the place of worship and commonly utilizing them to help pay for utilities, food, and sometimes for the salaries of priests, pastors and other staff the hiring of security would be impossible.…

    • 1047 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    UNFO traditionally has been a brick-and-mortar retailer, and the management has experiences of associated business risks such as employee theft and shoplifting. However, as the organization moves into the e-commerce model, new risks will be introduced to the organization. As the information security analyst, it will be your role to summarize the business impact of these new risks, the motivating factors that one may have to exploit vulnerabilities, and how the risks can be mitigated.…

    • 258 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The goals for secure networking are availability for authorized users to access the network; confidentiality for preventing unauthorized users acces; functionality for preventing attackers from altering the operation capabilities and the access control policy driven controls…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What caught my attention when I read chapter 12 is Defense Mechanisms. There are different methods of defense mechanism and one of those is recognized as Displacement, where people shift their unacceptable wishes to a less threatening alternative. Common actions may range from mild (namely slamming the door, punching the wall when they are angry) to severe ( such as self harm when they are under depression).…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Some risks that I have identified are social engineering techniques due to the excessive trust given to messages coming from friends, contacts or followed people within the OSN(Online-Social Network) identity theft and information leaking furthermore, spam sending and malware distribution through Social Networks are increasing at an incredible pace. They are not the only threats.…

    • 526 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Airport Security Essay 9

    • 850 Words
    • 4 Pages

    America on September 11, 2001 required that we reform our nation 's aviation security system in fundamental ways. Three years after the Sept. 11 tragedies, how far has airport and airlines come? It depends on the source. While it is important for airports to heighten security after the attacks of 9/11, the policies of profiling passengers are inadequate and a necessitate revision.…

    • 850 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The word protection is self-explanatory, as it refers to a safe environment where violence and discriminations is not present. As a boy, Moses grew up during the apartheid era. A time of oppression and discrimination, therefore we can speculate, as many other “black” individuals, Moses was shaped by discrimination and oppression. He was socialised into believing that he was inferior to others, less of a human and less of a man. Apartheid was about dehumanising black individuals and breaking them down to a point where they felt weak, lifeless and useless and at that point the “superior” race would exploit them. Furthermore, growing up around this environment Moses saw what it was like to be a powerless man by the individuals who surrounded him. His mother…

    • 550 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Essay On SG-Secure

    • 608 Words
    • 3 Pages

    For SG-Secure, there is indeed two sides of the story. SG-Secure can be understood as an avoidance to the fundamental issues of terrorism. Politically engage the would-be terrorists and understand what do they want and what are they unhappy about. SG-Secure can also be understood as an opportunity to turn the threat of terrorism as an act of catalyst to social resilience. Perhaps what we could do moving on is to take a balanced view of resilience. Resilience as an imagined problem for an imaginative group of responsibilized people could lead an over exaggeration of the problem (O’Malley, 2011 p. 13). On the other hand, He acknowledged that resilience can “provide security to critical infrastructures” (O’Malley, 2013 p. 192). He concluded by asserting that “we should be cautious” of resilience rather than be skeptical of its capability (O’Malley, 2013 p. 192).…

    • 608 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In 2002, The Homeland Security Act came into effect; it provides the basis for Department of Homeland Security (DHS) responsibilities in the protection of the Nation’s critical infrastructure and key resources (CIKR). The Department of Homeland Security…

    • 1279 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Vulnerability Assesment

    • 1727 Words
    • 7 Pages

    Pick three locations, events or individuals in your location (county, city or state) and complete a 6 - 8 page assessment of their vulnerabilities and threats, putting their security in order of priority, explaining and defending your choices.…

    • 1727 Words
    • 7 Pages
    Powerful Essays