Tuesday, April 30, 2019
Chapter 3, Security Surveys and the Audit, in the Fennelly textbook Essay
Chapter 3, credential measure Surveys and the Audit, in the Fennelly textbook - Essay ExampleThe advanced under-the-table Body Scans would detect concealed weapons in these cases in a detailed manner, such as which conventional methods like body taps would not.The Covert Body Scans would also ease up the long passenger queues caused by the current slow security systems, thus saving time for passengers and other officials. On the onset of security threats, many travel avenues levy security measures leading to long queues, cancelled trips and inconvenienced passengers. The invisible security takeners would see an end to this since they can scan people as they move through, thus eliminating long, stagnant queues. These systems argon also useful in that they are multipurpose in nature that is they can detect a wide variety of security threats from mobile pathogens and illegal immigrants, to concealed weapons (Fennelly, 2013).The implementation of the covert security scanners is ac ceptable wherever imminent threat to serviceman lives is constant, either directly or indirectly. Such locations include airports, academic institutions, the Mexican border, entries to prominent buildings like study banks and the white house.As indicated earlier, these security systems are a necessity wherever there is a threat to human life. Statistics indicate that more security threats occur in the cloistered sectors than the public ones. These include private institutions like schools, banks, and shopping malls. Some, however, would argue that this development would be an infringement of the right to confidentiality. There requires to be a balance between the value of life and the preservation of privacy. Furthermore, Homeland security assesses and mitigates privacy implications that could result from essential security systems.Such security technologies would definitely be of immense assistance in safeguarding lives and property if implemented. The covert security scanners expose objects in as acute
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment