• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Physical Security

Smart Security Planning: Your Key to Administration Support

Here's how you can make the case for more resources for public safety, security and technology.

July 2, 2015 TD Staff Leave a Comment

The final step in the mission-based analysis is to identify corrective actions, categorized as either no/low cost or those requiring resources. It is crucial that the offices (e.g., police, facilities, IT) responsible for implementing these actions are identified.

Analysis Method Must be Thorough
There are scores of security analysis methodologies in use in the military, businesses and the public sector. These plans, if thorough, will consider:

  • What are the agency’s mission priorities?
  • What is the nature of the threat?
  • Which assets require priority protection?
  • Which inputs are available to achieve each mission?
  • Which inputs have the greatest effect on the greatest number of priority outputs?
  • What are the priorities of corrective actions?

However an agency elects to implement its security responsibilities, it must plan, then work hard to implement it and finally reevaluate security on a periodic basis to account for the dynamic security environment.

Lt. John Weinstein, a District Commander with northern Virginia Community College’s Police Department, is certified by Virginia’s Department of Criminal Justice Services as a firearms instructor and he is his department’s lead firearms instructor. He also conducts firearms training at two local police academies. Weinstein has numerous firearms training materials that are available upon request.

Pages: Page 1 Page 2 Page 3 Page 4 Page 5 Page 6

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Access Control, Higher Ed

Related Content:

  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • AtlasIED North Syracuse Central School Dist 2 North Syracuse Central School District Streamlines Communications with…
  • cyber-attack-skull Spike in Cyberattacks Exposes Vulnerabilities in University Security…
  • NSA Programming Languages The Cyberattacks and Insider Threats During The Development…

Free downloadable guide you may like:

  • 10 Reasons Why School Administrators Should Consider These Tech Tools for Emergency Preparedness

    Working in an educational facility is more complicated than ever before. There are so many more situations to be aware of, so much more to have to communicate to others. Communication is paramount for the safety of students and staff and to keep daily operations flowing smoothly. Where once a PA system was all that […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.