Lea 3 Chapter 1
Lea 3 Chapter 1
INTRODUCTION TO SECURITY
      Wall or physical barriers for protection often surrounded the community. Posts, thick enclosures, heavy
doors with stout closures, animals, and traps all served to protect communities from attack from outside forces.
Today, walls expressed the power and promise of urban life. A walled community evoked psychological,
economic, military, and political impediment for attackers.
       Animals probably preceded defensive structures to protect people. Dogs are particularly suitable for
security purposes. Dogs were valuable also as canine alarms, to attack intruders, for hunting, and for
companionship. In modern times canine patrols serve law enforcement around the world. They are used to
detect illegal contraband, the smuggling of people, and the presence of prohibited foods, plants, narcotics, and
explosives.
      Other animals besides dogs have played roles in protecting people and property. Birds capable of making
loud noise when disturbed have been put to use to protect prisons from escapees and military facilities from
unauthorized presence of people.
       Security is needed within as well as without a walled community or structure. To protect precious
objects, including vital documents; hidden places within walls or furniture or under floors were frequently
created.
           From the earliest evidence of human experience, individuals have taken responsibility for their own
  security. This involved physical measures as well as protective procedures taken individually and collectively.
           While the military, civilian police, private security, and indeed numerous other organizations
  provided by the state offer protection, individual efforts are the oldest, most prevalent, and most difficult
  activity to assess quantitatively and qualitatively. Programs provided by the state and not- for- profit
  organizations have been developed to mitigate risks in modern times.
SECURITY IN GENERAL
       SECURITY, in a collective sense, is the same as protection and safety; the state of being safe and the
  condition of being protected against social, spiritual, financial political, emotional, occupational,
  psychological or other types or consequences of failure, damage, error, accidents, ham or any other event
  which could be considered not desirable." SECURITY is also freedom from fear, harm, danger, loss,
  destruction or damages. A state of the mind by which a person sees or feel absence of danger and presence of
  comfort.
FIELDS OF SECURITY
The following are the fields of security classified according to each sphere or subject:
    1. Computing Security - is a branch of information security applied to both theoretical and actual
    computer systems.
     2. Computer Security - is a branch of computer science that addresses enforcement of 'secure' behavior on
  the operation of computers. The definition of 'secure' varies by application, and is typically defined implicitly
  or explicitly by a security policy that addresses confidentiality, integrity and availability of electronic
  information that is processed by or stored on computer systems.
    3. Data Security - is the means of ensuring that data is kept safe from corruption and that access to it is
  suitably controlled. 'Thus, data security helps to ensure privacy. It also helps in protecting personal data.
  4. Application Security - encompasses measures taken to prevent exceptions in the security policy of an
  application or the underlying system (vulnerabilities) through flaws in the design, development, or
  deployment of the application.
   5. Information Security - means protecting information and information systems from unauthorized
  access- use, disclosure, disruption, modification, or destruction. The terms information security, computer
  security and information assurance are frequently used interchangeably. These fields are interrelated and
  share the common goals of protecting the confidentiality, integrity and availability of information; however,
  there are some subtle differences between them. These differences lie primarily in the approach to the subject,
  the methodologies used, and the areas of concentration. Information security is concerned with the
  confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or
  other forms.
   6.Network Security - consists of the provisions made in an underlying computer network infrastructure,
   policies adopted by the network administrator to protect the network and the network-accessible resources
   from unauthorized access and the effectiveness (or lack) of these measures combined together.
   2. Shopping Center Security (Mallor Supermarket) - a type of security which is concern with the
   protection of the stores, warehouses, storage, its immediate premises and properties as well as the
   supermarket personnel and customers. Security personnel are trained to detect "shoplifter", robbery, and
   bomb detection and customer relation.
   3. Airport/Seaport Security - refers to the techniques and methods used in protecting airports and
   seaport and by extension aircraft or sea craft, from crime and terrorism.
   4.Home Security - are those methods use of protecting residential homes or town sites which include the
   interior protection of houses against property losses or damages.
   5. Industrial Security- a type of security applied to business groups engaged in industries like
   manufacturing, assembling„ research and development, processing, warehousing and even agriculture.
   6. Hotel Security - a type of security applied to hotels where its properties are protected from
   pilferage, loss, damage and the function in the hotel restaurants are not disturbed and troubled by
   outsiders or the guest themselves. This type of security employs house detectives, uniforms guard and
   supervisor and ensures that hotel guests and their personal effects are safeguarded.
   7. Bank Security - this type of security is concerned with bank operations. Its main objective is the
   protection of bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard
   bank and assets while in storage, in transit and during transactions.
   8. School/Campus Security - a type of security that is concerned with the protection of students, faculty
  members, and school properties. Security personnel are trained to protect the school property from theft,
  vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students.
C. Political Field
    1. International Security- consists of the measures taken by nations and international organizations, such
    as the United Nations, to ensure mutual survival and safety. These measures include military action and
    diplomatic agreements such as treaties and conventions. International and national securities are invariably
    linked.
    2. National Security - refers to the requirement to maintain the survival of the nation-state through the use
    of economic, military and political power and the exercise of diplomacy.
    3. Human Security- refers to an emerging paradigm for understanding global vulnerabilities whose
    proponents challenge the traditional notion of security by arguing that the proper referent for security
    should be the individual rather than the state. Human security holds that a people-centered view of security
    is necessary for national, regional and global stability.
        D. Monetary Field
            I. Financial Security- refers to the methods applied for the protection of fungible, negotiable
    instrument representing financial' value. It broadly categorized into debt securities, such as banknotes,
    bonds and debentures, and equity securities, etc.
E. Other Security Fields
    1. VIP Security - a type of security applied for the protection of top-ranking officials of the government or
    private entity, visiting persons of illustrious standing and foreign dignitaries. Maybe used to
    interchangeably mean the same with Close Protection Operation.
    2. Homeland Security - similar to national security but this is more focused on the protection of vital
    entities such as critical utilities, critical facilities, and critical infrastructures.
  1. Threats against and Properties- includes possibility of physical harm or injury among people such as
     shooting, knife attack or other means of active attack. Generally, these threats are categorized under
     crimes against persons and properties
  2. Threats to Identity - specifically, are threats among cyber users or electronic device-based attack or
     intrusion. For instance, an attacker ca impersonates a user and fraudulently make calls and conduct data
     sessions through the user's device.
  3.    Threats to Confidentiality - these are threats against confidentiality in wireless communications roads
       systems and classified documents or materials.
   4.     Threats to integrity - integrity is closely related to confidentiality, as there maybe be breaches
  company's trade secrets. As such, it has direct on company business reputation. may involve a wide range of
  criminal and fraudulent activities.
   5.    Threats from Intrusion - the unauthorized access to the installation, data or devices, whether by a
  human attacker or by malware intrusion.
     6. Threat to Business Continuity - can be in many forms of natural sources or human induced for
  business sabotage, subversive activities, espionage, pilferage.
        As well as the threat from terrorists, there are also threats to civil aviation from criminals, the
mentally ill, bogus refugees, and even people with revenge motives such as disgruntled ex-employees.
         Even totally innocent people can be a threat by inadvertently carrying a potentially dangerous item in
their luggage aboard an aircraft. There are huge numbers of potentially dangerous items, including firearms,
IEDs, bladed items, toxic chemicals, highly inflammable substances and other threat items.
E. Postal Devices
           Postal devices are now one of the common means of criminal attack upon organizations and
  individuals worldwide. Historically, the motives for mail bombs have included revenge, extortion and
  terrorism. The ease with which postal devices can be sent and the anonymity afforded the sender makes them
  extremely attractive and deadly tools for vicious and calculating individuals. Postal device senders never
  need to come face to face with the people they maim or kill. Hazardous items that have been sent by post
  include explosives, incendiary devices, hazardous chemicals, biological agents like Anthrax, razor blades,
  needles and broken glass.
F. CBRN Threats
          Chemical Threats- Chemical weapons are chemical compounds that have a strong, deleterious effect
  on the human body, even when encountered in small doses. The different types of chemical include
  vesicants, which blister and burn on contact; choking agents, which cause lung damage; and nerve agents,
  which interfere with the nervous system and may lead to death. The effects from chemical weapons may
  occur very quickly after exposure, on the order of minutes to hours.
           a. Biological Threats - Biological weapons are pathogens that cause disease and illness in infected
  humans. Because the pathogens multiply within the victim, a small initial amount of pathogen is sufficient to
  cause infection. As a consequence, biological weapons require much less material than chemical weapons to
  produce equivalent casualties and generally take longer to produce effects. Biological weapons include
  diseases that are primarily incapacitating, such as Q fever, as well as those that are lethal, such as smallpox.
  Some biological weapons are contagious pathogens, such as smallpox, and have the potential to spread the
  effects of an attack by traveling from victim to victim. The symptoms from a biological weapon attack would
  require some time to develop, so a covert biological attack might not be recognized for several days-
           b. Radiological and Nuclear Threats - The radiological terrorist device is unlikely to be nuclear
  devices as we generally know them, such as those that make up the nuclear arsenals of countries including
  the U.S., Britain, Russia and France. Manufacturing nuclear weapons is difficult even for countries with
  money, infrastructure, and scientific resources. Nuclear weapons involve a complex nuclear-fission reaction,
  and" the expertise and materials necessary would be extremely difficult for any terrorist organization to
  acquire. Terrorists could, however, build cruder, radiation weapons; which are commonly called "dirty
  bombs." A dirty bomb, or radiological dispersion device, is a bomb that combines conventional explosives,
  such as dynamite, with radioactive materials in the form of powder or pellets. Many types of radioactive
  materials with military, industrial, or medical applications could be used in a dirty bomb. Medical supplies
  such as radium or certain cesium isotopes, used in cancer treatments could be used.
        There is no business without security problems and assets protection risks. These risks and problems
 take many forms. Mitigating them effectively is a primordial consideration.
         Risk mitigation require planning and understanding of the security needs, conditions, threats, and
 vulnerabilities. Assessing security conditions and planning, for appropriate levels of assets protection begins
 with the basics - risk management.
         Security in physical layers should be introduced and should address external barriers such as fences,
 walls, gates, buildings, and lobbies and internal barriers such as, access control systems. Internal controls
 and intrusion detection systems should also be addressed, as is the use of current technology, such as
 biometrics.
          Physical security is the most fundamental aspect of protection. It is the use of physical controls to
 protect the premises, site, facility, building, or other physical assets. The application of physical security is
 the process of using layers of physical protective measures to prevent unauthorized access, harm, or
 destruction of property.
          Physical security protects a property, plant, facility, building, office, and any or all of their contents
  from loss or harm. Physical security contributes to protection of people and information.
            Physical security is the baseline security measure, or foundation, on which all other security
  measures and functions are built. They are used to ensure that only authorized persons have access to
  facilities and property. The measures employed must be appropriate for each separate operating environment.
            In any event, physical security measures are the baseline of protection. All other measures will be
  integrated with physical security measures, developing a protection profile of assets protection within layers.
  It is the responsibility of management to determine what physical security controls are necessary to provide
  adequate level of protection.
COMMON SECURITY CONCEPTS
      From the different security field presented earlier, these are the common recurring concepts in security:
   1. Risk - a risk is a possible event which could cause a loss; the exposure to the chance of injury or loss.
   2. Threat - an event, action or method that triggers a risk which is either natural cause or human
   3. Vulnerability - it is the state of being open to injury or loss; a weakness in a target that can potentially
      be exploited by a threat.
   4. Assessment - is the process of evaluating the probabilities and consequences of risk events if they are
      realized; it includes the processes of identifying„ qualifying, and prioritizing security systems and
      counter measures.
   5. Defense in Depth - is an approach to security in which a series of defensive mechanisms are layered in
      order to protect the asset. The concept is that, if one defense mechanism fails, other steps up to
      immediately impede an attack or unauthorized intrusion.
   6. Target Hardening - is comparable to defense in depth but more focused on strengthening the security
       of a building or installation in order to protect it in the event of attack or reduce the risk.
    2. Organizing - An organization can only function well if it is well-organized. Sufficient capital, staff and
       raw materials are in placed so to build a good working structure. The organizational structure with a
       good division of functions and tasks is of crucial importance. When the number of functions increases,
       the organization will expand both horizontally and vertically. This requires a different type of
       leadership.
    3. Commanding — giving of orders and clear working instructions to employees so they would know
       exactly what is required of them. Return from all employees will be optimized if they are given concrete
       instructions with respect to activities that are carried out by them. Commanding reflects effective
       communication which gives integrity to decision making.
    5. Controlling - verifying whether the activities are carried out in conformity with the plan. This requires
       establishment of performance standards based on organizational objectives, measuring and reporting on
       actual performance, comparing results with performance and standards, a taking corrective or
       preventive measures as needed.
   1. Division of Work - specialization of the workforce increases their accuracy and speed. In practice,
      employees are specialized in different areas and they have different skills. Different levels of expertise
      can be distinguished within the knowledge areas (from generalist to specialist). According to Henri
      Fayol, specialization promotes efficiency of the workforce and increases productivity.
   2. Authority and Responsibility - accompanying power or authority gives the management the right to
      give orders to the subordinates. This means that in order to get things done in an organization,
      management has the authority to give orders to the employees. But of course, with this authority comes
      responsibility.
   3. Discipline - is about obedience. It is often a part of the core values of a mission and vision, in the form
      of good conduct and respectful interactions.
   4. Unity of Command - an individual employee should receive orders from one manager and that the
      employee is answerable to that manager. If tasks and related responsibilities are given to the employee
      by more than one manager, this may lead to confusion which lead to possible conflicts for employees.
   5. Unity of Direction - is about focus and unity. All employees deliver the same activities that can be
      linked to the same objectives. All activities must be carried out by one group that forms a team. These
      activities mast be described in a plan of action. Focus areas are the efforts n-lade by the employees and
      coordination.
   6. Subordination of Individual Interest — is about ethics. Personal Interests are subordinate to the
      interests of the organization. The man primary focus is on the organizational objectives and not on
      those of the individual. This applies to all levels of the entire organization, including the
   7. Remuneration — the compensation of employees must be sufficient to keep employees motivated
      and effective. Motivation and productivity are close to one another as far as the smooth running of an
      organization. Remuneration could be non-monetary, such as a compliment, more responsibilities,
      credits or in the form of monetary consideration such as compensation, bonus or other financial
      rewards.
   8. Degree of Centralization - Management and authority for decision-making process must be properly
      balanced in an organization. This depends on the volume and size of an organization including its
      hierarchy. Centralization implies the concentration of decision-making authority at the top management.
      Sharing of authorities for the decision-making process with middle and lower management is
      decentralization and that an organization should strive for a good balance in this.
   9. Scalar Chain- Hierarchy presents itself in any given organization. This varies from top management to
      the lowest levels in the organization. This principle states that there should be a clear line in the area of
      authority from top to bottom and all managers at all levels.
   10. Order - employees in an organization must have the right resources at their disposal so that they can
       function properly in an organization. There must be social order where the work environment must be
       safe, clean and tidy.
   11. Equity - Employees must be treated kindly and equally. Employees must be in the right place in the
       organization to do things right. Managers should supervise and monitor this process and they should
       treat employees fairly and impartially.
   12. Stability of Personnel Tenure — the deployment and managing of personnel should be in balance with
       the service that is provided from the organization. Management strives to minimize employee turnover
       and to have the right staff in the right place.
   13. Initiative - employees should be allowed to express new ideas. This encourages interest and
       involvement and creates added value for the company. Employee initiatives are a source of strength for
       the organization.
LEVELS OF MANAGEMENT
           The process of management is becoming complicated with the growing complexities of business.
  This calls for a higher degree of skills and abilities. In view of the technological features influencing the
  size and the scale of modern enterprise, management cannot be a simple task that can be performed by an
  individual or a few persons interested therein as proprietors. Hence, managerial functions are assigned to
  different personnel all along the organization.
               The levels of hierarchy of management with authority and responsibility are categorized
       according to functions arranged as follows: Top Management, Middle Management, and Lower
       Management
Top Level Management
              Top level management is usually made up of Board of Directors. However, in practice the
Directors do not take part in the day-to-day affairs of the organization. But the task is generally entrusted to
the Managing Directors or General Managers. They are called as Chief Executives and they are responsible to
carry out the broad policies formulated by the Board. However, the ultimate control rests with Directors. Top
level management is the policy making body responsible for the overall direction and success of all the
activities of the company.
          The principal functions of the top management are:
            1.    Determination of Objectives
            2.    Formulation of Policies
            3.    Long Range Planning and Strate
            4.    Organizing for Action
            5.    Developing of Major Resources
            6.    Selecting Key Personnel
            7.    Coordination and Controlling
          10 | P a g e I n t r o d u c t i o n t o I n d u s t r i a l S e c u r i t y C o n c e p t s
      Review existing documentation
      Assess Process Execution
      Audit Process
      Assess process framework
      Collect evaluation results
      Produce gap analysis
      Recommend initiatives
      Complete evaluation
      Communicate to stakeholders
           2. Policies, Objectives and Tasks - there should exist a single security policy which outlines the
  security architecture, and protocols which should address security management objectives; statement of the
  attitude of the organization to security; description of the security environment; statement of the security risk
  appetite; security organization procedures for security risk assessment; responsibilities; list of security
  standing operating procedures; security priorities and calendar for corning year.
            3. Threat, Vulnerability and Security Risk Assessment - security risk assessments should take into
  consideration a wide range of elements beyond physical security threats. Such elements should Include the
  operating environment and groups/ events by which it is characterized; the profile of the organization, the
  footprint and the social impact; the strategic, long term objectives of the organization; voluntary principles of
  security and human rights; legislation and local expectations; capability and Intent of local crin-1inaT/
  terrorist elements; vulnerability and attractiveness of assets to criminal/terrorist elements; and availability of
  resources.
            4. Controls- examples of security controls may include fences, CCTV physical protection measures
  (lights, barriers, etc.); introduction of security procedures (ID checking, access control, mail screening
            (local social/ networking providers, etc.); electronic security (encryption, password protection, etc.);
  resourcing (security personnel, equipment, etc.); and local Integration or corporate social responsibility
  programs.
           5. Security Risk Register- a security risk register should facilitate ownership and management of
  security risks; provide an overview of the significant security risks that arc faced by an organization; record
  the results of threat/ vulnerability security risk assessment; form an agreed record of those security risks that
  have been identified; record additional proposed actions to improve the security profile; and facilitate the
  prioritization of security risks.
          6. Planning and Resourcing- effective planning consider to address targets; time frame in
          achieving them, and the manner they be achieved.
           7. Execution and Control Activities- the execution of plan is predicated on all of the previous
  components in the management system such that the plan has identified all the security risks to the operation;
  all control mechanisms a-reestablished; the plan has been accordingly and appropriately resourced;
  procedures are documented, approved and validated; the plan has been effectively communicated to those
  with responsibility for Its execu1tion; assurance that those responsibility for carrying out the plan have the
  correct competencies; all correct back up and reinforcement strategies are established and tested.
          11 | P a g e I n t r o d u c t i o n t o I n d u s t r i a l S e c u r i t y C o n c e p t s
          8. Monitor and Security Reporting — monitoring is based, upon effective two-way
  communication. Where appropriate, traditional methods are often effective and should be considered
  inspections; review meetings; auditing; interview; and workshops.
            9. Review- the purpose of the review be any combination of the following: to critically de brief the
  plan in order to determine strengths weaknesses and areas that could be improved; to obtain feedback from
  those involved in the execution of the plan/ project regarding the manageability of the plan; to highlight any
  competency Issues arising from exposure to next challenges; to exam-nine much contribution the
  operation/task/ project brings to the achievement or the organization's objectives; assurance to top
  management that security is being managed effectively; enables security management to assess whether
  established protocols are be in effective, and to take action accordingly; an highlight examples of good
  practice.
          10. Learning- effective processes for learning lessons will enable an organization to introduce
  improvements to procedures, improvements in organizational structure; update documentation •
  implementation of next training courses; increase awareness of new threats/ update on existing threats; and
  introduce next equipment/ technology.
          11. Reporting to Top Management - providing such feedback to top management offers
  reassurance that security is being effectively managed and the reassurance that security understands its role in
  the achievement of the business objectives. It also gives confidence in decision-making that all security issues
  have been given appropriate consideration.
           A security management system, as with other management systems is based upon the model defined
  in ISO 9001 Quality Management Systems Requirements. In a security risk-based, process-driven approach to
  security, the achievement of security objectives should start with a threat/ security risk assessment. Having
  identified the security risks and planned mitigation measures, a security risk register may be established. The
  mitigation measures detailed in the security risk register are realized through resource management and
  security planning, thus arriving at a security solution (product), whether that is hard security measures,
  procedural requirements or a higher-level security solution that supports strategic objectives, such as a crisis
  management strategy or establishment of an intelligence gathering network. In order to help in the
  achievement of organizational objectives, the management system needs to be supported by approved
  standards and procedures. The security management principles include customer focus, leadership,
  involvement of people, process approach, systems approach to management, continual improvement, factual
  approach to decision making, and mutually beneficial supplier relationships.
            For any organization to succeed of achieving its goals or objectives, it requires the utilization of
available resources. The 1OMs of management are essential resources for security management they are as
follows:
   1. Manpower - refers to people as resources. It is the important of all resources. It pertains to the
      workforces in the all levels of management, without them, all other resources are n usable. They are
      categorized as the managers and the employees.
   2. Money — refers to financial resources. It is the driving force of any business for the compensation or
      reward of the work force. Any business enterprise of any nature and size needs a capital.
   3. Machineries — refers to devices or tools needed in order to aid the work force do their activities with
      ease and simplification. These includes modern technologies and automations.
   4. Materials — refers to raw materials as inputs to business production. They are processed into finished
      form and become products".
   5. Methods — refers to standards and procedures used as techniques of production. It can be systems that
      are put together for the transformation of raw materials into usable products, goods or services.
      Machines do not operate by themselves without a system or procedure.
          12 | P a g e I n t r o d u c t i o n t o I n d u s t r i a l S e c u r i t y C o n c e p t s
   6. Market — are interactions, social relations, and institutions for trading of goods and services, which
      form part of the economy. It refers to "transactions in motion, categorized as consumer market or
      industrial market.
   7. Minute — refers to the management of time, the optimum time that a worker needs to produce the
      highest quality of product or service. It is called efficiency at work.
   8. Morale— refers to motivation of people, the moving power to act or exert effort to achieve desired
      goals or objectives. It is the 'secret weapon' of management of controlling and getting the job
   9. Matter- refers to data and information management. Data refers to information are translated into a
      form that is efficient for movement or processing. They are used for organizational program that
      manages the people, processes and technology that provide control over the structure, processing, and
      delivery. Information are also required for management and business intelligence purposes.
  10. Measurement — are internal control systems, such as preventive controls, detective and reactive
      controls, use to gauge effectiveness. It encompasses the assessment of performance and results achieved
      by employees and the entire organization.
SECURITY MANAGERS
              Security managers are persons in the organization who are responsible for monitoring the security
 operations for any organization or company. They implement security policies, regulations, rules, and norms
 and make sure that the environment in their organization is safe for employers and visitors. These managers
 are required to hire new members for the staff and delegate tasks and duties to them. One of their main duties
 is to check and monitor the access control of the people who are visiting the company. They perform many of
 the following tasks:
           1. Functional Manager — one who is responsible for just one organizational activity such as
              accounting, human resources, sales, finance, marketing, or production. Focus on technical areas
              of expertise, use communication, planning and administration, teamwork and sell-management
              competencies to get work done.
           2. Operations General Manager—one who is responsible for the operations of more complex
              units for example, a company or division. Oversee work of functional managers. Responsible for
              all the activities of the unit and the need to acquire strategic and multicultural competencies to
              guide organization
          13 | P a g e I n t r o d u c t i o n t o I n d u s t r i a l S e c u r i t y C o n c e p t s
VARIOUS STYLES OF SECURITY MANAGERS
              The work force and other resources are managed by multiple types of managers, with each
 having their own unique management and leadership style, as follows:
   1. The Visionary — one who listens to ideas and take note of what they're trying to achieve. They jump
      right. in and help brainstorm ideas with a team. They provide practical advice and options for how their
      ideas can be turned into a reality.
   2. The Coach — one who is like a sports coach, who bring high levels of energy and discipline. He aims
      to bring nigh performance into the workplace. He is highly people-focused and view the success of the
      team as his own personal success. He usually set clear, realistic goals for performance and discuss
      practical strategies on how the team can achieve those goals.
   3. The Sensitive Boss- bosses are genuinely concerned with the emotional well-being of their workers and
      are determined to create a workplace that is as harmonious and responsive to individual needs as
      possible. They an-n to create close connections shared team between activities, individual while
      minimizing workers stressful through or confronting situations.
   4. The Democratic Boss - one of the easiest types of managers to work with, democratic bosses are
      focused on open collaboration within their teams and are underpinned by a strong belief that the best
      outcomes are achieved by all parties bringing their ideas to the table in pursuit of a common goal. He
      contributes actively to team discussions and give opinion on new ideas.
   5. The Commander- one just wants the job to be done on time and to the highest standards possible.
      Accordingly, one of the n-lost difficult management styles to under, commander bosses know exactly
      what outcomes they want from their team and ensures that everybody knows about it. Commanders
      expect strong discipline and speed from their team and may often shout commands in very clear terms.
   6. The Pacesetter- one who is highly energetic and will often do their best to bring motivation to the team
      in the fast-paced nature of modern economy. He is focused on winning the race and winning it with
      pride. Similar in personality to commanders, pacesetters can also be quite direct and demanding,
      expecting the best from their team members and impatient if tasks fall behind schedule.
14 | P a g e I n t r o d u c t i o n t o I n d u s t r i a l S e c u r i t y C o n c e p t s