Skip to main content
Skip header

Methodology of physical safety of the enterprise

* Exchange students do not have to consider this information when selecting suitable courses for an exchange stay.

Course Unit Code060-0026/01
Number of ECTS Credits Allocated4 ECTS credits
Type of Course Unit *Compulsory
Level of Course Unit *Second Cycle
Year of Study *Second Year
Semester when the Course Unit is deliveredWinter Semester
Mode of DeliveryFace-to-face
Language of InstructionCzech
Prerequisites and Co-Requisites Course succeeds to compulsory courses of previous semester
Name of Lecturer(s)Personal IDName
SCU66doc. Mgr. Ing. Radomír Ščurek, Ph.D.
Summary
The purpose of the course is to determine and differentiate the issue of physical security in companies requiring increased attention, such as airports and railways. The course includes current, changing legislation, standards, including the definition of new and existing facts related to the security policy of the company and the management of its protection. It also interprets variants and methods of attack and the relevant methodology of protection by technical, organizational and regime means, but also by the methodology of protection of classified and personal information. Students will be able to characterize and recognize elements of competitive intelligence of the company, they will master the security aspects of capacity and design issues, including queue management systems and methods of assessing the threat of soft targets.
Learning Outcomes of the Course Unit
The aim of the course is to provide students with knowledge and competencies that will enable them to organize knowledge of physical security, especially to be able to modify the protection of property and individuals, with emphasis on current technical and organizational solutions and methodology of physical security and scientific work.
Course Contents
1. Defining the security policy of the company and security management of the organization. Business protection structure; methods of assessing the safety of the object. Segments of physical protection of the company.
2. Assessing the protection of the company from a structural and procedural point of view. Zoning and methods for quantification of human factor failure in company security and residual risk.
3. Safety culture in physical protection, typology of corporate culture, applied mind map, graphic modeling of danger and Pareto's principle of repression and prevention in business protection.
4. Capacity issues to ensure security in the company. Static and dynamic capacity of connectors, processors and reservoirs, capacity peaks, economic aspect of capacity solutions.
5. The concept of prevention and methodology of business protection as a soft target, comparison with the so-called hard targets, Crowd safety management (crowd safety management) and application to selected objects (airport, school).
6. Sociological and prognostic methods used in physical security, case studies and statistics of the periphery of the company. Techniques for prioritizing criteria while minimizing physical security risk.
7. Methodology of scientific work and solution of professional problems in physical security in general. Use of linguistic interpretation in legal security interpretation.
8. Economic aspect of company protection; synergistic, dysergic and domino effect in the security of the company, the influence of legal regulations on the security economy, care of a proper manager and violation of rules in the management of company assets, identification of assets and the ALARP / ALARA rule in the company.
9. Fraudulent conduct in the company; audits, penetration test and integrity tests in the company, the phenomenon of clientelism, nepotism, protectionism, corruption and legalization of proceeds from crime and cases of corruption, criminal liability, whistleblower.
10. Methodology of competitive intelligence in the company, mystery shopping, vetting, information protection and space of special importance in the company, personnel preemployment screening, pitfalls.
11. Design issues of security, advanced perimeter security stations, labyrinth inputs, protection against the domino effect of processors, connectors and reservoirs in the company. Queue management - queue management system and queue theory.
12. Systems of access control to the company, identification, authorization and verification of employees and visitors to the company, RFID, biometrics and biometric technologies in the security practice of the company. Typing, questioning, observing and profiling a potential offender in the company.
Recommended or Required Reading
Required Reading:
FAY, J., PATERSON, D. Contemporary Security Management. Oxford, 2018. ISBN 978-0-12-809281-1
PALMITE, A. R.: Securities Regulation: Examples & Explanations, Aspen Publ, 2017, ISBN13 (EAN): 978-14-5488-130-8
ŠČUREK,R., MARŠÁLEK, D.: Režimová a administrativní ochrana civilního letiště. Akademické nakladatelství CERM, s.r.o., Brno, 2014, 978-80-7204-882-3, vědecká monografie,
ŠČUREK,R., MARŠÁLEK, D.: Technologie fyzické ochrany civilního letiště. Akademické nakladatelství CERM, s.r.o., Brno, 2014, 978-80-7204-862-5, vědecká monografie
ŠČUREK,R., MARŠÁLEK, D.: Režimová a administrativní ochrana civilního letiště. Akademické nakladatelství CERM, s.r.o., Brno, 2014, 978-80-7204-882-3, vědecká monografie,
ŠČUREK,R., MARŠÁLEK, D.: Technologie fyzické ochrany civilního letiště. Akademické nakladatelství CERM, s.r.o., Brno, 2014, 978-80-7204-862-5, vědecká monografie
FAY, J., PATERSON, D. Contemporary Security Management. Oxford, 2018. ISBN 978-0-12-809281-1
PALMITE, A. R.: Securities Regulation: Examples & Explanations, Aspen Publ, 2017, ISBN13 (EAN): 978-14-5488-130-8
Recommended Reading:
BHUSHAM, N. I., KANWAL, R. Strategic Decision Making: Applying the Analytic Heirarchy Process. Londýn: Springer – Verlag, 2004. 200 s. ISBN 1-8523375-6-7.
BRABEC, F., LÁTAL, I., MUSIL, R., PILNÝ, I., URBAN, M., VEJLUPEK, T.: Bezpečnost pro firmu, úřad, občana, nakladatelství Public History, Praha, 2001.
FRYŠAR, M. a kolektiv: Bezpečnost pro manažery, podnikatele a politiky, nakladatelství Public History ve spolupráci s Českou asociací bezpečnostních manažerů, Praha, 2006.
UHLÁŘ, J.: Technická ochrana objektů 1.-3. díl, Policejní akademie ČR, Praha 2005.
FRYŠAR, M. a kolektiv: Bezpečnost pro manažery, podnikatele a politiky, nakladatelství Public History ve spolupráci s Českou asociací bezpečnostních manažerů, Praha, 2006.
UHLÁŘ, J.: Technická ochrana objektů 1.-3. díl, Policejní akademie ČR, Praha 2005.
BHUSHAM, N. I., KANWAL, R. Strategic Decision Making: Applying the Analytic Heirarchy Process. Londýn: Springer – Verlag, 2004. 200 s. ISBN 1-8523375-6-7.
BRABEC, F., LÁTAL, I., MUSIL, R., PILNÝ, I., URBAN, M., VEJLUPEK, T.: Bezpečnost pro firmu, úřad, občana, nakladatelství Public History, Praha, 2001.
Planned learning activities and teaching methods
Lectures, Tutorials, Other activities
Assesment methods and criteria
Task TitleTask TypeMaximum Number of Points
(Act. for Subtasks)
Minimum Number of Points for Task Passing
Credit and ExaminationCredit and Examination100 (100)51
        CreditCredit30 10
        ExaminationExamination70 21