Physical Security Principles
Paula L. Jackson
CJA/585
June 7, 2010
Professor Brian Kissinger
Abstract
Physical safety inside and out depends on the type of physical security that is being used by that facility. How well the buildings security system is being implemented can have an impact on the safety of its patrons and other individuals who frequent the building.
Physical Security Principles
Safety in numbers has always been a deterrent method when leaving or traveling through places that are not safe. But without proper physical security measures set in place when leaving any facility or building the need for a crowd will be of no use. Proper physical security requires accessing the risk that may cause
…show more content…
Technology Advancement
Physical security for any facility is a major factor for keeping safe and having modern technology on site is a greater addition. Protecting the facilities assets requires the company to stay ahead with modern day upgrades and devices for ensuring that whatever or whomever is gaining access to the property is suppose to be there. Monitoring the individuals who enter through facility access control and perimeter fences or installing video and closed circuit television surveillance can eliminate trespassers and those with no prior business on the property. Personal identification systems can also be established that use fingerprints and biometrics to gain access into any facility for staff and personnel. The amount of technology to use for physical security is unlimited depending on the facility and what needs protecting.
Conclusion
Physical security involves many components such as location, configuration, size, shape, and many other vital attributes that comes with a standing structure. Keeping people safe on the inside as well as those on the outside requires security principles that go beyond what just the normal eye can see. Applying the correct physical equipment to lower the risk of unwanted behaviors and attacks depends on how well the perimeter is guarded. Advanced technology including cameras and monitoring systems add to the insurance of physical security and if used
There is such a range of people walking the grounds (including visitors, visitors’ guests, college students, training staff, supervising staff, and contract workers) that ensuring proper security is important.
Physical security can be very complex, as the evolution of technology changes on a daily basis. The dual role concept is a dilemma that poses a constant struggle within the agency. The ability to maintain consistency with technological advancements utilizing physical security practices of the past is a significant challenge that FPS faces. Another area of concern is the complexity of security and the deficiency of training. Advancements in technology necessitate training advancements. From the initial understanding of basic alarm theory covering the simplistic concept and design of an intrusion detection system (IDS), to a system that is virtually state of the art in capability and technical
(TCO 6) Many believe that the most important physical security control is _____. (Points : 5)
The security systems within a pre-school may be considered a hazard, as there are many vulnerable, young children present in the building. This hazard would put both the children, visitors and workers at risk, as if the security system is not sufficient, unauthorised persons may
Physical security is implemented via a locked door policy that is set with swipe card access. The company has security cameras set up in the front entry hallway to record entry and exit of all personnel. The server room floor is raised with cable management fed through easy access panels. The server room is locked at all times, with access is via swipe card only. There are foam sprinklers throughout the roof system to protect against fire. Racks are locked up to ensure no items can be manipulated without appropriate personnel present. Studio and production labs also have swipe card access to protect equipment.
The physical protection of information, personnel, software, buildings and other material resources are the first thing that should be assessed when looking into security, obviously there are unavoidable disasters such as natural disasters, man-made disasters and loss of electricity, air or water but most issues are preventable, by monitoring who has access to what and how much access they have, by locking rooms and PC’s, using person specific swipe cards, bolting computers to desks, having effective CCTV in place, and by having effective monitoring tools an IT team can keep a close eye on valuable data and prevent risks. Electronic security systems are designed to protect against unwanted personnel and they provide free roaming for wanted personnel. An electronic security system is a series of biometric locks, or a single biometric lock. A biometric lock is a system that can provide control of entry (or exit) within a designated area by the use of an electronic locking facility. The most common biometric lock is a pin pad system which is a keypad that requires the exact combinations of keys to open the lock, the keys are generally numbers but can be emphasised as letters, shapes, or sounds. Secondly and commonly are swipe cards which are encoded cards which hold information on the user, there is normally a swipe slot to enter a facility that have chosen to
Ensuring that physical access to the device you want to secure is restricted to authorized personnel.
Explain how the types of security measures work to contribute to maintain the security of people, premises and property.
Some include administrative, physical and technical safeguards. In administrative safeguards it allows the reader to understand the security management process to reduce risk and vulnerabilities. Security personnel responsible for developing and implementing security policies. Information access management minimum access to perform duties. Physical safeguard is about the limit of physical access to facilities, and how workstation and device security policies and procedure covering transfer, removal, disposal, and reuse of electronic media. Finally, technical safeguard is about the access control that restricts access to authorized personnel’s. Audit controls for hardware, software, and transitions. Integrity controls to ensure data is not altered or destroyed. Transmissions security to protect against un authorized access to data transmitted on network and via email. Moreover, there are three pillars of data security confidentiality, availability, and integrity. Confidentiality refers to the prevention of data loss, and is the category most easily identified with HIPAA privacy and security within healthcare environments. Usernames, passwords, and encryption are common measures implemented to ensure confidentiality. Availability refers to system and network accessibility, and often focuses on power loss or network connectivity outages. Integrity describes the trustworthiness and permanence of data, an assurance that the lab results or personal medical history of a patient is not modifiable by unauthorized entities or corrupted by a poorly designed process. Database best practices, data loss solutions, and data backup and archival tools are implemented to prevent data manipulation, corruption, or loss; thereby maintaining the integrity of patient
Commercial buildings have increased their security measures due to bombings and terrorist attacks. Generally, they have security policies and an emergency management program that includes evacuation procedures. As far as access control is concerned, they have a reception desk in the lobby to control access into the building, confirm appointments of all visitors and issue temporary ID badges, and issue identification cards to all personnel and tenants that have their photograph and signature (“Security Tips”, 2006). Commercial buildings require the use of I.D. cards for access and require that cards be displayed at all times on the premises (“Security Tips”, 2006). Additionally, shipping and receiving areas have restricted access and is monitored by closed-circuit television surveillance (“Security Tips”, 2006). Security personnel are suitably selected and trained.
Firstly, public safety will make people feel better when they are going out. In our life, we have to or sometime must go out to do some works, activities, etc., So imagine that one day you go out and being involved in a fight unexpectedly which you are found to be responsible as you go through near
The security provides a feeling of safety and security for our people and makes individuals feel more safe as they walk in and our of different buildings around.
Companies can prevent falling victim to unauthorized physical access by developing and implementing simple policies, standards, procedures, and guidelines for employees as well as guests to follow. Secure all areas containing sensitive systems and/or data. Require staff to follow entrance procedures when entering a secured area. Also ensure that physical data such as important documents are secured. Require
Security has been a common topic of controversy since the terrorist attacks of September 11, 2001, and even before then it was a constant subject. The image of buildings collapsing and billowing smoke has been engraved into the minds of Americans and will remain there for years to come. Security is an issue that we encounter everyday. Whether it is driving down the freeway or walking into the grocery store; we are cautious of what is going on around us. Men and women across this country are dedicated to enforcing laws; laws that are designed to ensure the security of our communities and our nation.
Customer Needs- Security systems are required by people to0 keep their homes safe, it gives them a sense of safety for their personal belongings, when they are away from their home.