Verified Document

Building Security External Building Security Seems To Case Study

Related Topics:

Building Security External building security seems to have taken on added significance since the 2001 strike against the World Trade Center in New York city by terrorists that flew airplanes into the two buildings that resulted in their complete decimation. As one recent study determined, however, there are modern remedies that help against future attacks of similar nature. One study in particular determined that "Ultra-high-performance concrete (UHPC) is particularly suitable for application in aircraft-impact-resistant high-rise buildings for combined load-bearing and protective structures" (Noldgen, Fehling, Riedel, Thoma, 2012, pp. 358). There are more concerns however in developing and maintaining security than just worrying about an airplane (or other missile) being used against a building for terrorism and mayham.

One of the concerns may include the access points to the building that may be vulnerable to entry by those who seek to control or damage the building. As the book reminds us that fortifying a main entryway to deter terrorists is all well and dandy, but not if we allow for easy entry way through a cafeteria or similar entryway. Therefore, having an effective entry control system "allows the movement of authorized personnel and material into and out of facilities...

The principle of balanced design "ensures that each aspect of a barrier configuration affords equal delay" (book -- Chapter 11-page 221). What the balanced design approach to security is seeking to provide is an approach with "no weak links." A good example of no weak links would be a door or entryway that is totally secure.
Again the book is cited in Chapter 11 by stating "an adversary is not likely to burn a hole in a door to crawl through if the door locks or hinges are clearly easier to defeat" (p. 221).

As an example of a balanced design strategy, when the White House was rebuilt during the 1949 -- 1952 period of time it was rebuilt to include a bomb shelter for the protection of its inhabitants, and "part of the house was rebuilt on a steel-supporting frame" (White House, 2013, p. 1). Rebuilding on a steel-supporting frame was an attempt to ensure that the external security of the building was enhanced and strengthened.

Another principle to consider would be the delay-in-depth principle. Implementing a…

Sources used in this document:
Works Cited

Noldgen, M.; Fehling, E.; Riedel, W.; Thoma, K.; (2012) Vulnerability and robustness of a security skyscraper subjected to aircraft impact, Computer -- Aided Civil and Infrastructure Engineering, Vol. 27, Issue 5, pp. 358 -- 368

White House (2013) Columbia Electronic Encyclopedia, 6th edition, p. 1 -- 1

Chapters 10 -- 11 -- 15 in the book (you will have to put in the citation)
Cite this Document:
Copy Bibliography Citation

Related Documents

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Security Issues in IEEE Wlan
Words: 6613 Length: 20 Document Type: Term Paper

Despite its clear benefits and advantages in terms of ease of use and cost effectiveness, there are certain risks associated with wireless networking. These risks are discussed further below. Review of the Literature. Security Risks Associated with IEEE WLAN 802.11. The applications for wireless communication technology continue to develop and expand; today, at least, the 802.11b is the standard of choice for wireless router communication used with network installation (Gonazles & Higby

Security Training Capacities for an Enterprise
Words: 2230 Length: 7 Document Type: Term Paper

Developing the Forensics, Continuity, Incident Management, Organizations of the 21st century are facing the increased need for incidence management, security and while handling training capacities for the enterprise. Security remains a major concern given that organizations have traditionally lost data through theft or malicious destruction. Studies have shown upgrades should be done at the technology and expert level. Attacks come in a variety of formats or even hybridized and cloned, hence

How Can Horeshoe Casino Security Be Made More Effective
Words: 6619 Length: 22 Document Type: Thesis

How can I better Horeshoe Casino Security to make it more effective?STATEMENTI, ………………………………………………………………………., declare that this dissertation: How can I better Horeshoe Casino Security to make it more effective?, is my work and that all the sources that I have used or quoted have been indicated and acknowledged using complete references.SIGNATURE:…………………………………. DATE:………………………..AbstractMost casinos do not want to take risks when it comes to the integrity of their gaming operations and

Electronic Information Security Documentation During
Words: 1268 Length: 3 Document Type: Term Paper

Risk analysis projects are relatively expensive, and were so even in the mainframe computing era, because they involved the collection and evaluation of a significant volume of data. Earlier risk studies were conducted by in house staff or consultants and the in house people did not have much experience regarding the matter and the consultants did not know much about the requirements of the organization. Presently, the familiarization task has

North Africa Nation Building
Words: 2714 Length: 8 Document Type: Case Study

North Africa Nation Building Authoritarian regimes in the Middle East and North Africa have been collapsing unexpectedly over the past year, or at least are under severe challenge by their own people for the first time in decades. In Tunisia, the first North African country to overthrow an entrenched dictatorship, the recent elections appear to have been free and fair, resulting in the election of a moderate Islamic government and the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now