Ensuring Perimeter Protection And Security Essay

PAGES
4
WORDS
1208
Cite

Security One of the most important aspects for enhancing security is perimeter protection, which is regarded as a significant component for residential, industrial, public/private, and commercial areas. The significance of perimeter protection in security is also demonstrated that the defense of an organization commences at the perimeter. As a result, there are several perimeter protection systems that are available in the security market. The concept of perimeter protection is also related to several important elements including the outer defense, internal and external security concerns, and access control. This paper will examine each of these components in relation to perimeter protection as an important aspect of enhancing security.

The Outer Defense

Physical security is considered as one of the important elements of perimeter protection, particularly with regards to the outer defense. Fischer, Halibozek & Walters (2013) define physical security as the measures undertaken by a facility to protect itself against security threats/attacks and various kinds of disasters. In this case, a facility refers to a building, plant, institution, office, and industrial/commercial structures. In light of the modern security threats/attacks, physical security has emerged as an important aspect towards ensuring the safety of a building regardless of whether its utilized for residential, commercial, public or private, and industrial purposes.

Based on its definition, physical security is strongly related to perimeter protection because it's the first basic defense towards the physical protection of a facility. Actually, planning for physical security incorporates several activities including development of perimeter protection. In this regard, planning for physical security entails safeguarding the grounds around the building, the perimeter of the building, and the interior/contents of the building. Additionally, physical security relates to perimeter protection on the basis that it commences at the perimeter, which is the...

...

Natural and structural barriers are defined as components that define boundaries and utilized to deter penetration or unauthorized access by any intruders (Fischer, Halibozek & Walters, 2013). These elements relate to perimeter protection on the premise that they establish boundaries that are in turn utilized as the premise for deterring penetration and/or unauthorized entry or access. When designing physical security elements, natural and structural barriers are taken into consideration to help enhance a building's protection. Therefore, natural and structural barriers play an important role in planning for basic physical security protection.
Internal and External Security Concerns

In cases where the building forms part of the perimeter barrier, the building must be examined in terms of its strengths as part of the initiatives to enhance perimeter protection and guarantee physical security. When the building is part of the perimeter barrier, it should be viewed in the same manner as the other parts of the barrier. Therefore, the building should be assessed in similar manner to the outer structural barrier. However, there are important considerations to make in such situations as part of determining how to secure the perimeter.

One of these considerations for determining how to secure the building when it forms part of the perimeter barrier is the strength of the building's windows and doors. The strength of windows must be considered in determining how to secure the perimeter when the building is part of the perimeter barrier because windows are sometimes ready targets for intruders because of the ease with which they can be entered. In this regard, enhancing the strength of the windows helps in enhancing the security of the perimeter because they can act as potential…

Sources Used in Documents:

Reference

Fischer, R.J., Halibozek, E.P. & Walters, D.C. (2013). Introduction to security (9th ed.). Waltham, MA: Butterworth-Heinemann.


Cite this Document:

"Ensuring Perimeter Protection And Security" (2017, June 23) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/ensuring-perimeter-protection-and-security-2165509

"Ensuring Perimeter Protection And Security" 23 June 2017. Web.23 April. 2024. <
https://www.paperdue.com/essay/ensuring-perimeter-protection-and-security-2165509>

"Ensuring Perimeter Protection And Security", 23 June 2017, Accessed.23 April. 2024,
https://www.paperdue.com/essay/ensuring-perimeter-protection-and-security-2165509

Related Documents

Perimeter Protection The Palm Beach Marina Grove (PBMC) requires creating a new perimeter protection plan that will take into account the new construction and structure that will be opened (i.e. The Palm Beach Marina Cove Building Two or PNMC II). It is going to be sitting directly to the east of the PBMC. The new changes will mean making temporary and permanent transformations in the protocols and procedures. (Garcia, 2007) To understand

Security Measures The hotel industry has experienced the need to enhance security of guests in the recent past given the increased security threats/attacks in the modern business environment. The increased focus on enhancing security in the hotel industry has represented a major shift from the serious neglect of various security responsibilities that characterized this industry in the past. According to Fischer, Halibozek & Walters (2013), hotel managers, particularly security managers, are

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

The management control area of authorize processing including certification and accreditation has been defined within Coyote Systems through the use of roles-based logins and access privileges and the use of certification of role-based access to ensure security. The company has found that through the use of role-based security authentication and the defining of rights by role, the certification and accreditation audits are far more efficient in being completed, and provide

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and