¶ … components and regulations concerning the design of a physical security system for a privately owned company. This essay will create a system that reflects the needs of the customer. The customer is an office, and paper and computer storage facility that is private in nature and requires certain security requirements that can meet this customers specific and unique needs.
The essay will first describe the necessary standards and credentials that this security design plan will use to base its construction. This design will correspond to the ASIS private company standards and will consist of three main components; Exterior, Functional Areas and Building Standards. Through the explanation of each component, the customer will have a thorough understanding of how and why the specifications will be met according to accepted practiced and professional standards
ASIS
ASIS is an international organization that organizes security professionals. ASIS is one of many these types of groups that contributes to the professional standards of security management. According to their website, "ASIS International is the leading organization for security professionals, with more than 38,000 members worldwide. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests, such as the ASIS Annual Seminar and Exhibits, as well as specific security topics. ASIS also advocates the role and value of the security management profession to business, the media, government entities, and the public."
ASIS provides a very useful series of standards that security management professionals can reference and adhere to in order to strengthen the unity of the organization and eventually the profession as well. The PSC Series of Standards was developed by more than 200 experts from many countries around the world. These standards will be used in the development of this project and provide a foundation of knowledge that can be very beneficial for the project itself by reflecting strongly upon the high levels of professional standards that are inherent within this codified group of instructions.
The essence of this code is related in the standards themselves. It is noted that "The PSC series provides the principles and requirements for a Quality Assurance Management System (QAMS) for PSCs. The goal of the QAMS is to assure a high quality of security services while protecting human rights and fundamental freedoms in circumstances where the rule of law has been weakened due to human or natural events while allowing for the PSCs to achieve their objectives, and that of their clients. A QAMS will promote a culture in the organization that bonds quality of service with respect for international law, local laws, and human rights."
Step 1 Implement Strategic Policy
Before any plan may be put into place, it should be understood that the manifested reality will certainly reflect the aforementioned thought. To create a physical security plan that is consistent with intent, policies must be created and utilized in order to guide the project. A risk analysis is the first step of this preliminary action where NIST guidelines are applied in this developing strategy. The intent of this risk analysis is to identify baseline rules and set a method of command and control for the project. This is essential in dealing with security measures, as a tactical and cautious operational outlook is recommended. Creating records, logs, access reports and security incident tracking measures should also be included in this first step.
Step 2: Assign Security Responsibility
The human resources aspect of developing a physical security plan is very important as finding the right person for the right job can make the difference between success and failure. To assist in this step of the operation it is necessary to identify the necessary security officials and assign areas of responsibility. Additionally, the proper policies and rules should also align with these areas of responsibilities. Since the nature of this private business is computer and data storage, this data must be treated with appropriate levels of security and handling procedures. During this step, various assignments of security levels are created to allow access to certain levels of information. For this design there are simply 5 Levels of data security, and can be divided in this manner as the executive sees fit.
It is once again important to align this step of the plan with the greater objectives of the organization. Since profits and money are inherently part of this organization's aim, it will be necessary to minimize costs where applicable and security may need to be sacrificed in some aspect in order to maintain financial objectives which more than likely will preempt the security...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now