¶ … Physical Security The relevance of physical security cannot be overstated when it comes to the prevention or minimization of instances of unauthorized access, loss, or even theft. In this text, I concern myself with physical security and the relevance of several of its components. The components I will address in this discussion are building...
Introduction Want to know how to write a rhetorical analysis essay that impresses? You have to understand the power of persuasion. The power of persuasion lies in the ability to influence others' thoughts, feelings, or actions through effective communication. In everyday life, it...
¶ … Physical Security The relevance of physical security cannot be overstated when it comes to the prevention or minimization of instances of unauthorized access, loss, or even theft. In this text, I concern myself with physical security and the relevance of several of its components. The components I will address in this discussion are building security, grounds security, access control systems, perimeter security, and information systems and technology security. Physical Security: Brief Overview In the assessment of security vulnerabilities, physical security is generally regarded a critical issue.
This is particularly the case given that it is the said physical security that presents the most serious obstacle to an attacker seeking to execute a break-in. In that regard therefore, the various components of physical security, some of which are discussed in significant detail in this text, should seek to secure people and organizational assets from intruders. For this reason, physical security could include the utilization of CCTVs, protective lighting, access control, systems, and actual physical barriers (Dempsey, 2010).
It is important to note that in some instances, a malicious individual may only be interested in the interruption of an organization's ability to operate effectively. Such an attacker may not necessarily compromise an organization's perimeter. A physical security assessment initiative must therefore address all the possibilities including but not limited to destruction of organizational property and possible disruption of organizational activities and operations. In the next section, I address the nature and importance of a number of physical security components.
Building Security In most cases, the level of building security implemented is largely based on the importance as well as the value and relevance of assets housed within a given facility. Building perimeter security strategies in that regard therefore "provide a second line of defense for protecting site occupants and property by preventing unauthorized entries of buildings" (Fennelly, 2012, p.6). Of great importance on this front is therefore the erection of surveillance systems as well as the installation of physical barriers (Fennelly, 2012).
To assure a wholesome and complete protection of buildings, there is also a need to put in place measures designed to limit access to a building's interior spaces. As Fennelly (2012) observes, interior security strategies come in handy in not only the safeguarding of property but also the prevention of unauthorized access. Their relevance cannot therefore be overstated when it comes to the further enhancement of physical security.
In most cases, the primary access points of a building including but not limited to windows and doors are given great emphasis in the development of a building security plan. It is important to note that although doors and windows remain the primary access points, there is a need to also take into consideration other access points that could be exploited as easily by an intruder. These other access points include but they are not limited to communication devices and electricity entry points, air and ventilation vents, etc.
There is also a need to ensure that there is a sufficient buffer zone between a building and the public. This is particularly the case if the said building houses sensitive, important, or critical assets. Other considerations when it comes to building security include the installment of locks, security surveillance cameras, deployment of building guards, and utilization of identification badges (Dempsey, 2010). Grounds Security Effective physical security must also incorporate ground security.
To guarantee security, security experts are increasingly becoming aware of the relevance of a well thought-out environmental and architectural design plan. Indeed, more than ever before, the need to assure security has seen security managers and consultants assume a prominent position in the landscape architecture. Depending on the level of threat, organizations should have a comprehensive security plan that seeks to landscape their exteriors securely.
For this reason, "building grounds security strategies provide the first line of defense against unauthorized entry of sites and offer social control mechanisms to prevent dangerous and destructive behavior of visitors" (Fennelly, 2012, p.6). As the author further points out, the emphasis in this case is on not only the access control but also on the architectural design and its surveillance aspects. Dark alleys or even un-cleared bushes could allow for the commission of various crimes against an organization, its visitors, or even its most important resources -- employees.
It is important to note that in the recent past, several lawsuits have been brought up against organizations for their failure to foresee and forestall crime against those who visit their premises. The relevance of an effective grounds security plan cannot therefore be overstated. On this front, "the target environment might be a residential street, the side of a housing complex, or alleyways behind or between business establishments" (Fennelly, 2012, p.6).
Access Control Systems As Purpura (2007) points out, previous access control methods including the lock-and-key approach have had their own fatal limitations. This according to the author has called for the development of more advanced and effective access control systems. Today, organizations and business premises have a variety of access control systems to choose from. In basic terms, access control systems seek to either limit or prevent the flow of traffic to certain designated points. For this reason, identification remains one of the most important elements of access control systems.
As I had pointed out earlier, many organizations are today embracing sophisticated access control mechanisms. This has been made possible by the advancement of technology which has allowed for the creation of computer-based control systems such as card readers, iris scanning devices, fingerprint reading equipments, etc., with the latter two being referred to as biometric access control mechanisms (Purpura, 2007). Other controls could make use of personal identification methods like PIN requirements. Without effective access controls, anybody can have access to the various resources of an organization.
Given the level of sophistication on this front, access control systems provide the most effective barrier against intruders. An organization that uses advanced access control systems like biometrics significantly reduces chances of.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.