Security For A Building Including Access Control Term Paper

PAGES
3
WORDS
920
Cite

Introduction

When designing a comprehensive security solution for a client, it is important to take into account all aspects of physical as well as information security. The security consultant also needs to ascertain the clients goals and objectives, understanding the location of strategic assets and resources. While budgetary constraints might impact client choices, the consultant can nevertheless offer several different options and make recommendations based on preliminary analyses and risk assessments. Unless the client is constructing their building from scratch, security options will also depend on the limitations posed by the structure and its architectural and interior design. Using an example of a medical clinic in a small city, the following aspects of physical and information security will be taken into account when making client recommendations.

Building Security

Building security begins with a thorough assessment of the architectural blueprints, and takes into account building materials too. Security is not just about protection from intruders, vandals, or thieves, but also from natural and environmental hazards. All points of potential weakness or vulnerability should be taken into account first. In this case, an abundance of windows is the first point of vulnerability that needs to be addressed. The type of glass used on those windows, and their locking mechanisms will determine the best measures to take regarding the installation of alarm systems if warranted, or the upgrading of locks.

The medical clinic has one main entrance with a large double door, plus two back entrances. There is no basement, which is good from a building security standpoint. If there were laboratories in the basement, it would present specific challenges. In this case, the main issues are with the need to install CCTV in as many areas as possible inside, coupled with strategically placed external cameras. Because this is not an in-patient clinic, there is also the possibility that an alarm system is...…There are layers to the perimeter (IFSEC Global, 2018). At this property, there is the initial boundary between the public walkway and the building, which is an even, well-trimmed hedge. Then, the parking lot essentially serves as another layer. After that, the building has a perimeter hedge. There is a high wall at the back of the property that is vulnerable. This is where the client should focus, perhaps by installing barbed wire or at the very least installing additional cameras.

Information Systems and Technology Security

Although information systems and technology security are complex issues that need to be handled separately from physical security, it may be possible to accommodate this client. Medical services depend on accurate, safe information systems. Patient data is highly sensitive, and must also be kept safe from intruders. In addition to protecting the physical hardware, the client needs to make sure they have redundant backups of all patient data, inventory, and billing…

Sources Used in Documents:

References

IFSEC Global (2018). Perimeter security: the big picture. https://www.ifsecglobal.com/perimeter-security-the-big-picture/


Cite this Document:

"Security For A Building Including Access Control" (2018, March 03) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/security-building-including-access-control-term-paper-2177583

"Security For A Building Including Access Control" 03 March 2018. Web.20 April. 2024. <
https://www.paperdue.com/essay/security-building-including-access-control-term-paper-2177583>

"Security For A Building Including Access Control", 03 March 2018, Accessed.20 April. 2024,
https://www.paperdue.com/essay/security-building-including-access-control-term-paper-2177583

Related Documents

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Security Management at Aviation and Healthcare Sectors Security Management Essay This paper discusses the concept of aviation security management and security management at healthcare settings. In addition to that, this paper also lists down and describes the important factors that can have an influential impact on the functions of aviation and a healthcare security manager. Security Management at Aviation and Healthcare Sectors Aviation Security The general aviation security confronts a number of security challenges. The

Security in Cloud Computing
PAGES 10 WORDS 3274

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

Organizational security strategies must be designed for agility and speed through the use of state-of-the-art systems that can quickly be reconfigured to match changing roles in an organization. Organizational security will be defined through role-based access, configurable through authenticated, clearly delineated processes that can be administered at the administrator level (Hone, Eloff, 2002). The organizational security strategy will also be designed on the empirically validated Confidential, Integrity and Availability (CIA)