Components of Physical Security
Steven Looney
Student ID: 4168626
SCMT397 Physical Security
Professor Robert D Baker
October 25, 2011
Components of Physical Security
In physical security, there is no one measure that can fulfill all security needs for any one facility. Therefore, security measures must be designed in layers. According to Lawrence Fennelly “physical security is the most fundamental aspect of protection, it is the use of physical controls to protect the premises, site, facility, building, or other physical asset” (2004). The many components or layers of security measures are what make up good physical security. The assets being protected and the nature of the threat to the asset will dictate the amount of physical
…show more content…
Most nuclear facilities must protect against a vehicle carrying a set amount of explosives. Therefore, a vehicle barrier system must be a part of their physical security to protect the facility. Natural barriers can also be effective as perimeter barriers. Natural barriers are natural land marks used as a perimeter barrier, such as lakes, rivers, cliffs, and difficult terrain. The effectiveness of a natural barrier depends on the type of natural barrier it is, and how it is used in physical security measures. Therefore, Lawrence Fennelly offers this example to explain how the type and usage of a natural barrier can affect the effectiveness of the barrier, “a body of water may be very effective in keeping pedestrian traffic away from your property but not very effective at keeping boat traffic from your property” (2008). Man-made barriers can also be placed to enhance the natural barrier, like in the example a wall or fence can be placed in the area to keep boat traffic away from the property. Just like man-made barriers, natural barriers can also be overcome, therefore they should be monitored at all times. The facility grounds between the perimeter and the assets being protected can also be used as part of the physical security of that facility. These areas can be very effective as buffer zones if kept cleared, and monitored. Buffer zones can also be very effective for facilities that have to protect against forced entry by armed adversaries. These buffer
Ensuring that physical access to the device you want to secure is restricted to authorized personnel.
• This layer deals with the physical aspects of the campus. For example, heating, cooling, power, access controls to secured
For asset protection from internal theft, the store uses cameras and internal staff to monitor other staff to address this. Internal to external exists including ones in other parts of the building which are staff access only are also alarmed to prevent and deter internal theft.
(TCO 6) Many believe that the most important physical security control is _____. (Points : 5)
Physical security – are generally intended to deter potential intruders 9 e.g. warning signs and perimeter markings); to detect intrusions and monitor / record intruders (e.g. intruder alarms and CCTV systems); to trigger appropriate incident responses (e.g. by security guards and police).
Fencing is used when access to the site needs to be prevented. They can be used to prevent access to the public and the workers making them use a designated entrance to site. This will make sure the members of the public cannot wander
Commercial buildings have increased their security measures due to bombings and terrorist attacks. Generally, they have security policies and an emergency management program that includes evacuation procedures. As far as access control is concerned, they have a reception desk in the lobby to control access into the building, confirm appointments of all visitors and issue temporary ID badges, and issue identification cards to all personnel and tenants that have their photograph and signature (“Security Tips”, 2006). Commercial buildings require the use of I.D. cards for access and require that cards be displayed at all times on the premises (“Security Tips”, 2006). Additionally, shipping and receiving areas have restricted access and is monitored by closed-circuit television surveillance (“Security Tips”, 2006). Security personnel are suitably selected and trained.
What is the organizations overall stance? Should the Perimeter be more permissive or restrictive in its use?
These sea walls are a form of coastal defence which are constructed where the sea and associated coastal processes, impact directly on the landforms of the coast. The purpose of this sea wall is for protecting areas of human habitation, leisure activities and conservation from the action of tides and the waves.
In the way of comparing and contrasting. there are only two to look at. If there are levels of physical security but no technical security, there is a prime opportunity for breaches. The same goes for technical security but no physical security. Using a combination of physical and technical is the only way to protect the company.
Anyone could drive a vehicle that could possibly be containing something hazardous up to the terminal and just damage the airport itself. Large concrete barriers, designed to block vehicles up to the size of large moving trucks, can be deployed if a threat is detected. Loading zones, where people used to park their cars to get their baggage in or out of their vehicle, are now kept clear of traffic. No one is allowed to park and leave his or her vehicle within 300 feet of the terminal.
Creating a security plan for a specific type of transportation infrastructure begins with understanding the infrastructure. This can be accomplished by conducting a risk assessment. The risk assessment process, regardless of the model used, will establish several things including vulnerabilities of the infrastructure, the likelihood of a vulnerability being attacked as well as the consequences of an attack. Much like the objectives of security, these aspects of a risk assessment are distinct, however, when taken together a systems view of the infrastructure begins to emerge and potential methods to mitigate the effects of an
The security provides a feeling of safety and security for our people and makes individuals feel more safe as they walk in and our of different buildings around.
Factors that are the best sources for security determinations are considered by the offender’s gender, sex, age at their first conviction, disabilities and/or mental deficiencies are not caused by the offender and these factors are not likely to change. These permanent factors are natural to the offender and are stated as static risk factors. Static risk factors are the best basis for security determinations. Dynamic risk factors are an individual’s characteristics that can change and that are controlled or influenced by the criminal, for example, their work, drug addictions, motivation, and their family relationships. These features are very useful for treatment providers, but these features are not sound fundamentals for security determinations
Wouldn’t it be great if you could win the lottery or have a set in stone job that would yield material security for yourself and family? Having an excessive amount of money would certainly make life easier, but does it direct individuals to a “happy” and “successful” life? If you were to ask the general public about a person’s well being and the abundance of money, they could agree that they are completely two different things, but those who are pursuing a material security as the basis of success, would agree they are the same. As a result, many college students when choosing their career don’t think about the costs that come with material security as “success”. A career that provides material security often times affects a person’s health as it