StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Physical Security System Design - Essay Example

Cite this document
Summary
The paper "Physical Security System Design" describes that security guards and cameras can guard the perimeter or interior, rational in terms of the above levels, and trying to device 2 or 3 physical security procedures at each level, which will aid in the implementing of suitable security actions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Physical Security System Design
Read Text Preview

Extract of sample "Physical Security System Design"

Physical Security System Design Physical Security System Design Introduction Physical security defines security events that are intended to deny entrance of illegal personnel. This includes invaders or even unintended intruders, from actually accessing a stored information, facility, building, and resource. This calls for direction on how to plan structures to counterattack potentially intimidating actions. It is basically concerned with limiting physical contact by unauthorized personnel to controlled amenities, even if there are other deliberations and circumstances in which physical security actions are appreciated. For instance, reducing contact within a facility or to a given assets, and environmental controls to limit physical instances e.g. flood and fires (Gouin, 2007). Security unavoidably incurs charges and, in actuality, it won’t be perfect or whole. This implies that, security can limit but will not totally eradicate threats. Due to this, robust physical security uses the idea of defense in complexity using a suitable blend of coinciding and harmonizing controls. It is to the security engineers, architects and specialists to stabilize security controls in contrast to risks, considering the costs of stipulating, managing the control, implementing, using , testing, developing, managing, along with broader aspects such as safety, health, aesthetics, human rights, and communal norms or conventions.. Design of a burglary physical security system. Burglary and robbery from built-up premises levy an important charge to the community. The familiarity of being robbed is sometimes troubling one for victims left violated, unsafe, and angry in individual’s home. Common burglaries happen in the daylight hours, as most homes are often empty. Though, it is important to safeguard that the home is safe at all times (Purpura, 2013). Burglary is the act of which is unlawful access into a structure for the reasons of committing a felony. Normally that offence will be stealing. A number of choices to consider may exist, where there is no best solution to satisfy a given set of solutions. Deterrence: The main purpose of these is to assure potential invaders that the likely charges of attack surpasses the value of engaging the attack. The connection of layered security structures creates the occurrence of territoriality. The early layer of security for an office, building, campus, or other given physical space applies crime deterrence through environmental establishment to discourage threats. (Purpura, P. 2013) Access control: The other layer that is mechanical including locks, doors, and gates. Key regulator of the locks results into a problem with big user inhabitants and given user turnover. Keys rapidly become incontrollable, often obliging the embracing of electronic and automated access control. Electronic and automated access control cheaply manages big user residents, regulating for user life-cycles dates, times, and individual access points. For instance, the occupants are allowed access right from 0600h to 2100h each day. The use of processes, procedures, and policies may be the other form to manage the entrance into the constrained area. A good example for this is the placement of an individual in conducting security checks for lawful access at preset points of entrance. This type of contact control is normally appended by the former forms of access (Fennelly, 2012) According to Garcia, M. L. (2007), detection is the third layer, which includes invasion detection unity or alarm systems. It triggers a reaction when illegal access is noticed. It comprises of sensors which includes contact sensor, motion sensors, and glass shatter detectors. In some controls, law implementation will not react to alarms from invasion detection unit unless the initiation has been verified by an onlooker or video. Strategies like this one have been generated to combat the 94–99% rate of wrong alarm initiation in the United States. Identification: also known as video monitoring unit. Surveillance cameras can be a constraining in many circumstances, but their real influence comes from occasional confirmation and chronological analysis. For instance, given that alarms are being produced and there a camera is in position, the camera can be seen to validate the alarms. In circumstances when an attack has already happened and a camera is in position at the point of strike, the chronicled video can be revised. Though the term closed-circuit television is mutual, it is hastily becoming old-fashioned as more video units lose the secure circuit for signal broadcast and are as a replacement for transmitting on IP camera nets (Baker, 2012) Human response: Entangled in these 4 layers are the users. Guards have a part in all the above layers, in the 1st as checkpoints and at patrollers. In the 2nd to manage electronic contact control. In the 3rd to react to alarms. The reaction force must be able to attain on site in little time than it is required that the invaders will require to break the hurdles. And in the 4th to monitor and scrutinize the video. Users apparently have a part also by interrogative and reporting distrustful people. Helping in detecting people as known against unknown are identification units. Often photograph ID emblems are used and regularly united to the electronic contact control unit. Guests are frequently obligated to wear a guest’s badge. (Gouin, B. 2007). Some physical security equipment: New progresses in ICT as well as new requirement on security executives, have broadened the range of physical security gadgets. Fire alarm systems are progressively becoming grounded on Internet Procedure, thus leading to them being available via local area network and wide area networks in a given organizations. Outbreak notification is now the latest standard in many activities, also physical security information management. Physical security information management solicitation incorporates all physical security units in a capacity, and makes available a single and complete means of dealing with all of these incomes. It thus, saves on time and cost in the successful administration of physical security. Territorial Reinforcement: The aim of Territorial Reinforcement is to inhibit illegal entrance and generate a clear division between public and private ownerships. This division is significant for two reasons; sincere occupants have a logic of possession and will notify of intruders. Territorial Reinforcement is not in any way same as perimeter security, but the objective of both is similar: keeping invaders off of the property. (Garcia, M. L. 2007). Inner Perimeter Security: Inner limit consists of the windows, walls, and doors of the premises. Protecting this is typically consummate with alarm systems, locks, and keys. The aim of keys and locks is to keep invaders out. An electronic and automated access control unit which is also a valuable tool to regulate the movement of traffic in and out of the inner limit. Lastly, the alarm system cautions when the perimeter is broken. When designing any limit security system, be keen not to lose regulatory of keys. If an illegal person can make duplicates of the keys minus your information, then the owner have a solemn security dimness (Purpura, 2013). Interior Security: Interior security is the last level of security and comprises of the interior of the building. Security cameras may be an effective tool for watching the interior of the business as well as taking substantiation of crimes for later examination. The interior is protected with motion indicators that will record the presence of invaders, security safeguards and undertake floor officers. Electronic and automated access control unit can also be engaged to regulate the movement of traffic within the ability and prevent illegal individuals from attaining access to restricted areas (Garcia, 2007) Conclusion Even though a great number of the means to offer perimeter and interior security connection, for instance, security guards and cameras can guard the perimeter or interior, rational in terms of the above levels, and trying to device 2 or 3 physical security procedures at each level, which will aid in the implementing of suitable physical security actions. References Fennelly, L. J. (2012). Effective Physical Security. Butterworth-Heinemann. Garcia, M. L. (2007). Design and Evaluation of Physical Protection Systems. Butterworth-Heinemann. Gouin, B. (2007). Security Design Consulting: The Business of Security System Design. Butterworth-Heinemann. Paul R. Baker, D. J. (2012). The Complete Guide to Physical Security. CRC Press. Purpura, P. (2013). Security and Loss Prevention: An Introduction (6 ed.). Butterworth-Heinemann. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Physical Security System Design Essay Example | Topics and Well Written Essays - 1250 words, n.d.)
Physical Security System Design Essay Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/design-technology/1820639-physical-security-system-design
(Physical Security System Design Essay Example | Topics and Well Written Essays - 1250 Words)
Physical Security System Design Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/design-technology/1820639-physical-security-system-design.
“Physical Security System Design Essay Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/design-technology/1820639-physical-security-system-design.
  • Cited: 0 times

CHECK THESE SAMPLES OF Physical Security System Design

Physical Tamper-Resistant Devices

While at level 3 we have an improved physical security system that can stop illegal access to systems and devices.... According to FIPS 140 security levels there are basically four levels of physical security management standards.... In this scenario, there are no such physical security devices at this level.... Such kinds of system are characterized through the outer device case design for solid access management scheme.... One of the basic goals behind the development of a secure and safe computer or information system is to make sure that a number of cryptographic keys can only be accessed and utilized by their intended users and simply for their proposed tasks....
3 Pages (750 words) Essay

The Issue of Redundancies Plus Backup Systems that Reduce Risk Occurrence in the Dam Sector

This change affects dam structures because parameters used during design will need adjustment to conform to the existing variables (Stewart et al.... Destruction would compromise the security of the nation in terms of safety or health.... The Homeland security Presidential Directive 7 (HSPD-7) has ensured the presence of a National infrastructure Plan (NIPP) leading to development plus improvement of backup systems (McGrath, 2011).... There exist information-sharing criteria in the Dam sector that pertain cyber and physical coercion plus procedures for protection....
1 Pages (250 words) Assignment

Physical security requirements

physical security hardens a building and makes it inaccessible to the unwanted publics.... Physical design determines the design of physical security.... Three concepts address the aspect of physical design.... Situational crime prevention is also a fact under design of the building.... These buildings are exposed to several security risks; terrorism, emergencies, crimes and disorders among others.... Every door in a tall building is supposed to have a working lock at all times for security of those using the different rooms....
3 Pages (750 words) Essay

Writing Assignment #2 Fence Standards, from the Fennelly textbook

The chain link fence is one of the… CPTED is a theory based on the appropriate design as well as effective usage of environments built that lead to a reduction in the cases of crime as well as an improvement in life quality.... Prior to the use or implementations of surveillance options, CPTED's theory indicates that the proper design, as well as effective use of built environments, can decrease crime.... design is one of the key factors before considering surveillance technology....
3 Pages (750 words) Essay

Network and Data Security of the Building

The measures include installing of cameras for monitoring, application of Crime Prevention through environmental design (CPTED),… ng surveillance devices, constructing outdoor barriers within or around the facility, use of locks, alarms, lighting the facility, controlling entry of persons into the facility among other factors.... Crime Prevention through environmental design involves a combination of psychological and physical aspects of a security situation and then considering the two simultaneously....
3 Pages (750 words) Essay

Safeguarding Your Data

This literature review "Safeguarding Your Data" presents information and data security that is a top concern for any company; however, in the case of our company it is even more vital since we design specialized programs that have important applications in industry and research.... The biggest risk we face is unawareness on our own part that the system we have might be insecure.... Unless we are perfectly aware of our own security situation as recommended by Schwarz (2006), we can not expect to figure out and locate various holes in the database system that need to be patched up....
5 Pages (1250 words) Literature review

Public Defense Measures Based on Safe Conditions

This means that by concept, only a small scale and simple security system should be set into place, the security analyst must consider the worst-case scenarios should a sudden influx of people and vehicular traffic come to exist in the area.... The concept is designed to deliver the most secure physical security for the building in its interior and exterior parameters.... The security analyst should consider the worst-case scenarios and make everything that can be done for the citizen's public defense....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us