StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Is of Major Concern to All Entities - Essay Example

Cite this document
Summary
The paper "Security Is of Major Concern to All Entities" highlights that the control panels have been designed such that users can use unique details to turn on or off the system. This is able to prevent intruders who are aware of the existing alarm system from adjusting its settings…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful

Extract of sample "Security Is of Major Concern to All Entities"

Running Head: ENTRY CONTROL Entry Control Insert Name: Course: Institution: Instructor: Date: Introduction Security is of major concern to all entities whether individual or corporate where the main objective is to protect their property. With the increased number of perceived threats, physical security has become a very important measure to ensure adequate protection of property and lives. In the modern world, security has been prioritized by most individuals and organizations as one way of protecting their interests and ensuring sustained progress in their operations. Physical security may exist in its simplest forms such as placing strong doors or complex forms such as installation of security devices such as cameras. Physical security systems are both pro-active and reactive where they either deter attackers from going about their business or assist in the identification of criminals and other trespassers (Fennelly, 2004). However, the pro-active role is much more common than the reactive and thus trespassers are quickly identified before they commit an act that will result into the damage of property. Entry point control refers to the physical equipment that restricts the movement of people or material within a designated area. The physical equipment may consist of locks, magnetic cards and security lighting among other security measures. These physical equipments make it difficult for individuals to make unauthorised entry to areas they are restricted from. Physical security also comprises of structural designs that are placed to withstand hostile acts directed towards a particular entity. These designs basically refer to the layout of the structural environment such that intruder threats are at a minimum as well as the risks they impose. Khairallah (2005) agrues that physical security therefore necessitates risk management where entities identify risky areas in their environment and undertake strict security measures to protect their property. Entry control systems aim to fulfil several objectives that pertain to physical protection. First, the systems are designed to ensure only authorised personnel gain access to a designated facility. Safety is thus ensured through restricted movements around and within the premises. Secondly, the systems detect and validate the entrance and dispatch of materials in and out of the premises. This ensures that the movement of materials within the entity’s premises is adequately authorised thus avoiding wastage and the presence of contraband material. Lastly, security systems provide the security staff with adequate information which they could use to respond to security threats or breaches (Brooksbank, 2007). The security personnel are able to gather adequate information which facilitates their choice of a course of action that is poses minimum risk to the entity’s operations. It is widely known that a system comprises of sub-systems that are interdependent and it is no different in security systems. Physical security exhibits four layers which are environmental design, electronic controls, video links and intruder detection (Capel, 1999). These four layers cover the entire premises to ensure adequate barriers for intruders as well as minimum damages. Environmental design addresses the exterior of the structure and includes the setting up of walls and placing razor wires around the premise’s perimeter. Electronic controls include the use of electronic doors or systems that control key access points. Video linkages are installed and used to confirm an incident as well as provide evidence to a particular incident. Lastly, intruder detection systems act as a response measure where they set off in the event of intrusion to alert the security officials of a breach in the security of the premises. Closed-circuit Televisions (CCTV) Closed-circuit television is the use of video cameras to monitor operations within premises. The video cameras are linked to a set of computer monitors where security officials inside the organizations are able to view the external operations of individuals surrounding or within the premises. Images captured by the cameras are transmitted to a central source where they are then provided for viewership by the security officials. The signal transmission mode differs from television signals in the sense that it is limited within the entity and in some instances it can be wirelessly transmitted. Closed-circuit televisions are effective in conducting surveillance in highly sensitive entities and areas such as banking halls and storage areas. These physical security devices are applicable across industries irrespective of their operations. Although the televisions are mainly associated with security, they can also be employed to observe certain operations that are dangerous to human presence (Schumacher et al, 2006). The security system is the most widely adopted security measure in developed nations where they are placed across streets to ensure public safety. They are linked to the police stations where officers are able to view events unfolding along a particular street or area. Their ability to provide evidence enables them to act as effective systems towards the capture of law offenders. Merits of CCTV’s Closed-circuit televisions accrue numerous benefits towards addressing security issues in a particular entity. To begin with, closed circuit televisions are able to view a wide area and thus give security officers a glimpse on the activities within a large area. This means that fewer television systems have to be installed within a particular area thus reducing security costs. Secondly, the systems are electronically managed where security officials can change the viewing angle to observe a particular area. Therefore, one camera can view several areas as identified by the security officials. This is more effective especially where all the major security areas are located closely. Thirdly, these systems are able to record data which is received through the cameras. Data collected through the camera devices is transmitted to the security officials who are able to view the external situation around the premises. Simultaneously, the officials can be able to record the data for further reference of to provide evidence of an event that breached the entity’s security measures. Fourthly, unlike other security systems, closed-circuit televisions ensure 24 hour surveillance and thus security threats can be easily detected. Intruders who pose a threat within the premises are able to be identified through these systems. The system is able to capture their images which can be lifted to assist detectives in their investigations. Finally, closed-circuit televisions are easily concealed thus making it difficult for intruders to identify their locations (Anderson, 2008). Disadvantages of closed-circuit televisions On the other hand, closed-circuit televisions are limited in their applicability and thus they do not guarantee security. These televisions are electronically powered where in the event of an electrical blackout the security systems are incapacitated from performing their functions. Secondly, images captured by mounted video cameras are usually blurred thus making it difficult for security officers to really understand what is happening in the area covered by the cameras. The lack of clarity makes it really difficult for security officers to monitor activities around the building thus rendering the system inefficient in enhancing security within the premises. Thirdly, closed circuit televisions require adequate security staff who will constantly glance at the monitor to ensure the premise’s security measures are not compromised. This is a very tedious job which is time consuming and can cause major security lapses if the officer is distracted for a short while. Furthermore, the high number of personnel required to ensure the effectiveness of this system is unrealistic to the managers who would rather employ other security resources to safeguard their property. Fourthly, professional intruders are aware of these systems and their weaknesses where they can successfully exploit these shortcomings. They are able to manipulate the system which further misleads the security officials thus leading to the successful commitment of an attack. Furthermore, intruders can use these systems which they undoubtedly have access to in order to view the operations of the security officers as well as their least areas of concern. These areas will give them an entry point into the facility thus posing a security threat to the premises and its occupants. Lastly, closed-circuit televisions are not only installed to prevent external threats but also internal security threats (Honey, 2007). However, the system cannot effectively control internal security breaches since the internal employees are aware of all the spots covered by the system and can therefore use it against itself. They can be able to ‘cheat’ the system and thus compromise the security measures applied by the organization. Alarms Systems Alarms are the most commonly used security devices around premises be they businesses or homes. Alarms find much favour with security officers because of the ease in their use and their diversity in covering several security events. There are fire alarms, burglar alarms and safety alarms among other common types of alarms. Alarms are able to alert security agents on an impending security issue and thus they facilitate the officer’s quick response. Alarms find favour among the users due to the ease in installing control panels where the user can easily access. Further to this, the control panel is concealable such that intruders cannot figure out its location hence making it easy for the user to tip off the alarm (Anderson, 2001). Alarms are largely employed in financial institutions and at homes where intruders randomly storm the entity thus giving the occupants little time to run for safety. Alarms are distinguished mainly by their areas of application namely; indoor or outdoor. Indoor systems are installed within the premises in areas that are potential to intrusion whereas outdoor systems are installed along the perimeter wall that surrounds the premises. These alarms are able to sensor motions within the covered area and thus tip off to alert the occupants or officers. Benefits of Alarms Alarms are beneficial in enhancing security within premises since they are able to alert the occupants on a major security threat and thus engage their disaster management program. Firstly, alarms are able to alert security officials on security issues whenever they happen hence enabling them to quickly react to the situation. This ensures minimum damage is caused to the premises, its property and occupants. Organizations therefore suffer minimum damages caused by the threat and are able to improve on the security affected areas (Gustin, 2005). Secondly, alarms vary in their areas of application such that their designs are suitable to their operational environment. Indoor alarms vary in their modes of operation thus making it difficult for intruders to know their precise model and their location. This makes the alarm systems effective in deterring intruders from gaining entry into the premises. Outdoor alarms such as motion sensors are able to detect motions within the compound which sets them off thus alerting the occupants and security guards. Thirdly, alarms vary in their tip off systems where some use radio frequencies while others emit and senses microwaves from both the transmitter and receiver. This diversity gives the user the ability to choose the security system they are most comfortable with. Lastly, alarms have minimal chances of setting off as false alarms and can be placed well above the reach of intruders (Pearson, 2006). This ensures that the alarms are adequately protected and intruders have no option but allowing themselves to be detected. Limited false alarms make the systems reliable and effective for the users who can be able to find peace knowing that they are safe. Limitation of alarm systems Although alarms are the most favoured security systems, they have a number of limitations that inhibits their adequate applications in all premises. Their reliability comes at a price which results to the increased prices required to purchase a single unit of the system. This makes it impossible for consumers to purchase the product opting for cheaper security systems that may inform them of an impending danger even if they are not reliable. Secondly, outdoor alarms cannot be placed near high powered electricity lines or airports since this will affect their trigger system thus setting it off without any security breach. High powered lines will interfere with the system’s ability to transmit signals thus rendering them ineffective and unreliable. Thirdly, the systems are bound to age thus reducing their effectiveness. Aged alarm systems may be prone to issuing false alerts which might cause unwarranted panic within the premises. This means that the alarms have to be frequently inspected which increases the maintenance costs. Fourthly, some alarms might be highly sensitive and thus make it almost impossible for the users to use them as they frequently set off at the most slightest of movements or other minor security breaches. These alarms tend to limit the freedom of the users thus deciding to reject their usage within their premises. Lastly, intruders can be able to manipulate these systems by causing false alarms which eventually leads the user in switching it off (Phillips, 2002). This gives the intruder the leeway to go ahead with their activities unperturbed of drawing unwarranted attention. Examples of Ways Used to Overcome Security Systems To overcome the system, individuals have to identify their weaknesses and capitalise on them thus beating the system towards ensuring security. For the closed circuit televisions, external intruders are always alert and might visit a premises a number of times before conducting a major attack. These visitations are aimed at identifying the location of the cameras and strategise on how to avoid being noticed by them. They may also wear heavy clothing thus making it impossible for the cameras to capture their facial details (Nordquist, 2002). Internal intruders are very able to overcome the system’s purpose since they are aware of their locations. To avoid them they walk along the side in which they are mounted and thus pass the entry point undetected. For the alarm systems, intruders are able to create a number of false alarms to convince the user of the system’s malfunctioning. The users eventually switch the system off thus gaining entry into the premises. Technological Improvements Technological developments have been made towards improving modern closed-circuit televisions where they are able to be controlled semi-automatically through computers. The integration of Video Content Analysis enables these systems to identify the composition of a moving object as well as its features such as an object’s colour (Watson, 2007). These cameras are further able to take images within a given area according to the recommended settings. The size of closed-circuit cameras has also reduced significantly to ensure that they are more concealable and undetected to the intruder. Alarm systems have also seen major technological developments to increase their effectiveness and reliability. The control panels have been designed such that users can use unique details to turn on or off the system. This is able to avoid intruders who are aware of the existing alarm system to adjust its settings (Mueller, 2005). Continuous improvement of the systems is very crucial towards enhancing security as intruders develop their modes of entering premises undetected. References Anderson, R. (2001). Security Engineering: A Guide to Building Dependable Distributed Systems. Seattle: Wiley Pub. Anderson, R.J. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Ed. Seattle: John Wiley & Sons. Brooksbank, D. (2007). Security Manual, 8th Ed. Kansas: Gower Pub. Ltd. Capel, V. (1999). Security Systems & Intruder Alarms, 2nd Ed. Denver: Newnes. Conrath, E.J. (1999). Structural Design for Physical Security. Boston: ASCE Pub. Fennelly, L.J. (2004). Effective Physical Security, 3RD Ed. Michigan: Butterworth- Heinemann. Fennelly, L.J. (2003). Handbook of Loss Prevention & Crime Prevention, 4th Ed. Michigan: Butterworth-Heinemann. Gustin, J.F. (2005). Bioterrorism: A Guide for Facility Managers. South Carolina: The Fairmont Press, Inc. Honey, G. (2007). Intruder Alarms, 3rd Ed. Alaska: Newnes. Khairallah, M. (2005). Physical Security Systems Handbook: The Design & Implementation of Electronic Security Systems. Michigan: Elsevier/Butterworth-Heinemann. Mueller, J.P. (2005). The Savvy Guide to Home Security. Ohio: Indy Tech Pub. Nordquist, M. (2002). Towards Improved Security Management Practice. New Jersey: Univ.-Pub. Pearson, R.L. (2006). Electronic Security Systems: A Manager's Guide to Evaluating and Selecting System Solutions. Denver: Butterworth-Heinemann. Phillips, B. (2002). The Complete Book of Electronic Security. New York: McGraw-Hill Prof. Schumacher, M., Buglioni, E.F., Hybertson, D., Buschmann, F. & Sommerlad, P. (2006). Security Patterns: Integrating Security & Systems Engineering. Seattle: John Wiley & Sons. Watson, S. (2007).The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness. Michigan: Butterworth-Heinemann. Walker, P. (1998). Electronic Security Systems: Reducing False Alarms, 3rd Ed. Alaska: Newnes. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Physical Security Essay Example | Topics and Well Written Essays - 2250 words, n.d.)
Physical Security Essay Example | Topics and Well Written Essays - 2250 words. https://studentshare.org/engineering-and-construction/2043752-entry-control-physical-security
(Physical Security Essay Example | Topics and Well Written Essays - 2250 Words)
Physical Security Essay Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/engineering-and-construction/2043752-entry-control-physical-security.
“Physical Security Essay Example | Topics and Well Written Essays - 2250 Words”. https://studentshare.org/engineering-and-construction/2043752-entry-control-physical-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Is of Major Concern to All Entities

Can the concept of security be defined should it be

This paper begins by questioning what security is and identifying its conceptual difficulties.... After World War (WW) II, the nuclear arms race between the US and the former Soviet Union produced myriad strategic concepts characterized by the balance of power, bipolar world, containment and deterrence comprising the major issues during the Cold War.... Can the concept of security be defined, should it be?... Abstract This essay analyses whether the concept of security can be or should be defined....
25 Pages (6250 words) Essay

Privacy-Enhancing Security Mechanisms

The major concern of every person is that the data should reach the desired person properly.... Problem Statement The problem statement for the research paper is: "Design and analysis of privacy-preserving network and cryptographic protocols" Conceptual Framework Aim of the Research In realistic networked environments, data security is the main focus of the management.... There exist many privacy enhancing security mechanisms that ensure secure delivery of data to the intended location....
3 Pages (750 words) Research Proposal

Security Threats That Face People Online

The Trustmark used in finding out whether the service provider or products have met all the requirements is said to be tamper proof and therefore very safe.... It is highly important that all the parties on the internet appreciate the need for being trustworthy in their online operations.... The paper "Security Threats That Face People Online" delves into the concept of online security which is indeed a very fundamental concern in the present world....
4 Pages (1000 words) Essay

Effectiveness of the Department of Homeland Security

Mexico border that stretches about 2,000 miles from San Diego, California to Brownsville, Texas has been of great concern to the United States.... ecurity has become a major concern in the United States today more than ever.... he Department of Homeland security is a very important agency in the United States.... n evaluation of the Department of Homeland Security's responsibilities, entities, actions, and effectiveness with respect to securing the southern U....
8 Pages (2000 words) Research Paper

Department of Homeland Security Act of 2002

There is no single department in the US government that addresses solely this major concern of the American society.... Tom Ridge stated that the creation of the Department of Homeland security is the result of the most significant transformation of the US government in over a half-century.... nsure that the functions of entities transferred to the Department that are not related directly to securing the homeland are not diminished or neglected except by a specific explicit Act of Congress ...
5 Pages (1250 words) Essay

Introduction to IT Security Management

he number one enemy to all email users has got to be spam.... Security measures implemented to reduce risk will vary among covered entities.... Covered entities should consider each potential threat and vulnerability combination and rate them by likelihood (or probability) that the combination would occur.... or covered entities, the most common outcomes include, but are not limited to: ... ll of these outcomes have the potential to affect the confidentiality, availability and integrity of Electronic storage media created, received, maintained, or transmitted by covered entities....
14 Pages (3500 words) Literature review

Security as a Contested Concept

The evolution associated with security paradigm as well as the shifts in the security conception, all based on various theoretical assumptions alongside the political ones, are claimed to be not only closely associated with the notable historical revolution that was experienced in the international system, but also the fundamental intellectual progress in the interpretation.... Civil wars increased and diseases, human rights abuse, violence and hunger were all noted to have been masked by the policies of traditional security highlighting failure of the state to meet its primary objective....
7 Pages (1750 words) Literature review

A Security Evaluation of Personal Information Management

Where possible, password alongside biometric features is used to ensure that information security is guaranteed.... Encryption does not always to incorporate extremely complicated technologies as those used by organizations and other corporate entities but any unique way of securing information to limit access by unwanted people.... For instance, it would extremely hard for one to imagine that the concept of encryption can be applied on securing information at a personal level; mostly, encryption is often associated with organizational entities and government parastatals which often have huge volumes of information to safeguard....
9 Pages (2250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us