Free

Course Project Phase Two Deliverable Security Lighting in the Fennelly textbook - Essay Example

Comments (0) Cite this document
Summary
Lexington Financial Center (also known as 5/3 Bank or the big blue building) is located at 250 West Main Street in the city of Lexington, state of Kentucky, zip code 40507, in the country of U.S.A. This facility is approximately located between 251 West Vine Street and 250 West…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Course Project Phase Two Deliverable Security Lighting in the Fennelly textbook
Read TextPreview

Extract of sample "Course Project Phase Two Deliverable Security Lighting in the Fennelly textbook"

PROJECT PHASE TWO DELIVERABLE due: Lexington Financial Center (also known as 5/3 Bank or the big blue building) is located at 250 West Main Street in the city of Lexington, state of Kentucky, zip code 40507, in the country of U.S.A. This facility is approximately located between 251 West Vine Street and 250 West Main Street at 100 South Mill Street. This building is approximately 357,361 square feet, with a tip height of 124.97m, architectural height of 124.97m, roof height of 124.97m, thus, making it a skyscraper. This facility contains 31 floors and its construction ended in the year 1987. Its structural material is steel, exterior finishing material making-up the facade of the facility is tinted glass, and the facade color is blue. The architectural style of this building is modernism. The developer responsible for design and construction of this facility is The Webb Companies. The existing building status of this facility is completed. Currently, the main usage of this building is the Fifth Third Bank and other financial institutions.
The general vicinity of the facility is at the neighborhood of downtown Lexington. Facilities around the building include bars, hotels, and restaurants i.e. Al’s Bar, The Lunch Box, Tolly Ho, Wingspan Gallery, Holiday Inn Express Hotel & Suites Lexington- Downtown/University, Courtyard Lexington North, Crowne Plaza Hotel Lexington-The Campbell House, Residence Inn Lexington North, and Inn On Broadway. The facility is surrounded by numerous socialization centers, thus risk-based prioritization prompts the general security of this building. This calls for physical security asset control.
This facility has to be protected since it holds several financial institutions. It must be noted that financial institutions have the ability to disrupt the broader financial system if they fail. Thus, the attack or compromise of this institution leads to financial risk, thus triggering economic growth which will lead to a financial crisis, which will create a significant negative impact to the average U.S. citizen. Lexington Financial Center offers the following products or services: real estate management services, condominium property management, leasing property management, residential real estate property management, and real estate property management companies.
No, there have been no substantial security incidences at the facility in the last 2-3 years. This shows that the facility is well protected; high standards of security are maintained in this building. According to my findings from observation on the facility; the guards work round the clock and they are very keen on any new occurrence. Universal protection service is a private guard force that protects this facility. The facility contains existing technologies in enabling key security services i.e. covert CCTV security systems and remote security monitoring, access control, panic alarms, power failure, lone-man working alarms, air-con failure, flood and fire alarm signals, and intruder alarms. In addition, IT and networking security solutions are beneficial to this company thus offering comprehensive security, for instance, proximity readers and biometric solutions. The private security company is responsible for maintaining high security levels in the organization. Without this, critical data, intellectual property, assets, corporate security and property are at risk.
Pictures of Lexington Financial Center


Physical Security Survey (3.B)
Exterior physical characteristics: perimeter grounds
1. What types of locks and chains are used to secure the gates?
2. Have unnecessary gates been eliminated?
3. Do you regularly check those gates that are locked?
4. Are blind alleys near buildings protected?
5. Are fire escapes and exits designed for quick exit but difficult entry?
6. Is the perimeter reinforced by protective lighting?
7. Has shrubbery near windows, doors, gates, garages, and access roads been kept to a minimum?
8. What are the physical boundaries of the residence’s grounds?
9. Does lighting illuminate all roads?
10. Is proper signage in place?
Exterior doors
1. Are all doors strong and formidable?
2. Are all door hinge pins located on the inside?
3. Are all door hinges installed so that it would be impossible to remove the closed door(s) without seriously damaging the door or jam?
4. Are all locks working properly?
5. Are all doors properly secured or reinforced?
6. Are all unused doors secured and alarmed?
7. Are the keys in possession of authorized personnel?
Exterior windows
1. Are nonessential windows bricked up or protected with steel mesh or iron bars?
2. Are all windows within 14 feet of the ground equipped with protective coverings?
3. Are the bars or screens mounted securely?
4. Do these windows with locks have locks designed and located so they cannot be reached or opened by breaking the glass?
5. Is security glass used in any of these windows?
6. Are unused windows permanently closed?
Exterior lighting
1. Is the lighting adequate to illuminate critical areas(alleys, fire escapes, ground level windows)?
2. Is there sufficient illumination over entrances?
3. Are the perimeter areas lighted to assist police surveillance of the area?
4. Are the protective lighting system and the working lighting system on the same line?
5. Is there auxiliary system that has been tested?
6. Is there an auxiliary power source for protective lighting?
7. Is the auxiliary system designed to go into operation automatically when needed?
8. Are the protective lights controlled automatically by a timer or photocells or is it manually operated?
9. What hours are this lighting used?
10. Does it use a switch box (es) or is it automatically time secured?
11. Can protective lights be compromised easily (e.g. unscrewing of bulbs)?
12. What type of lights are installed around the property?
13. Are they cost effective?
14. Is there an even distribution of light?
Interior lighting
1. Is there a backup system for emergency lights?
2. Is the lighting provided during the day adequate for security purposes?
3. Is the lighting at night adequate for security purposes?
4. Is the night lighting sufficient for surveillance by the local police department?
Security Officers Checklist (3.D)
1. Have you determined whether or not you have limited security requirements?
2. Have you checked with a local law enforcement official for recommendations?
3. Have you checked with colleagues who use security services for recommendations?
4. Does the agency have a career program for its security officers?
5. Do the guards meet educational and criminal background checks?
6. Have you discussed any special training required to accomplish the assignment, such as firearms, CPR, fire safety, and first aid?
Office Security Checklist (3.E)
1. Do you restrict office keys to those who actually need them?
2. Do you keep complete, up-to-date records of the disposition of all office keys?
3. Do you have adequate procedures for collecting keys from former employees?
4. Do you secure all computers and similar equipment with maximum security locks?
5. Do you restrict duplication of office keys, except for those specifically ordered by you in writing?
6. Is a responsible person in charge of issuing all the keys?
Reference
Fennelly, L. J. (2013). Effective physical security. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Course Project Phase Two Deliverable Security Lighting in the Fennelly Essay”, n.d.)
Course Project Phase Two Deliverable Security Lighting in the Fennelly Essay. Retrieved from https://studentshare.org/human-resources/1637433-course-project-phase-two-deliverable-security-lighting-in-the-fennelly-textbook
(Course Project Phase Two Deliverable Security Lighting in the Fennelly Essay)
Course Project Phase Two Deliverable Security Lighting in the Fennelly Essay. https://studentshare.org/human-resources/1637433-course-project-phase-two-deliverable-security-lighting-in-the-fennelly-textbook.
“Course Project Phase Two Deliverable Security Lighting in the Fennelly Essay”, n.d. https://studentshare.org/human-resources/1637433-course-project-phase-two-deliverable-security-lighting-in-the-fennelly-textbook.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Course Project Phase Two Deliverable Security Lighting in the Fennelly textbook

Lighting

...them as “polar auroras” (or aurorae polaris)” (Polar zone, n.d.). All types of aficionados all over the world and from all walks of life come and gather to this part of the world to enjoy looking and appreciating a “no man-made” awesome sights in the sky. Aurora borealis generally appears as luminous arches or streams of light in the Northern regions of the earth showing different movements of lights in variety of shapes projected in several elegant colors in the sky (“Facts and Info”, n.d.). Most importantly, the visual effects that the northern lights give as it overcasts the horizon and serves as a fantastic backdrop are what these people are after. On the other hand,...
5 Pages(1250 words)Term Paper

Project deliverable 1&2 & PowerPoint

...of project In order to ensure that the project provides the targeted or expected deliverables within the set out time frame, the project scope entails coverage of the following very essential areas. A well designed and integrated web analytic software application will be developed. Due to time constraints, only the following modules will be focused on. A dashboard module will be tasked on provision of a bird’s eye of all data captured, processed and those under processing. A visitor’s module will deliver variables of all those visitors of a web page. Thirdly, an action module will be used at adding a web page, deleting it or doing modification as specified in the module...
6 Pages(1500 words)Assignment

Finance Project Deliverable

...TABLE IC11 ALLIED'S LEMON JUICE PROJECT (TOTAL COST IN THOUSANDS) END OF YEAR: 0 2 3 4I. INVESTMENT OUTLAY EQUIPMENT COST 200 INSTALLATION 40 INCREASE IN INVENTORY 25 INCREASE IN ACCOUNTS PAYABLE - 5 TOTAL NET INVESTMENT 260 II. OPERATING CASH FLOWS UNIT SALES (THOUSANDS) 100 PRICE/UNIT $ 2.00 $ 2.00 $2.00 $2.00 TOTAL REVENUES $200 $200_ $200_ $200.0 OPERATING COSTS, EXCLUDING DEPRECIATION $120.0 $120.0 $120.0 ...
2 Pages(500 words)Essay

Project Deliverable 6B

...actively supports improvements in each of the seven component areas: framework, tools, project management skills, thinking, culture, politics, and communication. The timeline is reasonable and do-able. The phased rollout supports early success and continued improvement. The project includes a lengthy implementation as components are developed and implemented, followed by sustained competency and improvements in the seven component areas. The management assigns key project roles and adequate budget for the development and implementation of this project. Effective, adequate, and appropriate levels of communication occur between the management, the...
3 Pages(750 words)PowerPoint Presentation

Chapter 3, Security Surveys and the Audit, in the Fennelly textbook

... threats from airborne pathogens and illegal immigrants, to concealed weapons (Fennelly, 2013). 2) Where would the implementation of these technologies be acceptable? The implementation of the covert security scanners is acceptable wherever imminent threat to human lives is constant, either directly or indirectly. Such locations include airports, academic institutions, the Mexican border, entries to prominent buildings like major banks and the white house. 3) Would the implementation/testing be permissible for the private sector? As indicated earlier, these security systems are a necessity wherever there is a threat to human life. Statistics indicate that more security threats occur in the private sectors than the public ones... that...
2 Pages(500 words)Essay

Writing Assignment #2 Fence Standards, from the Fennelly textbook

...(Finnelly, 2012, 96). 3. These barriers act as a warning sign to people to not try to enter specified areas. Locks The type of locks needed in facilities that require secrecy and confidentiality are dependent on a combination of correlated factors that involve design, installation, manufacturing, and system maintenance (Fennelly, 2012). In addition, not all locks are applicable in most situation, specifically designed locks are usually used in specifically provided situation, hence sufficient knowledge of basic principles of locking systems are inevitable. Lighting Consideration Security lighting is an effective deterrent method. Attackers will never enter a well-lit...
3 Pages(750 words)Essay

Course Project

...Project - Employee Performance development ABS is a company specialising in computer hardware which is suffering loss since one year. The organisation plans to improve the productivity of the employees primarily by assessing performance .The organisation can only succeed if it has potential employees and this needs proper assessment. The human resource department of the company has the core responsibility to improve the performance of the employees. The human resource manager will direct his department to assess the profile of employees and they need to observe the working pattern. The problem Statement The employee performance need to be evaluated as the productivity of the employee is seen as a problem due conflicts, layoffs... on...
1 Pages(250 words)Essay

Course project

... December 29, Accounting Cycle Introduction Several nonprofit organizations normally implement humanitarian activities. The paper delves on one of the Qatar’s well known nonprofit organizations. The paper focuses on the company’s financial reports. The company’s financial report adheres to IFRS accounting standards. Non Profit Organization The Qatar Red Crescent Society is the Qatar branch of the global Red Cross nonprofit organization. The company survives on donations, qualifying it as non-profit humanitarian organization (Table 1). The organization is not a branch or part of the government’s structure. The organization delivers fast humanitarian help and support to communities within the Qatar community. The same... December 29,...
2 Pages(500 words)Essay

Course Project

...Decision-making Table of Contents Table of Contents 2 Decision-making Executive summary For any business entity to achieve their desired goals, decision making is supposed to be in the front line. In this case the course executive summary is a key factor in this area. The executive summary is important to determine the general overview of a course project. In this course project, the major thing is to analyze emergency risk that is flooded. The flood as a natural calamity is a disaster that can only be managed if the correct measures are taken to control its effects. Many people loss their life, property, and sickness such as malaria cholera become...
6 Pages(1500 words)Coursework

Organizing a project deliverable

...Organizing a Project Deliverable al Affiliation Organizing a Project Deliverable Employee morale is a necessity for organizational success. The aspect to focus on in unit 5 is identifying the issues resulting in the reduction in employee morale and the solutions to these problems. Identification and elimination of these problems from the organization will maximize productivity through the increase in employee morale. Motivating employees is essential for the organization and this deliverable aims at focusing on the conduction of the research. Employees will be the first-hand information for the research since they understand better the problems they...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Course Project Phase Two Deliverable Security Lighting in the Fennelly textbook for FREE!

Contact Us