Retrieved from https://studentshare.org/management/1673021-sam-488-unit-5
https://studentshare.org/management/1673021-sam-488-unit-5.
SECURITY MANAGEMENT Introduction The fundamental concepts of physical security and access control security remain constant. However,the tools to make these systems complete have changed with time. Today, there is high technology available to the security manager. The equipment, however, must be integrated into an operational system in which all the components work together. This paper aims at analyzing the factors of purchasing and installing the security devices, the visitor access control system, and environmental variables that ensure proper security operation.
DiscussionThe definition of the access control strategy is an integral part of the overall security policy. As argued by Fay (2011), the mechanism that defines the user access control is based on the elements that are necessary for an effective visitor access control system. Some of these elements include the access control directory, specific users, specific locations, and AICs principles. It is also important to note that these elements directly operate under the access control principles. In this case, the authentication provided by the user in the bind operation, when the security server receives a request that is defined in the server, allows or deny access to directory information.
The Selection, purchase, installation, and operation of security devices that promote restricted security for safety are very critical to the security system. In this case, the purchase and installation of the locking devices for security purposes also depends on a number of factors. Some of these factors include the security cameras to be used, type of the locking devices, card readers, and a proper response protocol (Fay, 2011).Motion detectors are employed to successfully guard an in-house perimeter that has proven highly unpredictable for a circuit alarms.
Using the reflective effects of certain waves, the motion detector is a device that seeks a disturbance situation in the room when an intruder enters the parameter, and the reflection pattern is disturbed. The sensor sends a signal, when this happens, and the door opens to send an alarm signal ultimately (Fay, 2011).The ultrasonic motion detectors work or s employed efficiently using the sound waves. When the movements disrupt the air and the sound waves, the sensors sound alerts of intrusion.
Automatically, the waves strike objects within the field of detection and as long as there is no movement, the waves are not disrupted. Otherwise, the sound waves become interrupted and are reflected back to the receiver of the security system.The principle of the passive infrared detectors operates under temperature variations and surface characteristics of the object in front of the sensor. When an object passes in front of the background, like a wall, the temperature changes at the point in the sensor’s field of view and raise the room temperature to the body temperature and back again (Fay, 2011).
The sensor the converts the resulting change in the incoming infrared radiation into a change in the output voltage and triggers the detection. Temperature variation and the surface characteristics of the object in front of the sensor are the environmental variables that must be considered to assure its proper operation.ReferenceFay, J.J. (2011). Contemporary security management (3rd ed.). Burlington, MA: Butterworth-Heinemann.
Read More