Nobody downloaded yet

Physical security and risk assessment of the alfred p.murrah building - Term Paper Example

Comments (0) Cite this document
Summary
Alfred federal building was put in the spotlight when after a blast attack four of its columns were severely destroyed resulting in the death and injury of many. One of the columns, G20 was reportedly shattered due to its proximity to the truck bomb whilst the other two, G16 and…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Physical security and risk assessment of the alfred p.murrah building
Read TextPreview

Extract of sample "Physical security and risk assessment of the alfred p.murrah building"

Download file to see previous pages A commission was formed to deal with rectifications of the existing principles that had been used to direct the construction of the Murray building. It was found that use of beam columns provided the highest degree of vulnerability in the event of explosion attacks thus the propping up of three edge bond with all having completely diverse technique. First there was the pre-Northridge moment-resisting bond was looked into. This majorly looked at three distinct areas that might create points of weakness. These are the preliminary error extent, beam susceptibility to succumb to pressure and finally the fracture strength that the fused parts contained was put into perspective. Second model put into question the independent manner of each element then later on putting together these elements to have them form one strong connection. These elements were the T-stub, panel zone and the shear tab. Those already built buildings that were constructed by method of riveting the joints, it was decided that an alternative better method be used. This method had to withstand earthquakes and the uneven constricting and none rigid nature in the joint section as well as the caternary action. The pre-Northridge moment-resisting frames degree of success was gauged by mean-centered deterministic technique as well as the likelihood technique according to Goldstein (2010). First a resolving reviewing of frames with complete and incomplete force wielded T-stub joint was put to test having in mind three beam spans from both bearings. Buildings that were initially built and had unsupported concrete mixture as well as unsupported brickwork infill plates were looked into.
To achieve the need for comparative simple method for the preliminary vulnerability assessment, an energy-oriented nonlinear fixed pushdown analysis method was developed. This method offers a different procedure of ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Physical security and risk assessment of the alfred p.murrah building Term Paper”, n.d.)
Physical security and risk assessment of the alfred p.murrah building Term Paper. Retrieved from https://studentshare.org/miscellaneous/1600900-physical-security-and-risk-assessment-of-the-alfred-pmurrah-building
(Physical Security and Risk Assessment of the Alfred p.Murrah Building Term Paper)
Physical Security and Risk Assessment of the Alfred p.Murrah Building Term Paper. https://studentshare.org/miscellaneous/1600900-physical-security-and-risk-assessment-of-the-alfred-pmurrah-building.
“Physical Security and Risk Assessment of the Alfred p.Murrah Building Term Paper”, n.d. https://studentshare.org/miscellaneous/1600900-physical-security-and-risk-assessment-of-the-alfred-pmurrah-building.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Physical security and risk assessment of the alfred p.murrah building

Network Security Risk Assessment

...? Network Security Risk Assessment Network Security Risk Assessment Introduction Advancement in technology has resulted to the development of innovative computing systems which have facilitated the functions of various organizations and institutions. The increasing complexity of information systems has resulted to information security threats which have infringed the right of individuals to privacy of information. This paper gives a critical analysis and discussion of Fast Distribution, Inc. with a view of investigating its information assets, organizational risk, security posture and...
9 Pages(2250 words)Term Paper

Information Security Risk Assessment Framework

...? Computer Sciences and Information Technology Annotated Bibliography Topic: Information Security Risk Assessment Framework and Metrics in the South Australia Real Estate Sector. Supervisor: Information Security Risk Assessment Framework and Metrics in the South Australia Real Estate Sector Australian Prudential Regulation Authority (2010) Prudential Practice Guide: PPG 234- Management of security risk in information and information technology. Web: http://www.apra.gov.au/Policy/upload/PPG_PPG234_MSRIT_012010_v7.pdf. Accessed on 10th April 2012. APRA records that Information Technology reporting and...
15 Pages(3750 words)Annotated Bibliography

Threat Assessment & Physical Security

.... Retrieved April 18, 2007, from Bulletcatchers.: http://www.bulletcatchers.com/images/bulletcatchers_threat.pdf Diligence Intelligence and Risk Management. (2007). Threat Assessment & Physical Security. Retrieved April 18, 2007, from Diligence Intelligence and Risk Management: http://www.diligencellc.com/index.cfm?fuseaction=section.home&id=22 Federal Bureau of Investigation. (n.d.). The School Shooter: A Threat Assessment Perspective . Retrieved April 18, 2007, from Federal Bureau of Investigation: http://www.fbi.gov/publications/school/school2.pdf Fein, R. A., Vossekuil, B., & Holden, G. A. (1995, September). Threat...
6 Pages(1500 words)Case Study

Computer Security Information Risk Assessment & Security Management

...of checksums, use of maker checker concept in financial transactions, authentication message source, use of roles and privileges, limit on transaction amount, redundancy of backups, parallel databases and the physical security of hardware. In addition to this, a mock disaster recovery drill should be conducted on a regular basis. Second Assignment. During the course of a coffee - break, Stan and Joe had a conversation the gist of which was the idea of a highly sophisticated algorithm, which had come to Joe's mind.This algorithm, could be applied to develop a very effective intrusion detection system. Stan with his entrepreneurial bent of mind decides to utilize the services of a Computer Programmer to...
4 Pages(1000 words)Essay

Physical Security Clients Assessment (Criminal Justice)

...and surveillance to prevent unauthorized access and ensure security of occupants. Reese and Tong (2010) point out the physical security of federal buildings and include assets of physical security such as closed-circuit television cameras, safety guards and barrier material. Since the September 2001 terrorist attacks on the World Trade Center and Pentagon, there have been heightened concerns on vulnerability of buildings. To manage risks associated with buildings, there is a need to identify the assets to be protected. The possible threats would then be determined and the vulnerabilities...
5 Pages(1250 words)Essay

Physical Security risk Assessment

...PHYSICAL SECURITY RISK ASSESSMENT PHYSICAL SECURITY RISK ASSESSMENT The hardening requirements for BC Place Stadium Hardening in the most basic language is the reinforcing and thickening of building materials to resist physical attacks like breaking in and cutting it. There are two specific types of hardening that act as the final line of resistance against intrusion, these are; antiballistic hardening and forced entry resistance (National Institute of Building Sciences, 2012). Consequently, hardening also significantly describes the efforts made to make regular entry and access of build structures more channeled and resistant. Hardening is an expensive but worth course, the lives and safety of people is always at stake especially... and...
6 Pages(1500 words)Coursework

Security Risk Assessment

...Lecturer number Security Risk Assessment EXECUTIVE SUMMARY Implementing an IT security risk assessment is absolutely critical to the overall security posture of any organization. An effective security risk assessment can prevent breaches, reduce impact created by the realized breaches, and keep the companys name from appearing in the spotlight for all the wrong reasons. It is also a fact that regular IT security risk assessments will also enable organizations to build up a cache of historical data that...
7 Pages(1750 words)Term Paper

Risk Assessment for Effective Physical Security

...of the organization’s building. If possible, all these materials should have their value ascertained and then located as close as possible to each other. Although this seems like concentrating the risks, which to some security experts is unwise, it actually aids in concentrating the efforts and resources of the physical system thus making it better and more effective. The requirement definition also analyzes the impact of failure of the system. It assesses the risks and probability of the system failing. These risks are the ones that will later be used to weigh in on the cost-benefit analysis. b) Cost The costs under...
6 Pages(1500 words)Term Paper

Risk Assessment and Security Controls

...Risk Assessment and Security Controls The business with its system located in an unsecured room has two vulnerabilities. First is the physical vulnerability and it would be safe to assume that the business owner did not take precautionary measure to protect his network and system from malicious intrusion. To protect the network and system, the business owner must institute the following security measures 1. Physical security – put in physical security such as lock and key security because the system is in unlocked room within the main building of the business. In addition, level of access must be scrutinized with only authorized personnel having physical access to the server. 2. Control the use of administrative privileges... – in...
1 Pages(250 words)Assignment

Security Risk Assessment

... It is necessary for any reputable organization to carry out an IT and computer risk assessment. Risk assessments are normally used for purposes of identifying any risks that business organization face, and this is in regard to their computer system (Calder and Watkins, 2010). Risk assessments help in the identification of the vulnerabilities that an organization faces. It further analyzes the costs that a business organization will face, for purposes of recovering its operations in case its computer systems are attacked. A secure computer and IT system is beneficial to the organization, mainly because it increases the confidence that customers have towards the organization (Calder and Watkins, 2010). There are a variety of risks... :...
6 Pages(1500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Physical security and risk assessment of the alfred p.murrah building for FREE!

Contact Us