Nobody downloaded yet

Physical Security risk Assessment - Coursework Example

Comments (0) Cite this document
Summary
Hardening in the most basic language is the reinforcing and thickening of building materials to resist physical attacks like breaking in and cutting it. There are two specific types of hardening that act as the final line of resistance against intrusion, these are; antiballistic…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Physical Security risk Assessment
Read TextPreview

Extract of sample "Physical Security risk Assessment"

Download file to see previous pages se, the lives and safety of people is always at stake especially in social and recreational places like in stadiums, shopping malls, and other places associated with big crowds of people.
Terrorist threats are real and thus security with regard to the mentioned places should and must be upheld at all costs. In many occasions high resistance materials with capacity to resist bullets and other explosives have been used to firmly safeguard important build structures. Further, roads and streets leading to and from these building are barricaded to ensure channeled and controlled entry (National Institute of Building Sciences, 2012). This section is dedicated to discussing the hardening requirements for the BC Place Stadium during the Olympic Games.
Building a perimeter wall around the BC Place Stadium is the first and foremost physical security measure that stadia physical security management board should put in place. The distance from this perimeter wall to the stadia should at least be 200 meters; this, in its own right is hardening enough to resist a blast. Accordingly, the perimeter wall should be built using high resistance materials and thickened to make it hard if not impossible for intrusion and breaking in. In the same line of argument, building a perimeter wall will ensure that unauthorized and malicious vehicles with ill intention do not have any easy access to the stadium. The wall should also have cement or steel barriers to resist attacks from heavy trucks that might be loaded with explosives. This is also essential for forced entry resistance (National Institute of Building Sciences, 2012).
Putting up barriers particularly at the convergence points is another measure that must be taken into consideration; although it is costly but it is vital for the safety of the masses that would come to the stadium. Setting up a low barrier slightly away from the stadia will provide adequate security while also not intruding on the visitor’s privacy. For ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Physical Security risk Assessment Coursework Example | Topics and Well Written Essays - 1500 words”, n.d.)
Physical Security risk Assessment Coursework Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/miscellaneous/1601539-physical-security-risk-assessment
(Physical Security Risk Assessment Coursework Example | Topics and Well Written Essays - 1500 Words)
Physical Security Risk Assessment Coursework Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/miscellaneous/1601539-physical-security-risk-assessment.
“Physical Security Risk Assessment Coursework Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/miscellaneous/1601539-physical-security-risk-assessment.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Physical Security risk Assessment

Network Security Risk Assessment

...? Network Security Risk Assessment Network Security Risk Assessment Introduction Advancement in technology has resulted to the development of innovative computing systems which have facilitated the functions of various organizations and institutions. The increasing complexity of information systems has resulted to information security threats which have infringed the right of individuals to privacy of information. This paper gives a critical analysis and discussion of Fast Distribution, Inc. with a view of investigating its information assets, organizational risk, security posture and...
9 Pages(2250 words)Term Paper

Information Security Risk Assessment Framework

...? Computer Sciences and Information Technology Annotated Bibliography Topic: Information Security Risk Assessment Framework and Metrics in the South Australia Real Estate Sector. Supervisor: Information Security Risk Assessment Framework and Metrics in the South Australia Real Estate Sector Australian Prudential Regulation Authority (2010) Prudential Practice Guide: PPG 234- Management of security risk in information and information technology. Web: http://www.apra.gov.au/Policy/upload/PPG_PPG234_MSRIT_012010_v7.pdf. Accessed on 10th April 2012. APRA records that Information Technology reporting and...
15 Pages(3750 words)Annotated Bibliography

Threat Assessment & Physical Security

.... Retrieved April 18, 2007, from Bulletcatchers.: http://www.bulletcatchers.com/images/bulletcatchers_threat.pdf Diligence Intelligence and Risk Management. (2007). Threat Assessment & Physical Security. Retrieved April 18, 2007, from Diligence Intelligence and Risk Management: http://www.diligencellc.com/index.cfm?fuseaction=section.home&id=22 Federal Bureau of Investigation. (n.d.). The School Shooter: A Threat Assessment Perspective . Retrieved April 18, 2007, from Federal Bureau of Investigation: http://www.fbi.gov/publications/school/school2.pdf Fein, R. A., Vossekuil, B., & Holden, G. A. (1995, September). Threat...
6 Pages(1500 words)Case Study

Computer Security Information Risk Assessment & Security Management

...of checksums, use of maker checker concept in financial transactions, authentication message source, use of roles and privileges, limit on transaction amount, redundancy of backups, parallel databases and the physical security of hardware. In addition to this, a mock disaster recovery drill should be conducted on a regular basis. Second Assignment. During the course of a coffee - break, Stan and Joe had a conversation the gist of which was the idea of a highly sophisticated algorithm, which had come to Joe's mind.This algorithm, could be applied to develop a very effective intrusion detection system. Stan with his entrepreneurial bent of mind decides to utilize the services of a Computer Programmer to...
4 Pages(1000 words)Essay

Physical Security Clients Assessment (Criminal Justice)

...and surveillance to prevent unauthorized access and ensure security of occupants. Reese and Tong (2010) point out the physical security of federal buildings and include assets of physical security such as closed-circuit television cameras, safety guards and barrier material. Since the September 2001 terrorist attacks on the World Trade Center and Pentagon, there have been heightened concerns on vulnerability of buildings. To manage risks associated with buildings, there is a need to identify the assets to be protected. The possible threats would then be determined and the vulnerabilities analyzed. The risk identified...
5 Pages(1250 words)Essay

Physical security and risk assessment of the alfred p.murrah building

...Physical Security and Risk Assessment of the Alfred P.Murrah Building al Affiliation Vulnerability Assessment Alfred federal building was put in the spotlight when after a blast attack four of its columns were severely destroyed resulting in the death and injury of many. One of the columns, G20 was reportedly shattered due to its proximity to the truck bomb whilst the other two, G16 and G24 had there major supporting angle weakened as stated by Dusenberry (2010). Due to this the upper floor had no support from the ones below resulting to there subsequent collapse. In as much as this tragedy led to several theories speculating as to what could have led to the failure of such a strong steel building, one uniform conclusion drawn... was put to...
3 Pages(750 words)Term Paper

Security Risk Assessment

...Lecturer number Security Risk Assessment EXECUTIVE SUMMARY Implementing an IT security risk assessment is absolutely critical to the overall security posture of any organization. An effective security risk assessment can prevent breaches, reduce impact created by the realized breaches, and keep the companys name from appearing in the spotlight for all the wrong reasons. It is also a fact that regular IT security risk assessments will also enable organizations to build up a cache of historical data that can be used to...
7 Pages(1750 words)Term Paper

Risk Assessment for Effective Physical Security

...Risk Assessment for Effective Physical Security and Introduction Physical security threats are a significant threat for all organizations. Physical security is especially important for organizations that have an information technology system that stores the organization’s sensitive data.1 As the information experts continuously design ways to counter data breaches, intruders increasingly find it hard to access data through technical means. These criminals have now turned to physical infiltration and intrusion to gain access to privileged facilities and data that they are not authorized...
6 Pages(1500 words)Term Paper

Risk Assessment and Security Controls

...Risk Assessment and Security Controls The business with its system located in an unsecured room has two vulnerabilities. First is the physical vulnerability and it would be safe to assume that the business owner did not take precautionary measure to protect his network and system from malicious intrusion. To protect the network and system, the business owner must institute the following security measures 1. Physical security – put in physical security such as lock and key security because the system is in unlocked room within the main building of the business. In addition, level of access must be scrutinized with only authorized personnel having physical access to the server. 2. Control the use of administrative privileges... – in...
1 Pages(250 words)Assignment

Security Risk Assessment

... It is necessary for any reputable organization to carry out an IT and computer risk assessment. Risk assessments are normally used for purposes of identifying any risks that business organization face, and this is in regard to their computer system (Calder and Watkins, 2010). Risk assessments help in the identification of the vulnerabilities that an organization faces. It further analyzes the costs that a business organization will face, for purposes of recovering its operations in case its computer systems are attacked. A secure computer and IT system is beneficial to the organization, mainly because it increases the confidence that customers have towards the organization (Calder and Watkins, 2010). There are a variety of risks... that...
6 Pages(1500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Physical Security risk Assessment for FREE!

Contact Us