StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Describing a Model Project to Upgrade Faculty Security - Research Paper Example

Cite this document
Summary
The paper "Describing a Model Project to Upgrade Faculty Security" focuses on the critical analysis and description of a model project to upgrade security at a facility. Security is a broad perception that is purposed at creating a state in which illegal persons cannot gain admission…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Describing a Model Project to Upgrade Faculty Security
Read Text Preview

Extract of sample "Describing a Model Project to Upgrade Faculty Security"

Describe a model project to upgrade security at YOUR facility (or a fictional facility) using the process identified in the three part Security Architecture and Engineering series Student’s Name Institution Introduction Security is a broad perception that is purposed at creating at state in which illegal persons cannot gain admission to the secured facility. Physical security is component of the extensive concept of safety that is objected at protecting a variety of resources like personnel’s, facilities as well as company data kept in physical media managed by a corporation. This is a deliberation of measures to be utilized to avert attacks on facilities and the inclusion of approaches to apply these criteria in security designs (Fennelly, 2013). It is projected at avoiding theft, any form of interruption or harm of property. Security is based on three aspects that are enacting preventive obstructions purposed at deterring potential invaders, using surveillance measures to notify intrusions and methods to be used in apprehending the intruders. Upgrading of a security mechanism is essential in the sense that it averts the possibility of the incident of the risk protected against by creating the security measures stern thus reducing the incidence of the danger. This is a gauge that follows a comprehensive study of the safety system to make sure whether the system requires upgrading or substitution depending on the susceptibility of the system to be undermined (Atlas, 2005). Objective of the research This is aimed at protecting the asset from theft or any other risk that the owner of the asset needs security against .This is a research paper that involves a description of model project to upgrade security at a facility. The reader would be able to understand the importance of security upgrade after going through this paper (Fennelly, 2013). A successful security concept for safeguarding facilities nowadays emphasizes a growing alertness of technological advancements and emphasizes the incorporation of architectural perspectives, security systems and manpower and procedures so that they can be more efficient. Crimes comprising terrorist activities are the artifact of intentions other than means. Technology assists facilities detect the means interlopers use but not their objectives. The human part of the security force must establish the purposes and take actions to counteract them. The key expression describing risk control in todays world is incorporation (Atlas, 2005). Facilities require security upgrade to ensure the dynamic threat types are put at bay at all time and systems upgraded to counterbalance security measures. Computer security ideas and systems are measures employed in countering security threats within a facility. Concepts and instruments are available in order to suppose an appropriate security position. Foundations of security, identification, authentication, authorization are some of the security factors or measures a facility must ensure are updated appropriately (Fennelly, 2013)... Threats against a facilitys resources are always available. What fluctuates is the likelihood that the risk will outcome in an actual attack. The transformations in prospect are characterized by danger circumstances or stages. Operating measures customized to a diversity of threat conditions ought to be generated prior to a given systems are planned or bought. This paper offers readers with an exhaustively glance at the strategies that must be done to offer the proper planning for the execution of physical security actions at various risk levels. The paper offers techniques for developing security functional concepts for a variety of threat levels, increasing alarm response measures for security persons, developing protection patrol response events, maintaining functional procedures, and training security staff (Atlas, 2005). Effective Physical Security It is necessary for a facility to input physical security systems that permit it to put physical threats at bay. Effective Physical Security is separated into three main categories: security equipment, security design and security functions. The initial category thoroughly assesses the effect of design on safety after there have been threat assessments, protection surveys, application of CPTED (crime prevention through environmental design), and physical security and obstructions. In this paper, total organization design comprising barriers, site hardening, intrusion Detection Systems, CCTV, lighting, access control, patrols and others are discussed as the concepts of physical security (Fennelly, 2013). Physical security illustrates security measures that are premeditated to refute unauthorized access to facilities, assets and resources, and to defend personnel and material goods from damage or harm that could be realized due to theft, espionage, or terrorist attacks. A physical security structure must safeguard against unlawful access, detect real or attempted unauthorized entrance and be capable to activate a reaction. Protection includes physical, practical and psychological barriers to impediment or prevent. Detection refers to gadgets and techniques designed to demonstrate and, perhaps, verify tried or actual illegal access (Atlas, 2005). Response refers to effects such as the participation of security personnel or police, harm assessments, and actions to avert the failure of other basics of the system. Threats to physical security comprise of physical damage, interruption of function, theft, unauthorized disclosure and loss of system integrity Image of physical security mechanism the facility can use. There are four known concepts of effective physical security such as deterrence methods, intrusion detection and electronic surveillance, access control and security personnel (Atlas, 2005). Deterrence Methods There are a lot of deterrents to deal with when assessing physical security of a facility. The facility manager or management need to come up with punishment that stick and grasp people responsible for actions and that in and of it will discourage people. Burglar alarms and bars, video surveillance, all of these fall below deterrents (McCrie, 2007). Neighborhood offense measures such as the privilege to carry arms, and other form of community surveillance form deterrence methods. If one has a burglar and store A had a guard with a fire arm behind the counter also safes, video cameras, and an alarm connected to the police post and store B had an elderly man, no weapons, no secure locks on his doors. A burglar will find it easier to attack store B due to security lapses. This is an example that illustrates how important is deterrent methods as part of physical security (Atlas, 2005). Physical barriers are deterrent methods used to impose physical security. Physical barriers like walls, fences, and vehicle barriers operate as the outmost level of security. They act to avert, or at least holdup, attacks, and also serve as a psychological prevention by describing the outer limits of the facility and demonstrating intrusions to be more difficult (Fennelly, 2013). Tall hedges or fencing incorporated with barbed wire, metal spikes, bottle spikes, razor wire or are frequently emplaced on the boundary of a facility, generally with a number of signage that alerts people not to try to gain entrance. However, in some facilities impressive boundary fencing will not be likely such as an urban office building that is adjacent to public path routes or it may be aesthetically intolerable in environment of a shopping center; in this case, the external security border will be distinct as the walls and doors and windows of the structure itself (McCrie, 2007). Security lighting is another effectual deterrence. Interlopers are less possible to enter well-lit environment for fright that they are noticed. It is essential that all forms of entrance should be well lit to permit close observation of individuals exiting and gaining entrance. When lighting the environment or surrounding of a facility, broadly distributed low-intensity illumination is usually superior to small portions of high-intensity light, since the latter can encompass a tendency to generate blind areas for CCTV cameras and security staff and. It is imperative to place lighting in a way that makes it hard to meddle with, and to make sure that there is a backing power source so that security lights resolve not go out if the there is a black out (Fennelly, 2013). Natural Surveillance is another major form of avoidance that can be integrated into the design of facilities, whereby experts seek to construct spaces that are extra open and noticeable to security guard and authorized staffs, so that attackers and intruders are not capable to perform illegal activity without being seen. An instance would be declining the amount of dense, tall foliage in the environment so that attackers cannot hide themselves or placing vital resources in environment where intruders would have to transverse and open space to attain them (McCrie, 2007). Intrusion detection and electronic surveillance Alarm systems and sensors are intrusion detection and digital surveillance mechanism that ensures facility protected. Alarm systems can be fitted to alert security guard when illegal access is triad. Alarm systems function in cycle with mechanical systems, physical barriers, and security personnel, serving to activate a reaction when these other forms of precautions have been infringed. They involve sensors such as contact sensors, glass break detectors, and motion sensors. However, alarms are just helpful if there is a punctual reaction when they are activated (Fennelly, 2013). In the reconnaissance stage before an actual invasion, some attackers will test the reaction time of security workers to an intentionally tripped alarm mechanism. By measuring the extent of instance it takes for a security squad to turn up, the assailant can establish if an invasion could thrive before security guards arrive to counteract the threat. Loud perceptible alarms can also operate as an emotional deterrent, by alerting intruders that their attendance has been realized. In some environments, law personnel will not react to alarms from intrusion recognition systems except the activation has been confirmed by an observer or video. Policies akin to this one have been generated to arrest the 94–99 percent pace of false alarm call in U.S. and other parts of the world (Fennelly, 2013). Electronic-intrusion-detection (EID) gadgets signal a warning on attempted illegal access. They can be applied, in some situations, as a substitute to security personnel, or to boost the effectiveness of guards. They should be backed up by a response potential related to the risk and threat assessment. EID devices are to be monitored regularly to guarantee consistent operations and alternate procedures are to be accessible. Facilities considering fitting of EID devices should attain CISD guidance on choice and application (McCrie, 2007). Surveillance cameras have been used as a deterrent when placed in extremely noticeable locations, and are also helpful for occurrence verification and chronological analysis. For instance, if alerts are being created and there is a camera put, the video surveillance could be observed to verify the alerts (Atlas, 2005). In circumstances when an intrusion has already happened and a camera is located at the point of invasion, the documented video can be reassessed. Although the term CCTV (closed-circuit television) is universal, it is rapidly becoming obsolete as more video systems lose the enclosed circuit for signal broadcast and are as an alternative transmitting on IP camera systems. Video monitoring does not essentially provide assurance that a human reaction is made to an invasion. A human ought to be monitoring the circumstances real-time in order to react in an appropriate manner. Or else, video monitoring is just a means to collect evidence to be reviewed at a later time. However, technology advancements in information knowledge are reducing the quantity of work essential for video monitoring, through computerized video analytics (Fennelly, 2013). CCTV televised scenes that are transmitted only to chosen receivers for assessment and surveillance purposes. Closed-Circuit Television mechanisms can also act as a psychosomatic deterrent and, when associated to a film recorder, serve as assistance in examining incidents of illegal access. CCTV systems can be utilized to advance guard effectiveness by promoting their range of observation, and to evaluate the necessity for an instant response to an alert. Alternate actions are to be obtainable if the CCTV is out-of-service (McCrie, 2007). Access control Access control techniques are used to watch and manage traffic through exact access points and regions of the protected facility. This is completed using a diversity of systems comprising CCTV scrutiny, security guards, identification cards, and mechanical/electronic control systems like locks, gates, and doors. Electronic access manage effortlessly manages huge user populations, calculating for user lifecycles instances, dates, and person access points. Another outline of access control includes utilize of policies, processes and procedures to control the entrance into the limited area (McCrie, 2007). An instance of this is the operation of security workers conducting checks for certified entry at prearranged points of entrance. This type of access control is typically complemented by the earlier forms of admission control such as mechanical and electronic access control, or non sophisticated devices such as physical passes (Fennelly, 2013). Security personnel Security personnel play a middle position in all layers of safekeeping. All of the technical mechanisms that are utilized to improve physical sanctuary are ineffective without a safety force that is educated in their use and preservation, and which understands how to appropriately respond to breaches in sanctuary. Security workers perform a lot of functions: as patrols and at checkpoints, to control electronic admittance control, to react to alarms, and to supervise and analyze video (Fennelly, 2013). Guards may be needed to manage access to protected zones where there is a requirement for personal dealings and sentence; or for quiet-hours patrol and to give timely reply to actual or attempted illegal entry, or other crisis. Guards must be suitably screened to the height of likely access to classified information and facilities. This does not embrace access resultant from the detection of a security violate (McCrie, 2007). Adapting Security Operating Procedures Threats levels are diverse thus making it essential for the facilities to ensure that they adapt to security measures that can keep up with technological advancements of threats. The best way to do this is to ensure that the security operators are upgraded regularly. It could be a little costly to maintain updated security measures in a facility; however, the cost is worth it since prevention is better than cure (Patterson, 2004). Many organizations that have become prey of criminal invasion such as cyber crimes and intrusions will agree the cost is far less compared to losses incurred due to security breach. This paper tend to advice on the essence of security prevention within a facility as oppose to waiting to counter actual occurrence of threats (Fennelly, 2013). A successful security concept for safeguarding facilities nowadays emphasizes a growing alertness of technological advancements and emphasizes the incorporation of architectural perspectives, security systems and manpower and procedures so that they can be more efficient. Crimes comprising terrorist activities are the artifact of intentions other than means. Technology assists facilities detect the means interlopers use but not their objectives. The human part of the security force must establish the purposes and take actions to counteract them. The key expression describing risk control in todays world is incorporation. An organization, whether private or public, that purchases security gadgets and software without initially considering the functioning viewpoints analyzed in this essay could end up with facilities that essentially augment the risks of damage or loss in their facility because of poor functionality of their security systems. Furthermore, the costs of rectifying the poor operations far outweigh the costs of designing the program properly in the initial place (Patterson, 2004). Conclusion Physical security is component of the extensive concept of safety that is objected at protecting a variety of resources like personnel’s, facilities as well as company data kept in physical media managed by a corporation. Physical barriers are deterrent methods used to impose physical security. Physical barriers like walls, fences, and vehicle barriers operate as the outmost level of security. They act to avert, or at least holdup, attacks, and also serve as a psychological prevention by describing the outer limits of the facility and demonstrating intrusions to be more difficult. Threats levels are diverse thus making it essential for the facilities to ensure that they adapt to security measures that can keep up with technological advancements of threats. The best way to do this is to ensure that the security operators are upgraded regularly. References Fennelly, L. J. (2013). Effective physical security. McCrie, R. D. (2007). Security operations management (2nd Ed).Boston, MA: Elsevier Patterson, D. G. (2004). Adapting security operating procedures to threat levels. Journal of Facilities Management, 3(1), 53-64. Retrieved on March 21 2014 from http://search.proquest.com/docview/218905468?accountid=8289 Atlas, R. I. (2005). Effective physical security, 3rd edition. Professional Safety, 50(3), 23-23, 64. Retrieved on March 21 2014 from http://search.proquest.com/docview/200401215?accountid=8289 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Describe a model project to upgrade security at YOUR facility (or a Research Paper”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1633952-describe-a-model-project-to-upgrade-security-at-your-facility-or-a-fictional-facility-using-the-process-identified-in-the-three-part-security-architecture-and-engineering-series
(Describe a Model Project to Upgrade Security at YOUR Facility (or a Research Paper)
https://studentshare.org/miscellaneous/1633952-describe-a-model-project-to-upgrade-security-at-your-facility-or-a-fictional-facility-using-the-process-identified-in-the-three-part-security-architecture-and-engineering-series.
“Describe a Model Project to Upgrade Security at YOUR Facility (or a Research Paper”, n.d. https://studentshare.org/miscellaneous/1633952-describe-a-model-project-to-upgrade-security-at-your-facility-or-a-fictional-facility-using-the-process-identified-in-the-three-part-security-architecture-and-engineering-series.
  • Cited: 0 times

CHECK THESE SAMPLES OF Describing a Model Project to Upgrade Faculty Security

Trends and issues in the development of information technology for EBusiness

The requirements to the information provided by the system are timeliness, reliability, security and flexibility of presentation. ... n this work Web services architecture is described that can be adopted as a new service delivery model that incorporates implementation of user and functionality requirements, business processes, design patterns and existing technologies use defining an accomplished B2B e-commerce process solution.... The Web services model allows any user access through the use of XML tags for information exchange using the other three standards: SOAP, UDDI, and WSDL....
19 Pages (4750 words) Essay

Information Systems

To achieve its mission objectives the bank needs to implement information technology bases systems to upgrade its current manual system, which is tardy, slow, non-responsive, and unreliable.... he report begins with an introduction of E-Business, describing the key areas and applications that this term covers; it then provides an insight into the latest IT trends in businesses; specifically banks around the globe....
9 Pages (2250 words) Essay

Prevention: Human Factors

This system is very data sensitive and requires extensive security policies to gain credit with international customers.... he employee training for the use of systems is There is a lack in the security training which we have observed.... The employee training for the use of systems is adequate but there is a lack in the security training which we have observed.... At The Company Employee training so far regarding security has been confined to six hours of lectures followed by a video and an annual guest lecture which is more of socializing than a purposeful study and evaluation....
35 Pages (8750 words) Essay

System Design for Greener E-Bikes

This project engages the development of an e-commerce system for Greener E-Bikes and is named Greener Web.... This project will demonstrate Greener's new web-based business platform that will offer eCommerce capabilities to the business.... In this scenario, the business has decided to implement a completely new business model that would be able to potentially enhance the traditional business practice....
8 Pages (2000 words) Essay

International Student Issues and Law of Higher Education

This essay declares that the footfall of international students attending institutions for higher education in UK and USA has increased significantly in the past few years.... It has been evident that majority of the Chinese students have shown interest towards the Western academic courses.... .... ...
8 Pages (2000 words) Research Paper

Security Quality Requirements

This paper 'security Quality Requirements" focuses on the fact that the authors of the complete textbook draw widely on the systematic method created for the Build security In (BSI) Web site to represent two renowned resources in the security world: Cigital, Inc.... The Department of Homeland security Software Assurance Program sponsored the project, and the BSI website contains a range of guidelines, tools, principles, rules, among other resources that project managers would find useful in addressing security concerns at each stage of the software development life cycle....
20 Pages (5000 words) Annotated Bibliography

Enterprise Information Architecture

A logical operation model describes a model entity individually and then how the entities relate to each other.... This paper tells that as an IT Architect, the maturity level of a capability model is important because it represents the process through which software is improved.... The operational model helps to develop solution topology within the entities of the system.... The physical operational model is very detailed in describing the model entities....
6 Pages (1500 words) Assignment

The Design Process and the Main Principle Requirements of a Project

structural, fire, services, and security.... "The Design Process and the Main Principle Requirements of a project" paper Identifies the members of a typical building team and their respective roles, describes the design process and the main principle requirements of a project, and provides an example of 1 type of stone from the rock classes.... rchitect – Engaged by the building owner as an agent to design advice and ensure that the project is kept within the cost and complies with the design....
16 Pages (4000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us