StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Scope and Nature of Physical Security Designing - Assignment Example

Cite this document
Summary
In the research paper “The Scope and Nature of Physical Security Designing” looking at how his friend`s business will operate, the author found it imperatively essential to provide him with a physical security advice to implement in his premise…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
The Scope and Nature of Physical Security Designing
Read Text Preview

Extract of sample "The Scope and Nature of Physical Security Designing"

 The Scope and Nature of Physical Security Designing Introduction Having substantially looked into the scope and nature of how my friend`s business will operate, I found it imperatively essential to provide him with a physical security advice to implement in his premise. I want to admit the fact that the consultancy will be done in the most ethical manner and within the framework of physical security design guidelines. In addition my consultancy advice will give much priority towards areas of CPTED (crime prevention through environmental design), surveillance options, entry control, locks, alarm option, outdoor barrier among others. CPTED Applications Fennelly indicated the inevitable need to expand crime prevention through an environmental design (CPTED) method to include the entire neighborhoods and offer comprehensive data gathering efforts that would both describe the nature of crime forms and suggest suitable countermeasures. Borrowing from (Fennelly, 2004), I propose to my friend a three-fold CPTED options involving: Physical design (installation of surveillance technology, alarm option, entry control etc.); increased citizen participation; and More effective utilization of police forces. The way to thwart crime is simply to design the entire environment in such a way that citizens and neighbors, apart from the police force, have a chance to contribute to security provision and reduce crime. Surveillance Options It`s necessary to have surveillance options in a premise as the loss of time and assets due to burglary is a developing cancer within our society which takes away the profits of every business, be it retail, manufacturing or service. A successful thief requires privacy so as to operate. It is the role of the surveillance system to prevent this. Here are the factors to consider before acquiring surveillance technology: a) TVL or television lines - when you`re simply going to read one item then make it this! TVL is the total horizontal lines that a camera is able to record. When shopping for CCTV camera, you need to go for TVL which records your desired amount of items or objects. b) Choose the right lens If increasing TVL doesn't enhance detail capture, just as most people think, you may want a wider angle camera that gives a wider coverage. c) varifocal or Zoom CCTV camera lens The best choice is to shop a camera with a vari-focal or zoom lens. You will pay a small premium on fixed lens cameras, depending on the particular lens but then it means you enjoy much more flexibility. In the course of installation you need to be able to zoom in or out so as to fill image frame with the chosen subject and make the best use of available pixels. d) A hood covering them. Before procuring the surveillance technology, you need to have a hood covering them which can also make early warning to perpetrators. This can be a noteworthy advantage when it comes to CCTV system Outdoor Barriers Outdoor barriers are facilities used for perimeter protection such as fences, lighting, walls, and gates among others. They are important to the security of the business premise for the following reasons: They are measures which ensure that only ratified persons have access to the facilities or property They create a clear boundary of 10 to 15 feet in which no parking, storage or regular activity is allowed They enhance privacy as onlookers or strangers may not have a chance to grasp what is inside the premise (a case of perimeter wall). Locks There are various types of locks which can be installed within the facility, particularly in those areas where confidential and secret information are stored. The friend’s premise may have the following three options: Touch Screen Keypad Digital touch screen keypad normally have no mechanical buttons. This means there is no trace of your own secret pin code. Five-lever mortice deadlock It is the standard deadlock that offers moderate guard to confidential rooms within your premise. Key-operated and multi-point locking system It is a rim-locking system which bolts your private room`s door into the frame. It provides a higher security level. Lighting Considerations Adequate lighting ought to be provided from dusk to dawn at all exits and entrances, around all office structures, along every boundary line, and in every parking area. Adequate lighting lessens the possibility of injury and accidents. It also functions as a deterrent to any would-be intruder. Alarm Options The advantages of central station Alarm signaling systems is that it offer balance for the whole physical security profile in terms of protection capabilities and costs. Alarms may lessen the need for bigger, stationary guard force. The following are types of alarm systems you can use for the business: Movement detectors (microwave infra-red, ultrasonic) which react to movement and heat. They may be placed within strategic locations in your business. Magnetic Reed Switches which are electro-mechanical devices that get activated whenever the electronic circuit is cut. Duress or panic assistance that are in form of a coded pad pin alert, fixed button or a portable device attached to an alarm. Entry Control As a measure of entry control, my friend can utilize different types of identification cards as given below: i. Magnetic Stripe These sorts of cards have data-encoded stripe on them. When this card is swiped through or withdrawn from the reader, the stripe passes a magnetic head and it verifies whether the card holder is allowed access in the premise. ii. Hollerith This early method of access cards have small holes which can be read through contact brushes or a light source. iii. Wiegand It is also known as embedded-wire card. The card technology is grounded on the Wiegand Effect, which is a phenomenon witnessed when specially arranged ferromagnetic wires abruptly reverse themselves upon exposure to external magnetic field. Conclusion In conclusion, you premise needs to design physical security measure ranging from installation of surveillance technology, alarm options, entry control measures, lighting installation to acquiring the safest locks on confidential and secret rooms that have important data or files. Physical security undoubtedly lessens crime within a premise or business. Reference Fennelly, L. J. (2004). Effective physical security. Amsterdam: Elsevier Butterworth Heinemann. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Scope and Nature of Physical Security Designing Assignment, n.d.)
The Scope and Nature of Physical Security Designing Assignment. https://studentshare.org/social-science/1833487-physical-security-designing
(The Scope and Nature of Physical Security Designing Assignment)
The Scope and Nature of Physical Security Designing Assignment. https://studentshare.org/social-science/1833487-physical-security-designing.
“The Scope and Nature of Physical Security Designing Assignment”. https://studentshare.org/social-science/1833487-physical-security-designing.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Scope and Nature of Physical Security Designing

The Project Charter and Business Case Document

Purpose, scope, and Objectives The database system should ensure that the information about the suppliers, jobs, customers, staff, and stock should be interconnected to ensure effective data sharing.... The paper "The Project Charter and Business Case Document" gives detailed information about the development of the database system....
14 Pages (3500 words) Assignment

Earth Embankment Dam Filters

designing of the stepped spillways, and stilling basins finds the knowledge of the beginning of the white water fundamental.... Embankment dam Name Name of institution Professor Course Date Introduction An embankment dam can be defined as a gigantic but artificial water barrier.... It is classically created by the emplacement and compaction of a multifaceted semi-plastic mound of diverse compositions of sand, rock or and soil....
6 Pages (1500 words) Essay

Risk Assessment and a Risk Management Process

It is important that all aspects of the activity workflow be represented on the team, including human resources, administrative processes, automated systems, and physical security.... When the scope of a project is discussed, the output is in terms of time and cost.... the scope is important because experience team members would know how changes in scope cause an issue.... It is key to identify all assets associated with the assessment project determined in the scope....
5 Pages (1250 words) Essay

Red Cedar Redevelopment Project

The third will be the expansion of the scope of water management.... Modifications in this area will include the restoration of wildlife, the creation of nature trails and parks.... Second, there will be the introduction of fishponds, nature trails, and parks in the region.... Other than activities involving nature, there will also be a development of passive recreational activities....
6 Pages (1500 words) Assignment

Security in Website Design

This study, security in Website Design, declares that the rapid development of Information and Communication Technology (ICT) has led to the unprecedented growth of the World Wide Web both in terms of coverage and importance.... t was at the face of such an evolving situation that 'security' assumed overwhelming significance in the entire ICT gamut.... ccess control through firewalls, maintaining information confidentiality through strong encryption processes, a range of intrusion detection systems, anti-virus, and anti-phishing software are being deployed to provided security to information on the web and the Internet....
18 Pages (4500 words) Research Paper

Physical Security Survey on Bank of Kentucky

The researcher of this essay will make an earnest attempt to provide a security survey conducted at the Bank of Kentucky, below is a report on the security situation of the facility.... The survey was conducted within the guidelines provided in the course and also the security conditions presented by the bank's management.... The bank's financial function in the local region makes it a critical security facility.... Compromising the bank's security will be a major blow to the community and the economy at large....
10 Pages (2500 words) Case Study

The Role of Security Professionals in the Architecture Design Process

1 stated that the relation between the security professional who is engaged in physical security and using CPTED and the architects and other engineers in the architecture design process is concerned with preventing several defaults in security that may happen.... rdquo;P3 also pointed to the idea of risk mitigation as forming the link between the roles of security engineers and architects in designing a security architecture.... The paper "The Role of security Professionals in the Architecture Design Process" will examine the role of security consultants in the architecture design process and explore the relationship between the security professionals and the architects in the architecture design process....
24 Pages (6000 words) Term Paper

The Role of a Security Consultant in the Architecture Design Process

The objectives of the particular paper "The Role of a security Consultant in the Architecture Design Process" included determining how security professionals seek to ensure that threats and controls are in balance during the architecture design process.... hellip; The study empirically explored the roles of security professionals in the architecture design process.... nbsp;The study also aimed to integrate a systems approach in explaining the role of security professionals in the architecture design process and identifying the role of security professionals in ensuring the integrity of the security architecture....
25 Pages (6250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us