Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
This paper 'Internal Building Security Proposal' tells that Increasing incidents of terrorism and industrial espionage have heightened the threat perceptions for industrial buildings. Industrial buildings are structures where industrial-related activities such as manufacturing, material processing etc…
Download full paperFile format: .doc, available for editing
Extract of sample "Internal Building Security Proposal"
Running Head: INTERNAL SECURITY FOR BUILDING Internal building security proposal for industrial building June 02 iNTRODUCTION Increasing incidents of terrorism and industrial espionage has heightened the threat perceptions for industrial buildings. Industrial buildings are structures where industrial related activities such as manufacturing, material processing, data entry and processing, and other commercial activities are carried out. Entry to such buildings is usually restricted to employees and for authorized visitors. However, it is important to install a security system that monitors the internal movements of personnel, and checks on visitors (Dempsey, 2011). This paper discusses three important aspects of internal security and these are Access control, Surveillance, and Protection of high-value areas.
2. Access Control
Access control is the method of implementing security systems to control the movement of people and material into and out of the building, and through various other access points in the building. An industrial building has several areas that have different levels of security. A canteen or a common room has relatively less security and almost all staff that works in the building are allowed entry. On the other hand, certain areas such as server rooms, labs, conference rooms, offices of managers, data storage rooms, are termed as high value areas, and entry/ exit is strictly regulated in such areas (Diane, 1994).
Technology provides a number of features for access control, and a centralized security system provides the best control system. Each gate, door, fire escape doorways, entry doors for material receipt, needs to have access controls. Devices used for access control include single entry rotating turn gates, where a rotating wheel with four arms moves to allow only one person when a smart card is swiped, and smart cards where the card has to be swiped in front of a card reader to open the doors. Other access control systems are motion detectors that detect when a person approaches a door and open both automatically or when a swipe card is flashed at a card reader, sensors, face recognition systems, biometric systems with retina or finger print scans, and other device (Fennelly & Lombardi, 2009).
These devices must be integrated with a central server, so that a system administrator can add/ remove/ upgrade the access rights to the staff. Such a facility, allows the administrator to allow or deny entry into specific areas of the building. Visitors can be given a temporary swipe card, which as an expiration date and time. The swipe card for staff is integrated with the HR module of attendance, and it logs the earliest and last entry of the employee into the building. High-end systems such as biometric systems, makes it difficult for hackers to hack into the security system and change the data (Luis et al. 2004).
3. Surveillance
Surveillance is an important aspect of internal building security systems. It involves monitoring and keeping a watch in the corridors, at the access gates and doorways, workplaces, important areas, stairways and landings and other areas. Cameras with motion detectors are useful in high security areas, and when the office is closed. The motion detectors use infrared sensors to detect if a person enters an area, and the motion is recorded through a camera (Stroik, 2011). Wireless detectors with features such as pressure sensitive pad, heat senor pads and infrared detectors, allow any movement to be detected inside the building. These can be connected to alarm systems that sound when any authorized entry is detected. Sensitive and confidential items such as products, or USB drives, data recording devices, are detected by using a detector baton, which is moved over the body of an individual. Any metallic object is detected and an alert is sounded. Security guards are additionally instructed to physically check the handbags and pockets, purses and satchels of people at the main access points. If the security people suspect that, an individual is hiding some assets that cannot be discovered by surface and body scanners, they need to ask the person to step inside a special room, where a strip search can be performed (Fennelly & Lombardi, 2009).
In product manufacturing and process areas, wall mounted cameras keep track of the activity in the room. However, these systems need a constant watch by security personnel, who can immediately detect if an individual attempts to hide an object. Constant surveillance through cameras, can act as a de-motivator for the staff. Besides, when a large number of cameras are used, it is difficult for the security to monitor all the cameras. With the increased use of smart phones with high end cameras and easy availability of spy cameras, it becomes increasingly challenging to mount an effective surveillance (Luis et al. 2004).
4. Protection of high-value areas
High value areas in the building have assets that have high value for the organization. The value can be in terms of monetary costs, new product design, laboratories, computer server and data storage rooms, etc. These must to be protected by using additional access, and surveillance controls. These areas are protected by using multiple access control systems, with restricted entry. This means that access is given only to specially authorized and cleared individuals. The access cards of these people have special codes and the security doors open only when these cards are swiped. Additionally, biometric evaluations, photo ID cards, are also provided. In some very high value areas, extra security personnel are deployed who check the photo ID with the users and allow access (Dempsey, 2011).
Server rooms and storage areas are vulnerable from physical and hacking attacks. The above methods provide protection against physical intrusion, where a person physically enters the area to steal the assets. However, hackers can gain access through remote methods. Hence, a highly secure system with adequate firewalls and authentication is needed (Fennelly & Lombardi, 2009).
5. Conclusions
The previous sections have proposed different methods and devices for the internal security of an industrial building. Modern technology provides news tools and devices to provide security. However, modern thieves and intruders master these technologies, manage to subvert and overcome the systems, and gain access. A good security system needs adequate security personnel, who are well trained and alert. Hence, it is important to have a modern security systems, operated by well trained personnel.
References
Dempsey, J. (2011). Introduction to Private Security. Thompson Higher Education: CA.
Diane, (1994). Industrial Security Manual for Safeguarding Classified Information. DIANE Publishing Company: NY.
Fennelly, L. J. & Lombardi, J. H. (2009). Spotlight on Security for Real Estate Managers. Institute of Real Estate Management: Pennsylvania, USA.
Luis, E. S., Tyska, L. A. & Fennelly, L. F. (2004). Office and Office Building Security, 2nd edition. Gulf Professional Publishing: CA.
Stroik, J. S. (2011). Building Security, 3rd edition. American Society for Testing and Materials: Baltimore, USA.
Read
More
Share:
CHECK THESE SAMPLES OF Internal Building Security Proposal
proposal This application seeks to convert the Cream Block and Cream Block Extension, Almond Block Extension and the Joseph Rowntree Memorial Library, as well as the progression of the remainder of the site into a development project.... The commercial part will include Retail 974 sq m and Office 4116 sq m, the Joseph Rowntree Memorial Library as per the proposal is to be converted into a cafe.... Although the proposal meets minimum standards as contained in the Sustainable Design and Construction planning guidance, chances exist to improve the sustainability of the proposal (Epstein 2008)....
This report "Kelsey State Budget proposal for Fiscal Year" tables the financial budget plan proposal of Kelsey state.... OPIC: KELSEY BUDGET proposal FOR FISCAL YEAR 0 Introduction; This report intends to table financial budget plan proposal of Kelsey state for the year June 2012 to June 2013 Kelsey state fiscal period.... The fund that would have being allocated to the proposed departments to face fund reduction, is under the proposal of the committee to be channeled towards hiring more police officers, increased surveillance and building of new prisons in the coming fiscal year (Adams and Williams 2010)....
Goals of the proposal
... Allied London purchased the Centre earlier this year, and is currently working on a major proposal for the Shopping Centre hoping it will a new lease will bring more vibrancy to life in the area.... ull 24 hour on-site-management and security with a new CCTV installation.
... The terrace would help improve upon security....
This paper ''2012 Budget proposal'' tells that The economy of the United States continues to be a central concern for voters at a time when the national unemployment rate is 9 percent.... In February, President Obama began the longer-term discussion of the budget proposal offering a $3.... Budget proposal: Presidents FY vs.... he House of Representatives FY 2012 Budget proposal……………………………….... residents FY 2012 Budget proposal……………………………………………………....
This lays the basis for the main proposal; that the CFSP must remove this duplication.... Argument in favour of this proposal also presents itself in academic debate where the question has arisen as to whether an EU policy in the security field is necessary.... he proposal is that the EU should not become involved with foreign military policy.... This essay "A Set of Proposals that would Improve the Efficiency of the Common and Foreign security Policy" is about the proposals that will be justified by referring to existing practice and will evaluate the likelihood of such proposals actually being implemented....
The cost and benefits are weighed against each other, and if the later surpasses the later, the proposal is adopted.... The benefits of the proposal should be described succinctly together with the risks if any.... It financial overview has expanded over the years, but its security seem to be taking the opposite direction.... However, the company has experienced a number of network security incidences in the past.... It financial overview has expanded over the years, but its security seem to be taking the opposite direction.
...
Successful implementation of the strategy will ensure the achievement of the objectives of the strategy as to provide safety and security to all the stakeholders and protection of the building during the fire incidents.... It is expected that execution of the proposed strategy will ensure safety and security of all the stakeholders with minimum loses both human and material.... The equipment will be in a steady position and the team will become functional under the command of Fire Fighting security Officer who will be the focal person for the implementation of the plan with the active assistance of all other relevant agencies.
...
"University building security Plan" paper provides a feasibility study for the University security systems that are going to be implemented in a new building.... University building security Plan
... She/he will also be the overall in charge of security at the entire campus thus will be mandated to devise and oversee the implementation of the new university building security systems.... ere we are going to include some of the most sought after security devices for any building security with CCTV and biometrics being the main technology (NCSC, 2010, p....
9 Pages(2250 words)Case Study
sponsored ads
Save Your Time for More Important Things
Let us write or edit the report on your topic
"Internal Building Security Proposal"
with a personal 20% discount.