Verified Document

Building Security External Building Security Seems To Case Study

Building Security External building security seems to have taken on added significance since the 2001 strike against the World Trade Center in New York city by terrorists that flew airplanes into the two buildings that resulted in their complete decimation. As one recent study determined, however, there are modern remedies that help against future attacks of similar nature. One study in particular determined that "Ultra-high-performance concrete (UHPC) is particularly suitable for application in aircraft-impact-resistant high-rise buildings for combined load-bearing and protective structures" (Noldgen, Fehling, Riedel, Thoma, 2012, pp. 358). There are more concerns however in developing and maintaining security than just worrying about an airplane (or other missile) being used against a building for terrorism and mayham.

One of the concerns may include the access points to the building that may be vulnerable to entry by those who seek to control or damage the building. As the book reminds us that fortifying a main entryway to deter terrorists is all well and dandy, but not if we allow for easy entry way through a cafeteria or similar entryway. Therefore, having an effective entry control system "allows the movement of authorized personnel and material into and out of facilities...

The principle of balanced design "ensures that each aspect of a barrier configuration affords equal delay" (book -- Chapter 11-page 221). What the balanced design approach to security is seeking to provide is an approach with "no weak links." A good example of no weak links would be a door or entryway that is totally secure.
Again the book is cited in Chapter 11 by stating "an adversary is not likely to burn a hole in a door to crawl through if the door locks or hinges are clearly easier to defeat" (p. 221).

As an example of a balanced design strategy, when the White House was rebuilt during the 1949 -- 1952 period of time it was rebuilt to include a bomb shelter for the protection of its inhabitants, and "part of the house was rebuilt on a steel-supporting frame" (White House, 2013, p. 1). Rebuilding on a steel-supporting frame was an attempt to ensure that the external security of the building was enhanced and strengthened.

Another principle to consider would be the delay-in-depth principle. Implementing a…

Sources used in this document:
Works Cited

Noldgen, M.; Fehling, E.; Riedel, W.; Thoma, K.; (2012) Vulnerability and robustness of a security skyscraper subjected to aircraft impact, Computer -- Aided Civil and Infrastructure Engineering, Vol. 27, Issue 5, pp. 358 -- 368

White House (2013) Columbia Electronic Encyclopedia, 6th edition, p. 1 -- 1

Chapters 10 -- 11 -- 15 in the book (you will have to put in the citation)
Cite this Document:
Copy Bibliography Citation

Related Documents

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Security Overview Businesses Today Are
Words: 3366 Length: 13 Document Type: Research Paper

(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Building Strategy Partnership As the
Words: 1179 Length: 4 Document Type: Term Paper

This was one of the factors that led to the foundation of the EU, as small, less powerful nations united in an effort to gain and hold power in a collective effort (Tyldesley). Therefore, in the "Five Lenses" and especially so in the case of EU, power is in essence the coin of the realm. In other words, without holding a superior position to others, class structure would not

Security Issues in IEEE Wlan
Words: 6613 Length: 20 Document Type: Term Paper

Despite its clear benefits and advantages in terms of ease of use and cost effectiveness, there are certain risks associated with wireless networking. These risks are discussed further below. Review of the Literature. Security Risks Associated with IEEE WLAN 802.11. The applications for wireless communication technology continue to develop and expand; today, at least, the 802.11b is the standard of choice for wireless router communication used with network installation (Gonazles & Higby

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now