Verified Document

Physical Security The Relevance Of Physical Security Essay

¶ … Physical Security The relevance of physical security cannot be overstated when it comes to the prevention or minimization of instances of unauthorized access, loss, or even theft. In this text, I concern myself with physical security and the relevance of several of its components. The components I will address in this discussion are building security, grounds security, access control systems, perimeter security, and information systems and technology security.

Physical Security: Brief Overview

In the assessment of security vulnerabilities, physical security is generally regarded a critical issue. This is particularly the case given that it is the said physical security that presents the most serious obstacle to an attacker seeking to execute a break-in. In that regard therefore, the various components of physical security, some of which are discussed in significant detail in this text, should seek to secure people and organizational assets from intruders. For this reason, physical security could include the utilization of CCTVs, protective lighting, access control, systems, and actual physical barriers (Dempsey, 2010). It is important to note that in some instances, a malicious individual may only be interested in the interruption of an organization's ability to operate effectively. Such an attacker may not necessarily compromise an organization's perimeter. A physical security assessment initiative must therefore address all the possibilities including but not limited to destruction of organizational property and possible disruption of organizational activities and operations. In the next section, I address the nature and importance of a number of physical security components.

Building Security

In most cases, the level of building security implemented is largely based on the importance as well as the value and relevance of assets housed within a given facility. Building perimeter security strategies in that regard therefore "provide a second line of defense for protecting site occupants and property by preventing unauthorized entries of buildings"...

Of great importance on this front is therefore the erection of surveillance systems as well as the installation of physical barriers (Fennelly, 2012). To assure a wholesome and complete protection of buildings, there is also a need to put in place measures designed to limit access to a building's interior spaces. As Fennelly (2012) observes, interior security strategies come in handy in not only the safeguarding of property but also the prevention of unauthorized access. Their relevance cannot therefore be overstated when it comes to the further enhancement of physical security. In most cases, the primary access points of a building including but not limited to windows and doors are given great emphasis in the development of a building security plan. It is important to note that although doors and windows remain the primary access points, there is a need to also take into consideration other access points that could be exploited as easily by an intruder. These other access points include but they are not limited to communication devices and electricity entry points, air and ventilation vents, etc. There is also a need to ensure that there is a sufficient buffer zone between a building and the public. This is particularly the case if the said building houses sensitive, important, or critical assets. Other considerations when it comes to building security include the installment of locks, security surveillance cameras, deployment of building guards, and utilization of identification badges (Dempsey, 2010).
Grounds Security

Effective physical security must also incorporate ground security. To guarantee security, security experts are increasingly becoming aware of the relevance of a well thought-out environmental and architectural design plan. Indeed, more than ever before, the need to assure security has seen security managers and consultants assume a prominent position in the landscape architecture. Depending on the level of threat, organizations should have a comprehensive security plan that seeks to landscape their exteriors securely. For this reason,…

Sources used in this document:
References

Dempsey, J.S. (2010). Introduction to Private Security (2nd ed.). Belmont, CA: Cengage Learning.

Fennelly, L.J. (2012). Effective Physical Security (4th ed.). Waltham, MA: Butterworth-Heinemann.

Purpura, P.P. (2007). Security and Loss Prevention: An Introduction (5th ed.). Burlington, MA: Butterworth-Heinemann.

Smith, C. & Brooks, D.J. (2012). Security Science: The Theory and Practice of Security. Waltham, MA: Butterworth-Heinemann.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Relevance of Academic Knowledge to
Words: 5016 Length: 15 Document Type: Term Paper

It needs to be well understood because just like knowledge, ingorance cannot be talked about without basing on some individual or group. It should therfore be negotiated soically because it is socially constructed. Ignorance is treated indiscriminately and unitary whereby terms like uncertainity, ambiguity and vagueness are considered synonymous by most writing on disaster.Turner together with several other writers in the fields of disasters and hazards refer to about

Security and Control of Health Data
Words: 3766 Length: 10 Document Type: Term Paper

Health-Care Data at Euclid Hospital Security and Control: A White Paper Protecting Health-Care Data The efficiency of the modern healthcare system is increasingly becoming reliant on a computerized infrastructure. Open distributed information systems have been initiated to bring professionals together on a common platform throughout the world. It needs to be understood that easy and flexible methods of processing and communication of images; sound and texts will help in visualizing and thereby

Relevance and Effective of the
Words: 6848 Length: 25 Document Type: Thesis

The chambers approach may be more suitable for states that seek a quick resolution to a particular dispute or for other compelling reasons; however, like the full Court, these alternatives are likewise voluntary in nature and require the consent of the disputants to have the case heard by one of the three foregoing chamber types. According to the Court's published information concerning "Chambers and Committees" (2009), "Despite the advantages that

Raytheon Company: Survey and Analysis of Physical Security
Words: 3102 Length: 10 Document Type:

Physical Security Survey The following will be an overview of the Raytheon Company. Business information will be included as well as security issues the company might have. A physical security survey will be presented as well as an analysis of the results. Certain changes that are needed will be proposed. Background on Raytheon Raytheon Company is an innovation and technology pioneer with expertise in security defense, and civilian markets across the globe. With

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now