Physical Security

Topics: Physical security, Access control, Security guard Pages: 6 (1733 words) Published: March 1, 2013
Physical security starts with a rather simple basic premise; those who do not belong on your institution’s property should be excluded from your institution. This may happen in three often interrelated ways: when those who do not belong are identified, stopped and denied admission, when those who do not belong are denied admission by a physical device, such as a locked door. When those who do not belong are denied admission because they decide that your institution is too difficult to enter and thus they do note entry.

This section will consider the various methods of excluding those who do not belong: access control, key control and locks, protective devices and alarms, windows and doors, fencing and gates, protective lighting, general deterrence.

Access Control
Access control means that, when your facility is open, no visitor, delivery service person or unknown individual is able to enter your facility without being both observed directly or indirectly. Several techniques to accomplish that goal may include any or all of the following. Security Desk

A security desk should be setup in them in lobby of each building which has an open-access or open-door policy. A sign-in and outlet supervised by an employee who validates identification prior to allowing visitors to proceed into the building, is highly advisable. Most supermarkets, five star hotels, foreign embassies, parliament buildings and major organizations have this measure in place in order to monitor the staff and clients as they come in and out to ascertain no harmful contrabands are sneaked in or pilferage of equipments and other relevant materials from the organization. When entering a building like I&M where Standard Group have offices or Nation Centre where NTV is housed you have to produce your National ID, register your name, office and purpose of your visit then insured with a visitors pass in order to gain access to the premises. Monitored Entrances

Ideally, an institution should have a single entrance only, monitored by staff personnel and equipped with an intercom system for communicating with anyone who comes to the door. Simply, an open door policy does not mean that every door need be left open and unlocked. You realize that hospitals, police headquarters, military barracks among others have personnel who are assigned on daily basis to check and verify individuals and motor vehicles that come in or leave the premises. Its purpose is to deter criminals and take note of every visitor for purposes of accountability when things go amiss. When entering the Times Tower where the Kenya Revenue Authority is housed, the security guards at the gate verifies visitors by their National Identity cards and or travelers passport and then a separate group of guards checks for any harmful materials by use of metal detectors. Visitors

At no time should visitors be allowed to roam freely through your property unescorted or without being observed. That is especially true for individuals who expect to work on your most sensitive systems such as burglar alarms, fire alarms, communication systems or computers. Special diligence should be applied to those individuals when they visit your institution even if they are legitimate. For larger institutions, certain areas should be considered off-limits to all but authorized personnel. Allowing visitors free access to your facility does not mean that they should be allowed to go anywhere e.g. into restricted areas such as office spaces or that they should be given a sense that their actions are entirely unnoticed by the institution’s personnel. Some premises require having out of bound locations i.e. military barracks, production factories railway stations, air and seaports for purposes of security. Thus visitor should only be directed to designated zones only. Military barracks have their armories protected while airports have garages and main...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Physical Security Essay
  • Physical Security
  • Security Alarm Essay
  • Border Security Essay
  • 7 Layers of Lotu Security Essay
  • Gsm Based Portabel Vehicle Security System Essay
  • jail security automation using android mobile Essay
  • Essay on Windows Workgroup vs. Windows 2003 Security Models

Become a StudyMode Member

Sign Up - It's Free