Physical Security Clients Assessment

Only available on StudyMode
  • Download(s) : 615
  • Published : December 3, 2012
Open Document
Text Preview
Physical Security Clients Assessment
Physical Security addresses actions to protect buildings, property and assets against intruders. When designing a physical security program, there are three levels that are needed to protect the outer perimeter, inner perimeter and the interior. Implementing two or three forms of security at each level will have an effective physical security system. Physical Security

Companies can elect to use physical security as part of their contingency planning measures. Physical security measures will include perimeter boundaries, surveillance devices, secure entry points and identifications checks, and secure access for internal sensitive areas. The organization might decide to bring in a specialist response team to help with a variety of threats, whether industrial, medical or any security related incident. Regular security checks on locations and materials should be conducted to deter or identify breaches of security, and strong links with external agencies are useful to augment a company’s resources, as well as share risk. Some considerations related to physical security risk management measures follow (Deutsch). Physical perimeter boundaries is a clear delineation between public property and restricted locations is often required to isolated project areas. The use of fences, wire entanglements, concrete bollards, beams, signs and cleared land ( for observation purposes) ensures that private property is clearly identified and access by all but the most determined intruder is prevented or deterred. This method will avoid the accidental intrusion and provides a psychological barrier against intrusion (Deutsch). Surveillance has a wide selection of devices and detection systems to detect intruders on the market, from the trembler devices that register movement on a fence, to ground sensors that can detect low-level seismic activity (the movement of people or cars). Radar surveillance, laser, thermal, magnetic, volumetric, and movement intrusion alarms are very useful detection systems. Cameras are used that have infrared thermal, and night vision and are triggered by movement that will enhance the security systems, alerting security officers and will provide accurate information on the nature of the intruders. With tower and aerial surveillance can provide good intelligence from their elevated areas. The type of physical security response depends on the nature of the physical threat. Civilians that have gained access to the building will be dealt with in a different manner then a group of armed hostiles that are threatening a life or property. When a company is facing any kind of physical hostile threat there should be a plan in place that will counter the threat and secure and clear any unauthorized people from the area. An organization needs to have another physical security measure in place that will support the human resources that are being used, whether they are from the contingency planning assets ( cameras, sensors, etc.) or equipment that is used as a crisis management tool (solidifying foam used to secure vital areas form intrusion or escape, tear gas, dogs). The organizations guards can be used to detain or arrest any unarmed intruders. If an armed attack has been launched against a site and perpetrators have been sighted leaving the area and heading in a certain direction the CRT may call for the police to cordon the area as well as recommend roadblock locations based on known directions of travel. Building Security

There are seven steps that a business or organization needs to take to be physically secure. Not all of the seven steps will apply to every building but if the company starts at the top of the list and works it way down they will find the practical steps that are needed to protect the company and employees. The first step is to install a deadbolt lock. The deadbolt is a foundation block of physical security. Deadbolts are one of the strongest and most common lock...
tracking img