Preview

Components of Physical Security

Better Essays
Open Document
Open Document
3336 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Components of Physical Security
Components of Physical Security
Steven Looney
Student ID: 4168626
SCMT397 Physical Security
Professor Robert D Baker
October 25, 2011

Components of Physical Security
In physical security, there is no one measure that can fulfill all security needs for any one facility. Therefore, security measures must be designed in layers. According to Lawrence Fennelly “physical security is the most fundamental aspect of protection, it is the use of physical controls to protect the premises, site, facility, building, or other physical asset” (2004). The many components or layers of security measures are what make up good physical security. The assets being protected and the nature of the threat to the asset will dictate the amount of physical security used to protect it “for any security countermeasure to be effective, the threat has to be clear.”(Pepper 2010) Whether you are protecting warehouse goods or special nuclear material, layering security controls is the key to good physical security and protecting the asset. The outer perimeter for a facility or business will depend on where it is located and the type of facility it is. For an office, building in a downtown environment the outer perimeter would be the outer wall of the building. If the facility is more spread out, for example, a chemical production plant, the outer perimeter is usually marked with a wall or fence on the property line, but the outer perimeter could also be a natural barrier as well, like a lake or river. Fences are the most common type of barrier used today. Fences can vary in size and how they are used, which in return affect the effectiveness and level of protection. A fence can be used in many different ways. It can be used as a barrier to restrict access to an area, and keep unauthorized persons out, or it could be used merely as a delay barrier design to slow an attacker or adversary down allowing responding security force members time to take actions to defend the facility.
Being



References: Ahrens, S. A. (2007). Locked…But Is It Secure?. Government Security, 6(3), 16-18. Retrieved from EBSCOhost. Bakr W. F. and Hamed A. A. Journal of Physical Security, (2009) 3(1), 3 Retrieved on Oct. 19, 2011 Brooks, D. J. (2009). Security Journal, 24, 101-117. Retrieved on Oct. 19, 2011 Fennelly, L. (2004). Effective Physical Security (3rd ed). Burlington, MA: Elsevier Butterworth-Heinemann. Poremba, S. (2011). Neither Rain Nor Dark of Night Will Stop Security. Security: Solutions for Enterprise Security Leaders, 48(9), 80-83. Retrieved from EBSCOhost.. Rosenberg, P. (2000). facility security:keeping them away. grounds maintenance, 35(10), 24. Retrieved on Oct. 19, 2011 Pepper S. (2010) Journal of Physical Security, 4(1), 2 Retrieved on Oct. 19, 2011

You May Also Find These Documents Helpful

  • Powerful Essays

    This security assessment is provided at the request of Southbound LLC. Willie D. Gibbons of Stalwart Security conducted the assessment of the Southbound warehouse complex…

    • 4807 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Cjs/250 Appendix D

    • 574 Words
    • 3 Pages

    A six foot fence secures the outer perimeter. Video surveillance is active on the north fence and inactive on the south. A manned guard station permits entrance into the outer perimeter from the west; an unmanned and unlocked gate permits entrance from the east. No Trespassing signs are posted at intervals upon the perimeter fence; Employees Only is posted on the gate. Visitors must obtain a pass at the guard station.…

    • 574 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    | Metal detectors at all entrances, have armed guards and unarmed guards, security cameras and CCTV installed.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    iLab 6

    • 403 Words
    • 2 Pages

    Guidelines: It’s always best to introduce a paper to the reader. It sets the tone and provides an overview of what will be covered and what the goals are.…

    • 403 Words
    • 2 Pages
    Good Essays
  • Good Essays

    References: Clifford, M. (2004). Identifying and Exploring Security Essentials. Upper Saddle River, NJ: Pearson Prentice-Hall…

    • 705 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nearly a decade after the attacks of 9/11, adversaries are still widely assumed to come in two basic types: the casual, petty criminal/intruder, and the more serious professional intruder, or terrorist. With regard to the latter, the tactic most often anticipated by terrorists is infiltration of bad things: of the terrorist and a gun, the terrorist and an explosive (hidden on his person, or in/under a vehicle), or both. The extension of this logic is that detection and deterrence technology is focused on finding bad things at checkpoints. All too often, these checkpoints are Maginot Line Syndrome aggregated at the main entrance to a facility, more to make guests feel better than for real security. The back door of the hotel, service entrances, and loading docks are only lightly guarded, if at all. This is the Maginot Line Syndrome, all over again. Recognizing hardened security, the terrorists either blast their way through with automatic weapons and grenades, or elect a suicide attack with a massive bomb over infiltration and hostages. In their wake lie twisted and smoking bollards, barriers, fences, cameras, explosives detectors or portals, and – most unfortunate of all – dead guards. All technically good countermeasures, miscast in their design for a different set of circumstances, and different type of terrorist, in a more innocent era. Security countermeasures that are built into a traditional “security-in-depth” design, with a focus on bad things only perpetuate the illusion of good security. It does not take into account the changing tactics of terror today, and the human element. This brings us to the convergence of information technology and physical security design and…

    • 2262 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Capstone Checkpoint

    • 270 Words
    • 2 Pages

    I believe that it is essential for security professionals to be well familiar with their surroundings and have great knowledge of their primary targets, while roaming their environment. It is critical that all security professionals must maintain full control of the environment they are assigned to, and are aware of not leaving a vulnerable gap to the criminals. These security professionals must be ready to notice the slight changes of the environment, and must keep in mind that all areas are different. Therefore, they must plot a defense mechanism based on the type of environment they are assigned to.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Ortmeier, P. J. (2009). Introduction to security: Operations and management (3rd ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.…

    • 1783 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Certain measures can be implemented to ensure the physical layer is secure. This would be done by storing all hardware in a locked environment. The use of electronic locks would control and log all access to the room containing the hardware. The electronic locks could be a PIN and password or fingerprint scanner (biometrics). The use of video and audio surveillance would provide physical proof of unauthorized access that could compromise the hardware.…

    • 1615 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Pastor, J. F., (2003). The Privatization of Police in America: An Analysis and Case Study, McFarland & Company, NY.…

    • 1272 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Safety in numbers has always been a deterrent method when leaving or traveling through places that are not safe. But without proper physical security measures set in place when leaving any facility or building the need for a crowd will be of no use. Proper physical security requires accessing the risk that may cause threats, vulnerabilities, and attacks when certain principles are not implemented. Physical security also refers to tangible impediments to attack or unauthorized entry. Safety involves having the building, grounds, access to and from the parking area, and other hidden locations secure by lighting, monitoring, and physical patrol. Physical security should include the inside of the building as well as the outside and adjoining perimeter.…

    • 950 Words
    • 4 Pages
    Good Essays
  • Good Essays

    1st Week 22nd 27th Dec 14

    • 19344 Words
    • 75 Pages

    Insights Secure – 2015 – Compilation Dec 22 to Dec 27, 2014 INSIGHTS SECURE -2015 (22nd – 27th dec 14) [The Undercover Group] http://www.insightsonindia.com Compiled by: 1). Urstruly Kartheek 2). Devil Baba 3). Hatas Engineer 4).…

    • 19344 Words
    • 75 Pages
    Good Essays
  • Powerful Essays

    Godrej Full Report

    • 10083 Words
    • 41 Pages

    It is an honor to present this project report titled as "Need Of Security In Government & Industrial Sectors". This partial fulfillment of curriculum has provided me a great opportunity to experience the market practicalities in a hidden sector of security systems.…

    • 10083 Words
    • 41 Pages
    Powerful Essays