Preview

Internal Building Security Proposal

Better Essays
Open Document
Open Document
1456 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internal Building Security Proposal
Internal Building Security Proposal
Joseph Hawley
Sec/410
September 9, 2013
Justin Singer

Internal Building Security Proposal Access Control is an important part of any business. Anytime a business is under construction it will be more vulnerable to threats and attacks. Construction will need more protection because of the ability to gain easier access to a building because of the open areas within the building. Certain areas in a building are a target for attacks. Some areas are higher risk because of the information or high-value assets within the building. Access Control is the best way to wing out some threats and minimize other threats. Each individual at an access point will have several types of protection such as gates, lighting, cameras, detectors, sensors and other devices that can check individuals thoroughly and make sure each one is authorized to be in the building. Keeping individuals out that have no authorization can lower threats and minimizes chances of damage occurring externally. Access control will work from the outside in to protect a business.
Technology is continuing to get better and there are a lot more devices available that can enhance security and help assist the personnel when concerning responsibilities. Access control still needs the support of security personnel to make sure all the devices are functioning properly. Technology has to be maintained to run properly and do what it is designed to do. Access Control was created to keep unwanted individuals from entering a location and to prevent from any employees or personnel from leaving with any valuable information unnoticed. There are so many ways to access a building that any vulnerable areas may be threatened at some point. Access control helps to minimize the vulnerabilities and lower threats against a business. Construction on a building will leave certain areas vulnerable and will be more difficult to secure because of all the individuals coming from outside of the



References: University of Phoenix. (2008). Design and Evaluation of Physical Protection and Systems.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit one notes

    • 424 Words
    • 2 Pages

    3. There are social and economic benefits of equal treatment. Session 2 Some of the key reasons for maintaining security and confidentiality are to: Prevent buildings from being entered by unauthorised people and from being vandalised Minimise burglaries and thefts (possessions / information)…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Access Lock and Door is a trustworthy group that has the experience to give you an efficient service that surpasses your expectations. If you should have the…

    • 1527 Words
    • 7 Pages
    Good Essays
  • Good Essays

    • Making a commercial building secure means protecting the employees that work in the building as well as any visitors. There are some basic building security procedures that should be followed to help keep traffic in and out of the building organized, and to make sure that the building is secure when no one is supposed to be in it. By following security procedures and limiting off-hours access, a building can be made safer and more secure.…

    • 3262 Words
    • 14 Pages
    Good Essays
  • Good Essays

    Saml vs. Oath

    • 709 Words
    • 3 Pages

    While researching for this assignment, I came across a lot of good points about each access control measure, along with some bad points. Each measure was implemented with the best intentions for the user. The fact that it simplifies log on procedures is a big factor. Security-Assertion Markup Language is an XML based open standard for exchanging authentication and authorization data between security domains. Open Authorization allows you to use a common username and password to access different sites. These sites are linked together in one form or another to share information on these sites. Now granted not all information on the sites are shared, but some things such as address book, what you read, watch, or even sometimes your hobbies show up.…

    • 709 Words
    • 3 Pages
    Good Essays
  • Better Essays

    As an organization grows they gain assets and they gain value. Their buildings and offices have value. Their systems and processes have a certain value also. With all of this value this organization will need some sort of protection to deter theft, vandalism and destruction. The boardroom conversation could go from, “We have nice stuff” to “How are we going to protect it.” Leadership will then need to decide how they will handle the issue of protecting their items that the business owns.…

    • 1701 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    In the setting there should never be any unauthorized person. If a visitor comes into the setting it’s important for that person to sign in the visitor’s book. It’s also important for that visitor to wear a visitors badge so everyone in the setting is aware that the visitor is authorized. If I or the staff seen a visitor in the building without a badge on then it’s important for me to challenge the visitor. For example asking where they are going or what room do they…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Physical Security - Essay

    • 1334 Words
    • 4 Pages

    In the United States everyone is concerned about safety in their homes and in his or her workplace. Individuals go to great lengths to ensure that all their possessions that they own could not be stolen from them. According to the 1999 FBI Uniform Crime Reports, nationwide 408,217 robberies were committed with the estimated amount of losses being reported at $508 million in losses. Many measures can be put in place to prevent such losses. This paper will discuss physical security and other components such as building security, grounds security, access control systems, perimeter security, information systems, and technology security.…

    • 1334 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Access Control

    • 661 Words
    • 3 Pages

    Simply defined, the term "access control" describes any technique used to control passage into or out of any area. The standard lock that uses a brass key may be thought of as a simple form of an "access control system".…

    • 661 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Home Security

    • 4224 Words
    • 17 Pages

    This to certify that the work in preparing the project entitled “________________________________________________________________” has been carried out by Ratul Paul , Samoshri Mitra, Debapam Das, Arnab Biswas under my guidance during the session 2011-12 and accepted in partial fulfillment of the requirement for the degree, Bachelor of Technology of West Bengal University of Technology.…

    • 4224 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Implement strong authentication / access control for control systems and related information systems where possible…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Home security matters more than you may might suspect. There are around 3.7 million home robberies in the United States each year, and a significant number of them could have been forestalled with straightforward redesigns.…

    • 774 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Physical Security

    • 782 Words
    • 3 Pages

    Animals and humans alike are territorial. The desire to protect, and defend is a primal instinct. Safety concerns have given the opportunity to numerous security companies to expand their product, and include means of physical protection for private and public buildings. Improvements are made constantly because the technology is advancing. Unfortunately, the most sophisticated systems cannot pretend to keep the public safe; security systems are a deterrent and contribute to lowering the probabilities of a harmful event. Many techniques are used, and some involve controlling the architectural design of buildings and their surroundings, monitoring the establishment’s access, and installing technologically advanced devises. First, the term physical security will be defined to better understand the particular areas of concern, and second an explanation of existing techniques can increase the reader’s appreciation of the subject.…

    • 782 Words
    • 3 Pages
    Good Essays
  • Good Essays

    First of all, physical defences. One of the physical defences is perimeters. A well-designed and well-maintained perimeter fence or wall provides a first line of defence. It can also serve as warning of approach to the premises, especially if monitored by alarms and CCTV. The presence of bright security lighting, particularly if is triggered by PIR detectors, provides a cost-effective deterrent in defined areas. Next, building protection. An efficient intruder detection system will quickly identify an intrusion and cause a message to be passed to the police to respond, but it provides no form of resistance to the intruder. This can only be done by physical means, which can deter and often defeat the intruder, or at least buy time for police to attend in response to the alarm. The nature of the collection, its value and its portability will influence the degree of protection provided. In other hand, the new buildings. Basic security measures can be designed into new buildings. Hence, security advice taken at this stage may avoid the need for additional measures later on that might spoil the building’s appearance. Furthermore, as the shell of the building is usually regarded as the security perimeter, the number of openings should be limited to those necessary for access. Provision needs to be made to ensure that different types of areas, including stores and temporary exhibition spaces, can be kept in a…

    • 1591 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Hris

    • 3929 Words
    • 16 Pages

    The Administrator can authorize or restrict an end user, to see/use a certain set of screens/forms and set of reports. At the same time, the administrator can implement a full access security down to the field level by authorizing and/or restricting certain users from accessing (display, insert, update, delete, query) a certain field on an accessible screen.…

    • 3929 Words
    • 16 Pages
    Better Essays
  • Good Essays

    Hotel Guest Security

    • 838 Words
    • 4 Pages

    Good security benefits everybody, hotel guests, staff and managers. When all staff takes security seriously as a service, the result is a well run, efficient hotel with an excellent reputation and booming business. Security should be another guest service, just like the bar, restaurant, health centre, turn-down or valet-parking. It should not be seen as an overhead, but as a value-adding service, which can be used to promote the hotel as a safe haven and secure environment.…

    • 838 Words
    • 4 Pages
    Good Essays