Preview

Physical Security

Powerful Essays
Open Document
Open Document
2606 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Physical Security
Introduction

Risk assessment and physical security survey of any building is critical in order minimize to the venerability of being put to risk due to failure to install or put the necessary mechanism to curb such potential. There is a need for thorough analysis on the risk assessment and physical survey on implementation of practices, principles and procedures in installation security measures.

Definition

a) Risk

The term risk refers to the possible happening of undesirable event.

b) Security

It’s the implementation of set of acceptable practices, procedures and principles that, when taken as a whole, have the effect of altering the ratio of undesirable events to total events.

c) Security survey

This is the critical onsite examination to ascertain the present security status, identify deficiencies or excesses, determine protection needed and make recommendation to improve the overall security of the operation. Charles A. Sennewald a security consultant and author says that the primary vehicles used in a security assessment is survey, which is the process whereby one gathers data that reflects the who, what, how, where, when and why of the clients existing operation. It’s the fact finding process.

It’s a comprehensive physical examination of a premise and thorough inspection of all security and proceeding. Its an effective tool for helping corporate security professionals to reduce crime at their facilities. According to Robert J. Fischer and Gion Green, they said the objective of security survey is the analysis of a facility to determine the existing state of security, to locate weakness of its defense, to determine the degree of protection needed and to lead to recommendations for establishing a total security programme.

Security survey areas

I. Surveillance

In order to improve and enhance quick ways in criminal detection, apprehension and deterrence, the perimeter should have frequency patrols done by in-house



References: 1. Geoff Graighead, (2009).High-Rise security & fire life property (2nd ed). USA publishers. 2. Lawrence, J. Fennelly. Effective physical security. (2004). 3. James F. Brada. Risk analysis and Security survey. (3rd ed) USA publisher. 4. Karim, H. Vellan.Strategic security management: a risk analysis assessment guide for decision makers (2007).

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cyber Work Force

    • 859 Words
    • 4 Pages

    Security Provision Operate & Maintain Protect & Defend Analyze Operate & Collect Oversight & Development Investigate…

    • 859 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Once the preparation phase is complete, the initial vulnerability scans are performed. If any issues which occurs during the scans they should be recorded since it could happen again in future scans. Vulnerability scanning tools offer a wide range of reporting options. It is necessary to use them to create a various number of reports. the security officer will be interested in the risk the organization is currently facing, this risk includes number of vulnerabilities detected and the severity/risk rating of the identified vulnerabilities.…

    • 790 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security Monitoring

    • 867 Words
    • 4 Pages

    The organization IT department and e- commerce applications are the ones that conduct security monitoring and measuring. Security monitoring is very important, because it is the process of preventing attacks and responding to threats that could happen in the future. An organizations can prevent small risk from turning into a bigger and more expensive problem by taking preventative steps. The IT department should be monitoring the system at all times and it must be implemented both externally and internally. However the first step each organization should take when starting the monitoring system is to first discuss what a potential risk is.…

    • 867 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    List of Abbreviations..........................................................................................................i List of Figures....................................................................................................................ii 1. 1.1 1.2 2. Introduction ....................................................................................................................... 1 Objective of the Study .......................................................................................... 1 Course of the Investigation ................................................................................... 1…

    • 5187 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Threat assessment is the first step in a risk management program. A threat assessment considers the full spectrum of threats (i.e., natural, criminal, terrorist, accidental, etc.) for a given facility/location. The assessment should examine supporting information to evaluate the relative likelihood of occurrence for each threat. For criminal threats, the crime rates in the surrounding area provide a good indicator of the type of criminal activity that may threaten the facility. In addition, the type of assets and/or activity located in the facility may also increase the target attractiveness in the eyes of the aggressor.…

    • 5022 Words
    • 19 Pages
    Good Essays
  • Good Essays

    A comprehensive risk assessment exercise will help an organization to understand the wide-ranging threats it can be exposed to, the possible extent of damage and therefore the required steps for damage control. A healthy Risk Assessment helps to determine how each functional area of a business would be impacted in the event of a crisis (Manmade or Natural) and it further helps in prioritizing recovery plans based on the criticality of the functions.…

    • 500 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Risk Management Plan

    • 273 Words
    • 2 Pages

    The project aim at Flayton Electronics to achieve a successful security risk management plan in order to provide the appropriate guidelines and implementation of security risk controls to enhance Flayton Electronics security. This is achieved through the assessment of the business, operations, staff, assets, risks, legislations, standards and policies.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cobit Security Checklist

    • 7749 Words
    • 31 Pages

    The first step in a security checklist for XYZ Company is COBIT PO1.3, an assessment of the current capability and performance of solution and service delivery. The assessment should measure IT's contribution to business objectives, functionality, stability, complexity, costs, strengths, and weaknesses. While this assessment will be useful for security purposes, all areas of IT can use it because security capabilities are a subset of overall IT capabilities. It will provide a baseline to which to compare future changes. Since XYZ is not a new company, they must have existing infrastructure and services in place. Thus, having a baseline is advantageous because it will allow IT to show tangible improvements to executives, which will help procure financing for future IT endeavors.…

    • 7749 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    Integrated physical security from perimeter to control room is to detect and prevent an intrusion to the organization. There are many aspects part of Physical security including the…

    • 730 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Security

    • 3919 Words
    • 16 Pages

    • A “hash” is a short function of a message, f ti f sometimes called a “message digest” g g • BUT: a hash is not uniquely reversible • Many messages have the same hash…

    • 3919 Words
    • 16 Pages
    Better Essays
  • Good Essays

    Security

    • 466 Words
    • 2 Pages

    In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data…

    • 466 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Protection and Security

    • 1598 Words
    • 5 Pages

    The separation of protection and security is a design choice. Protection is identified as a mechanism, which means that it is a device that changes an input into a desired output. Security is identified as a policy, which is a procedure to guide the decision making process. Security relies on the protective mechanisms along with cryptology techniques.…

    • 1598 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Security

    • 1204 Words
    • 5 Pages

    They believe that non-military issues such as economy, trade, environment, terrorism gain much more importance…

    • 1204 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Security

    • 526 Words
    • 3 Pages

    I have taken efforts in this project. However, it would not have been possible without the kind support and help of many individuals. I would like to extend my sincere thanks to all of them.…

    • 526 Words
    • 3 Pages
    Satisfactory Essays

Related Topics