Physical Security

Topics: Access control, Physical security, Security Pages: 14 (2606 words) Published: November 9, 2011

Risk assessment and physical security survey of any building is critical in order minimize to the venerability of being put to risk due to failure to install or put the necessary mechanism to curb such potential. There is a need for thorough analysis on the risk assessment and physical survey on implementation of practices, principles and procedures in installation security measures.


a) Risk

The term risk refers to the possible happening of undesirable event.

b) Security

It’s the implementation of set of acceptable practices, procedures and principles that, when taken as a whole, have the effect of altering the ratio of undesirable events to total events.

c) Security survey

This is the critical onsite examination to ascertain the present security status, identify deficiencies or excesses, determine protection needed and make recommendation to improve the overall security of the operation. Charles A. Sennewald a security consultant and author says that the primary vehicles used in a security assessment is survey, which is the process whereby one gathers data that reflects the who, what, how, where, when and why of the clients existing operation. It’s the fact finding process.

It’s a comprehensive physical examination of a premise and thorough inspection of all security and proceeding. Its an effective tool for helping corporate security professionals to reduce crime at their facilities. According to Robert J. Fischer and Gion Green, they said the objective of security survey is the analysis of a facility to determine the existing state of security, to locate weakness of its defense, to determine the degree of protection needed and to lead to recommendations for establishing a total security programme.

Security survey areas

I. Surveillance

In order to improve and enhance quick ways in criminal detection, apprehension and deterrence, the perimeter should have frequency patrols done by in-house proprietary guards, surveillance devices, crossed circuit television (CCTV) and picture motion cameras. This will aid in twenty four hours security surveillance of the perimeter. CCTV should be monitored continuously in order to ensure every move or activities within the building perimeter are well captured.

Surveillance may be covert or overt. Counter surveillance may be used which is the practice of avoiding surveillance. Its helps on how to delete a file on computer to avoid it becoming the target of direct advertising agencies. On the other hand, inverse surveillance which attempts to subvert the panoptic gaze of surveillance recording widely available may be employed.

II. Paper shredding and recycling

Information on paper can be in wrong hand and used as used as threat against us. Financial reports, marketing plans, sale reports, customer list and future plans must be kept secrets. Proper handling of such documents is vital. All should be shredded to curb any possibilities of them being falling in wrong hands if someone gets them and recycle them.

III. Security lighting

Security lights helps in detection of intruders, deter intruder. They should be designed carefully as poor arranged lighting create glare which obstruct vision. Security lamps are subject to vandalism hence should be mounted high or protected by wire mesh, others may be recessed from view and access with the light directed out through a light pipe or reflected from a stainless steel mirror. Some consideration should be put in place to when carrying out installation;

- They should reduce and prevent glare

- Multiple lamps provide even illumination reducing pool shadow and provide redundancy if one lamps blow out.

- Prevent malicious tampering of circuit, wire to the lamps and protected electrical meter box locked. Control and power lines buried well underground or at height of 8 meters.

Other lights may be activated by sensors such as passive infrared...

References: 1. Geoff Graighead, (2009).High-Rise security & fire life property (2nd ed). USA publishers.
2. Lawrence, J. Fennelly. Effective physical security. (2004).
3. James F. Brada. Risk analysis and Security survey. (3rd ed) USA publisher.
4. Karim, H. Vellan.Strategic security management: a risk analysis assessment guide for decision makers (2007).
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Border Security Essay
  • 7 Layers of Lotu Security Essay
  • jail security automation using android mobile Essay
  • Gsm Based Portabel Vehicle Security System Essay
  • Physical Security
  • Vehicle Security System Research Paper
  • Intelligent Home-based Security System Essay
  • Essay on Windows Workgroup vs. Windows 2003 Security Models

Become a StudyMode Member

Sign Up - It's Free