Risk assessment and physical security survey of any building is critical in order minimize to the venerability of being put to risk due to failure to install or put the necessary mechanism to curb such potential. There is a need for thorough analysis on the risk assessment and physical survey on implementation of practices, principles and procedures in installation security measures.
The term risk refers to the possible happening of undesirable event.
It’s the implementation of set of acceptable practices, procedures and principles that, when taken as a whole, have the effect of altering the ratio of undesirable events to total events.
c) Security survey
This is the critical onsite examination to ascertain the present security status, identify deficiencies or excesses, determine protection needed and make recommendation to improve the overall security of the operation. Charles A. Sennewald a security consultant and author says that the primary vehicles used in a security assessment is survey, which is the process whereby one gathers data that reflects the who, what, how, where, when and why of the clients existing operation. It’s the fact finding process.
It’s a comprehensive physical examination of a premise and thorough inspection of all security and proceeding. Its an effective tool for helping corporate security professionals to reduce crime at their facilities. According to Robert J. Fischer and Gion Green, they said the objective of security survey is the analysis of a facility to determine the existing state of security, to locate weakness of its defense, to determine the degree of protection needed and to lead to recommendations for establishing a total security programme.
Security survey areas
In order to improve and enhance quick ways in criminal detection, apprehension and deterrence, the perimeter should have frequency patrols done by in-house proprietary guards, surveillance devices, crossed circuit television (CCTV) and picture motion cameras. This will aid in twenty four hours security surveillance of the perimeter. CCTV should be monitored continuously in order to ensure every move or activities within the building perimeter are well captured.
Surveillance may be covert or overt. Counter surveillance may be used which is the practice of avoiding surveillance. Its helps on how to delete a file on computer to avoid it becoming the target of direct advertising agencies. On the other hand, inverse surveillance which attempts to subvert the panoptic gaze of surveillance recording widely available may be employed.
II. Paper shredding and recycling
Information on paper can be in wrong hand and used as used as threat against us. Financial reports, marketing plans, sale reports, customer list and future plans must be kept secrets. Proper handling of such documents is vital. All should be shredded to curb any possibilities of them being falling in wrong hands if someone gets them and recycle them.
III. Security lighting
Security lights helps in detection of intruders, deter intruder. They should be designed carefully as poor arranged lighting create glare which obstruct vision. Security lamps are subject to vandalism hence should be mounted high or protected by wire mesh, others may be recessed from view and access with the light directed out through a light pipe or reflected from a stainless steel mirror. Some consideration should be put in place to when carrying out installation;
- They should reduce and prevent glare
- Multiple lamps provide even illumination reducing pool shadow and provide redundancy if one lamps blow out.
- Prevent malicious tampering of circuit, wire to the lamps and protected electrical meter box locked. Control and power lines buried well underground or at height of 8 meters.
Other lights may be activated by sensors such as passive infrared...
References: 1. Geoff Graighead, (2009).High-Rise security & fire life property (2nd ed). USA publishers.
2. Lawrence, J. Fennelly. Effective physical security. (2004).
3. James F. Brada. Risk analysis and Security survey. (3rd ed) USA publisher.
4. Karim, H. Vellan.Strategic security management: a risk analysis assessment guide for decision makers (2007).
Please join StudyMode to read the full document