This website uses cookies to ensure you have the best experience. Learn more

Effective Physical Security Essay

2515 words - 10 pages

In order to have an effective physical security program you need to know what you are protecting and why you are protecting it. Physical Security encompasses the protection of people, places, things, and data. Protecting each of these elements requires different pieces of equipment or different avenues but the philosophy of the protection is the same. In this I mean that you are protecting from unauthorized access to the places, people, things, and data.
As stated by Fennelly, “no business is without security problems and assets protection risks. “ I have read this and still don’t understand what he is getting at so I came up with my interpretation of his statement; no business is without security problems and the need for asset protection. This being said everyone understands that problems will exist in any security program, and assets will always need to be protected from unauthorized access or loss. The key is to find the correct mix of physical layers that’s cost effective while providing a strong physical security posture.
People have been using physical security measures such as barriers for protection for centuries (McCrie, 2007). Every living thing uses physical security to protect their home, family, and themselves with some form of barriers. These barriers can be either man-made or natural as long as they define, delay, or detect unauthorized access (Fennelly, 2004). These barriers are used to protect not only the facility but the assets located inside. I will describe these barriers starting from the outside and working into the facility.
When your facility is being designed you need to be included so you can ensure the security measures you want are in place. This way you are able to incorporate your needs and desires into the facility this includes the parking lot, nearby streets, and alleyways. Designing the protective measures that will protect your facility will give you security in-depth once you are complete. In this security in-depth you will have your first line of defense which is the grounds around your building (Fennelly, 2004).
Starting in the parking lot you want to have it set up so that you can have clear surveillance of the parking while still providing adequate parking for your visitors and employees. The use of barriers will assist in these measures by directing vehicle traffic away from the front of the building so pedestrian traffic is safe. Be careful here though so you don’t want to put the parking so far away that you put the visitors and employees in danger by requiring them to be out of sight of the building while walking to their vehicles. The barriers that are used will provide a channeling effect for pedestrians to specific entrances.
These barriers that are protecting the outside of the facility are either man-made or natural and depending on how they are used will determine other security measures that may be needed. Man-made barriers that can be used are fences, vehicle barriers, and doors. ...

Find Another Essay On Effective Physical Security

Architecture and design considerations that should go into building a "secure" network

938 words - 4 pages dictate the level of physical access to workstations, servers and network devices. Additionally, data handling and chain of custody for backups are critical aspects of the security policy. Password complexity, length, and expiration are only a small portion of an effective security posture. A sound Active Directory schema must be designed to establish a hierarchy of rights and permissions by group and user. Inherited, special and granular right and

Auditing the IT Security Function: An Effective Framework

3483 words - 14 pages strictly follow the global security standards, such as ISO 17799.Objective of the AuditThe overall objective of the audit is to ensure the compliance of all sensitive information and Government Security Policy (GSP) and the operational standards and the effectiveness and efficiency of the security program at each organisation. This broad objective is examined by focusing on the effectiveness of the management structure of the Physical Security

The importance of a comprehensive security policy for modern businesses

2140 words - 9 pages compliance of all sensitive information and Government Security Policy (GSP) and the operational standards and the effectiveness and efficiency of the security program at each organization. This broad objective is examined by focusing on the effectiveness of the management structure of the Physical Security, Personal Security and Systems Security. (Consulting and Audit Canada, 2004)The key objectives of IT auditing are:- Conform an organization's IT

Soboat Technology Inc.: Information Sercurity Plan

2272 words - 10 pages : Acceptable Use…………………………………………………………………………5 Physical Security………………………………………………………………………..6 Security Awareness Program…………………………………………………………...6 Password Protection…………………………………………………………………….7 Environment……………………………………………………………………………………….8 Equipment…………………………………………………………………………………………8 Misuse of Data…………………………………………………………………………………….9 Loss of Data……………………………………………………………………………………...10

airport security design

1975 words - 8 pages an airport is a systemic process. Developing an efficient design is ideal for the processing of passengers, airplanes, and cargo. A main objective in an airport’s layout is to design a plan that is both effective for airport operations, meets the security requirements of Local, State, and Federal requirements, but is also easy to manage from a security perspective. The operational areas of an airport include everything from parking and

Cybersecurity-Case Study

950 words - 4 pages the first life classroom include: 1- “The biggest potential weakness in cyber security policy is when IT group do not have any support. 2- The staff who are responsible for cyber security policy are IT professionals, because we cannot expect that executive management to be aware of security issues. 3- IT group is responsible for making sure that cyber security policy is enforced including tools. 4- The best way of understanding effective cyber

Organization IT and Security Systems: Disaster Recovery

1148 words - 5 pages backbone of a corporation data protection is a backup policy, which consists of detailed instructions and procedures. For a backup policy to be effective, it must explain in detail how a firm can continue business operations or survive a catastrophe. A backup policy needs to specify backup types, retention periods, and backup media. Managing and accessing system security involves six separate but interrelated levels: physical security, network

SecureTek Security Design

1379 words - 6 pages anything unusual that might happen. In addition, use of security doors that require security card authentication in the restricted areas is a strong security measure. Limiting physical access to the areas that store important information is major security measure. Placing physical limit to the servers, routers, server rooms, data centers and other electrical wiring closets can help prevent tampering, misuse and even theft. Servers and network securities

Transitioning into a Democracy

1651 words - 7 pages to govern its people, control its borders and protect its people can have vastly negatively effects on the international community.Tracing security in the international community down its original root will bring you to Human Security. Human security is the key to creating and maintaining international security. Human security is broken down into six elements: Food, health, environment, physical, community and political security, and if met, they

Human Rights

1651 words - 7 pages to govern its people, control its borders and protect its people can have vastly negatively effects on the international community.Tracing security in the international community down its original root will bring you to Human Security. Human security is the key to creating and maintaining international security. Human security is broken down into six elements: Food, health, environment, physical, community and political security, and if met, they

All about Network Security

873 words - 4 pages situations but other times these emails can contain spywares or viruses attached. Protection against Network threats There are a number of ways to protect the network from security threats. It requires certain hardware and software for a network security system to be effective and there should always be a backup so that if one security system fails to work the backup would start providing protection. In this way, your network would not become vulnerable

Similar Essays

Security In The Business Environment Essay

1919 words - 8 pages reliability of a supplier. This Security Management service management function (SMF) guides organization leaders and senior managers through issues that they should consider when developing an effective security policy and implementing it through a security program. The SMF discusses the individual and team security roles and their interrelationship with operational functions. The SMF also reviews tactics and best practices to increase staff

Information Security Credentials Essay

1389 words - 6 pages certification covers in detail information the ten different domains which comprise the (ISC)2. The ten different areas are Access Control, Application Security, Business Continuity and Disaster Recovery Planning, Cryptography, Information Security and Risk Management, Legal, Regulations, Compliance and Investigations, Operations Security, Physical (Environmental) Security, Security Architecture and Design, Telecommunications and Network Security (ISC2

Intorduction To It Security Essay

1201 words - 5 pages data from being in-advertently distributed across networks. Act as a deterrent to those trying to access the network illegally. Or warning users of the potential harm their actions may cause. In developing an IT security strategy, potential risks will need to be anticipated along with policies and procedures for the effective mitigation of these risks. There needs to be governing documentation that entails network design as well as security

The Value Private Security Management Brings To Businesses

741 words - 3 pages law enforcement work together in a complementary, rather that competitive, relationship to prevent crime and disorder (P.J. Ortmeier, 2005).The management of security operations may be categorized according to the security functions performed. These functions include the essential elements of physical security, personnel security, and information security. Physical security refers to tangible objects, such as walls, fences, locks, and building