Open Always
Email: Call Now! +1-315 515-4588
Open Always
Email: Call Now! +1-315 515-4588

Sample Essay on HLS 210 Physical Security

This sample paper on (Sample Essay on HLS 210 Physical Security)was uploaded by one our contributors and does not necessarily reflect how our professionals write our papers. If you would like this paper removed from our website, please contact us our Contact Us Page.

A Database of over Million Scholarly Resources. Start your Search Now

Sample Essay on HLS 210 Physical Security

Section – 1 Introduction

There is a need for organizations to install and deploy some form of physical security to protect assets against unwanted damages. This can be done through various techniques and mixes of security technologies, as a comprehensive plan of protecting organizational assets. This document presents a plan for deploying physical security in an organization using a layered approach to control access, monitor and deter any malpractice that may lead to loss or damage to a resource. This document has therefore been developed to en lighten users on the project and the expectations including benefits that it is attached to. The plan indicates how various systems will interact with each other in order to meet the security needs of the organization.

Section 2 – CPTED Approach

In re-enforcing physical security using the layered approach, there is the CPTED (Crime Prevention through Environmental Design) approach that will be used for implementation. In order to understand the approach, CPTED can be defined as the technique of reducing crime based on an analysis function and site design in order to reduce instances of physical attacks (Atlas 1). It is used by law enforcement officers to prevent any form of physical attack by creating an environment that promotes safe behavioral characteristics (Feins et al. 166).

In cementing the use of CPTED, there are three approaches such as natural access control, surveillance and territorial reinforcement which shall be covered to address the pending security design issues.

Natural Access Control:

The plan for implementing security shall consist of a method of preventing access near the organization by developing a perception of risk. It will be part of an access management that involves the use of design features within the built environment to reduce harm to a physical resource (Smith and Brooks 113). In implementing this first principle, the organization shall be able to prevent a potential intruder from accessing private structural elements including other areas within the organization. This will however be made possible through the placement of critical design elements such as entrances, exits and fencing in potential areas.    

Section 3 – Surveillance:

This is an act that increases chances of a culprit of being noticed. The design elements shall consist of features to increase visibility within the organization. This aspect will enable persons around the area to be able to spot suspicious people either from an open environment or from inside buildings. To allow this, the features of landscaping, lighting aspects and window structures will be taken into consideration to increase visibility.  



Territorial enforcement:

This commonest design feature will be used to demarcate the territory to distinguish between the private and public space. In implementing such, an ownership shall be created which will allow for easy identification of an intruder in specified private places within the organization. In addition to this, in order to fully maximize the integrity issues within the building, there shall be a surveillance system, with this being to capture images that are far away from the building. The technology however will depend on the area of placement, recording capability and the type of camera. In wide areas, the surveillance system will need to be able to capture the entire area, with a wider recording capability, to capture minute details around the area. In addition to that, the technology should also be able to have good recording capability that is able to record and capture finer details from any point.

Section 4 – Outdoor Barriers

Such that would be used include fences, parameter walls, gates and parameter gaps.

These basically are physical security features that offer first line protection to buildings against any intrusion attempt. They are important as they offer a point of demarcation hence privacy within the organizational.


Section 5 – Locks

The following types of locks shall be considered:

High-security locks: These are locks that would render skilled and programmed instances of theft. In this case, the high-security locks would be placed in hidden areas and other sections with sensitive information/data.

Resistant locks: These are types of locks that would be used inside buildings. They would prevent unskilled employees with malicious motives from tampering secretly with the lock.

Basic locks: Will be for open areas such as car park that are essentially not sensitive, given the surveillance cameras deployed in the area.

Section 6 – Lighting considerations

Parking lot: There could be an option of using flood lights, commercial LED canopy lights or wall mounted lights in this area. In either of the above, the option chosen will be important as it would help in visual tasks or for safety and security to any asset parked at the parking slot.


Entry points: There is an option of using LED wall lights in this area. In this case, the option chosen is important as it would help guide users or employees during entry. A consideration is that it should be connected to an emergency circuit to reduce blackouts in this area whatsoever the case.

Office space: There will be an option of using florescent tubes for office lighting. It will be important as it would help provide enough illumination in terms of quality and quantity.

Section 7 – Alarm options

A central station signaling approach would be most appropriate in this situation because it would enable the facility to be interconnected to other institutional facilities or agencies such as a fire station which would be essential in instances where external help would be needed. This would encourage faster response rates and coordination for security purposes. In other instances, a central signaling approach would be much flexible to adopt which would reduce costs of implementing trailing cables and other infrastructural requirements.

In this configuration, the options would be:

Fire alarm: for alerting the administration in case of fire outbreak within the vicinity.

Burglar alarm: for securing and preventing intruders from accessing the building.                                                

Section 8–Entry control

In enforcing entry control, an employee badging system would be used, with these types of cards being considered.

Standard ID cards: These will be used for visual identity purposes, and at the same time will be fitted with some identity guard features.

Proximity cards: These will be fitted with RFID features whereby there will be no need to complete insertion of the card into the badging system since they would be contactless.

Smart cards: Are more advanced cards with additional internal capabilities for storing employee information (Fennelly 193). They would help the organization to track employee movement.


Section 9 – Conclusion

The CPTED approach remains to be the best in implementing security design within the built environment. This is because it encompasses the components that are critical in deploying a security system within an organization. It is therefore important for organizations with critical assets such as data to consider this approach as it would help safeguard the critical elements.














Works Cited

Atlas, Randall I. 21st Century Security and Cpted: Designing for Critical Infrastructure Protection and Crime Prevention. Boca Raton: CRC Press, 2013. Web.

Fennelly, Lawrence. Effective Physical Security. Burlington: Elsevier, 2003. Web.

Feins, Judith D, Joel Epstein, and Rebecca Widom. Solving Crime Problems in Residential Neighborhoods: Comprehensive Changes in Design, Management, and Use. Washington, D.C: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 1997. Print.

Smith, Clifton, and David J. Brooks. Security Science: The Theory and Practice of Security. Burlington: Elsevier Science, 2012. Web.


Sharing is: CARING

Are you looking for homework writing help? Click on Order Now button below to Submit your assignment details.

Homework Writing Help
We Can Help you with this Assignment right now!
Sample Essay on HLS 210 Physical Security

Are you looking for homework writing help on (Sample Essay on HLS 210 Physical Security)?Well, you can either use the sample paper provided to write your paper or you could contact us today for an original paper. If you are looking for an assignment to submit, then click on ORDER NOW button or contact us today. Our Professional Writers will be glad to write your paper from scratch.



We ensure that assignment instructions are followed, the paper is written from scratch. If you are not satisfied by our service, you can either request for refund or unlimited revisions for your order at absolutely no extra pay. Once the writer has completed your paper, the editors check your paper for any grammar/formatting/plagiarism mistakes, then the final paper is sent to your email.

Privacy| Confidentiality

Sample Essay on HLS 210 Physical Security

We do not share your personal information with any company or person. We have also ensured that the ordering process is secure; you can check the security feature in the browser. For confidentiality purposes, all papers are sent to your personal email. If you have any questions, contact us any time via email, live chat or our phone number.

Our Clients Testimonials

  • I appreciate help on the assignment. It was hard for me but am good to go now

    Impact of pollution on Environment
  • Am happy now having completed the very difficult assignment

    Creative Message Strategies
  • Your writer did a fine job on the revisions. The paper is now ok

    Ethics: Theory and Practice
  • The paper was so involving but am happy it is done. Will reach you with more assignments

    Title: Privatization in or of America
  • I expected perfection in terms of grammar and I am happy. Lecturer is always on our head but was pleased with my paper. Once again, thanks a lot

    Title: Bundaberg Inquiry
  • The paper looks perfect now, thank to the writer

    Health Care Systems
  • You helped me complete several other tasks as you handled paper. wonna thank you

    Critique Paper on Political Change

Related Articles

Sample Essay on HLS 210 Physical Security

What Best Practices Do Healthcare Faculty Use During Coronavirus Pandemic to Increase Outcomes

This is formal Research paper. Please use the introduction I provided and only use Peer Reviewed Journals as citations. Use APA7 for citations. The number of Citations does not have...
Read More

1500 words report on Exploring the functions of management 1500 Words

Please see file attached.Introduction to ManagementAssignment 3 : Exploring the functions of management
Read More

Get more from us…

Would you like this sample paper to be sent to your email or would you like to receive weekly articles on how to write your assignments? You can simply send us your request on how to write your paper and we will email you a free guide within 24-36 hours. Kindly subscribe below!

Email Address: