Section – 1 Introduction
There is a need for organizations to install and deploy some form of physical security to protect assets against unwanted damages. This can be done through various techniques and mixes of security technologies, as a comprehensive plan of protecting organizational assets. This document presents a plan for deploying physical security in an organization using a layered approach to control access, monitor and deter any malpractice that may lead to loss or damage to a resource. This document has therefore been developed to en lighten users on the project and the expectations including benefits that it is attached to. The plan indicates how various systems will interact with each other in order to meet the security needs of the organization.
Section 2 – CPTED Approach
In re-enforcing physical security using the layered approach, there is the CPTED (Crime Prevention through Environmental Design) approach that will be used for implementation. In order to understand the approach, CPTED can be defined as the technique of reducing crime based on an analysis function and site design in order to reduce instances of physical attacks (Atlas 1). It is used by law enforcement officers to prevent any form of physical attack by creating an environment that promotes safe behavioral characteristics (Feins et al. 166).
In cementing the use of CPTED, there are three approaches such as natural access control, surveillance and territorial reinforcement which shall be covered to address the pending security design issues.
Natural Access Control:
The plan for implementing security shall consist of a method of preventing access near the organization by developing a perception of risk. It will be part of an access management that involves the use of design features within the built environment to reduce harm to a physical resource (Smith and Brooks 113). In implementing this first principle, the organization shall be able to prevent a potential intruder from accessing private structural elements including other areas within the organization. This will however be made possible through the placement of critical design elements such as entrances, exits and fencing in potential areas.
Section 3 – Surveillance:
This is an act that increases chances of a culprit of being noticed. The design elements shall consist of features to increase visibility within the organization. This aspect will enable persons around the area to be able to spot suspicious people either from an open environment or from inside buildings. To allow this, the features of landscaping, lighting aspects and window structures will be taken into consideration to increase visibility.
This commonest design feature will be used to demarcate the territory to distinguish between the private and public space. In implementing such, an ownership shall be created which will allow for easy identification of an intruder in specified private places within the organization. In addition to this, in order to fully maximize the integrity issues within the building, there shall be a surveillance system, with this being to capture images that are far away from the building. The technology however will depend on the area of placement, recording capability and the type of camera. In wide areas, the surveillance system will need to be able to capture the entire area, with a wider recording capability, to capture minute details around the area. In addition to that, the technology should also be able to have good recording capability that is able to record and capture finer details from any point.
Section 4 – Outdoor Barriers
Such that would be used include fences, parameter walls, gates and parameter gaps.
These basically are physical security features that offer first line protection to buildings against any intrusion attempt. They are important as they offer a point of demarcation hence privacy within the organizational.
Section 5 – Locks
The following types of locks shall be considered:
High-security locks: These are locks that would render skilled and programmed instances of theft. In this case, the high-security locks would be placed in hidden areas and other sections with sensitive information/data.
Resistant locks: These are types of locks that would be used inside buildings. They would prevent unskilled employees with malicious motives from tampering secretly with the lock.
Basic locks: Will be for open areas such as car park that are essentially not sensitive, given the surveillance cameras deployed in the area.
Section 6 – Lighting considerations
Parking lot: There could be an option of using flood lights, commercial LED canopy lights or wall mounted lights in this area. In either of the above, the option chosen will be important as it would help in visual tasks or for safety and security to any asset parked at the parking slot.
Entry points: There is an option of using LED wall lights in this area. In this case, the option chosen is important as it would help guide users or employees during entry. A consideration is that it should be connected to an emergency circuit to reduce blackouts in this area whatsoever the case.
Office space: There will be an option of using florescent tubes for office lighting. It will be important as it would help provide enough illumination in terms of quality and quantity.
Section 7 – Alarm options
A central station signaling approach would be most appropriate in this situation because it would enable the facility to be interconnected to other institutional facilities or agencies such as a fire station which would be essential in instances where external help would be needed. This would encourage faster response rates and coordination for security purposes. In other instances, a central signaling approach would be much flexible to adopt which would reduce costs of implementing trailing cables and other infrastructural requirements.
In this configuration, the options would be:
Fire alarm: for alerting the administration in case of fire outbreak within the vicinity.
Burglar alarm: for securing and preventing intruders from accessing the building.
Section 8–Entry control
In enforcing entry control, an employee badging system would be used, with these types of cards being considered.
Standard ID cards: These will be used for visual identity purposes, and at the same time will be fitted with some identity guard features.
Proximity cards: These will be fitted with RFID features whereby there will be no need to complete insertion of the card into the badging system since they would be contactless.
Smart cards: Are more advanced cards with additional internal capabilities for storing employee information (Fennelly 193). They would help the organization to track employee movement.
Section 9 – Conclusion
The CPTED approach remains to be the best in implementing security design within the built environment. This is because it encompasses the components that are critical in deploying a security system within an organization. It is therefore important for organizations with critical assets such as data to consider this approach as it would help safeguard the critical elements.
Atlas, Randall I. 21st Century Security and Cpted: Designing for Critical Infrastructure Protection and Crime Prevention. Boca Raton: CRC Press, 2013. Web.
Fennelly, Lawrence. Effective Physical Security. Burlington: Elsevier, 2003. Web.
Feins, Judith D, Joel Epstein, and Rebecca Widom. Solving Crime Problems in Residential Neighborhoods: Comprehensive Changes in Design, Management, and Use. Washington, D.C: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 1997. Print.
Smith, Clifton, and David J. Brooks. Security Science: The Theory and Practice of Security. Burlington: Elsevier Science, 2012. Web.