Open Always
Email: support@globalcompose.com Call Now! +1-315 515-4588
Open Always
Email: support@globalcompose.com Call Now! +1-315 515-4588

Sample Essay on Physical Security

This sample paper on (Sample Essay on Physical Security) was uploaded by one our contributors and does not necessarily reflect how our professionals write our papers. If you would like this paper removed from our website, please contact us via our Contact Us Page.

A Database of over Million Scholarly Resources. Start your Search Now

Sample Essay on Physical Security

SECTION 1- Introduction

There is a need for organizations to implement and deploy some form of physical security within their organizations to protect assets against damage and theft. This can be done by implementing various techniques of security technologies, as a method of protecting organizational assets. This document has therefore been developed to highlight some specifications on the project and the expectations including benefits of implementing such an approach.

SECTION 2 – Crime Prevention through Environmental Design Approach- CPTED

A layered approach can be used in this case through the CPTED approach. To understand this approach in detail, it is defined as a method of mitigating crime through the use of an analysis function and site design. This approach is used by law enforcement officers to reduce instances of insecurity within the built environment. In implementing the CPTED approach, there are various approaches which can be used, among them being legibility, natural access control, surveillance and territorial reinforcement, of which will be highlighted in depth to address the security design issues in order to guarantee the maximum possible security within the organizational setup.

Legibility

Within the organizational security set-up, an area is said to be legible if it has been designed to easily allow people to be able to understand and to know their whereabouts at any given point of time. In other words, people accessing the given area should be able to know where they are heading to without being confused. Therefore, in implementing this principle, it would make the area to be accessible by various parties, through giving direction in known ways. Therefore, people would be able to know where they are heading to, whereby any suspicious movement or persons that are lost would raise some attention hence reducing instances of theft and breakage.

Natural Access Control

The principle of natural access control aims to reduce unauthorized access to a given organizational facility. In implementing this principle, the organization shall reduce tendencies of unauthorized access as well as the interference with other structural elements and areas including those closer to the buildings. This will however be implemented by placing access gates and other barriers in areas of entry.

Territorial enforcement:

This is the commonest security design feature used in most urban environments. This design feature will be used to demarcate the territory in order to distinguish between the private and public environments, hence, will also establish the jurisdiction of the two areas which will help prevent intruders from gaining access to such demarcated and controlled regions. Other than demarcating the organizational areas, there will be the need to reinforce the territorial concept through the use of visual aides to deter intruders and other on looking individuals from accessing the facility. To implement this, visual aids and signage will be considered in order to guide and control external internal movements within and outside the facility, hence bring out a clear separation between a public and private space.   

SECTION 3Surveillance:

Surveillance has been used almost everywhere in the world of security, with it being to detect an intruder in restricted areas. In order to implement the security element, the design will consist of features to increase visibility within the building so as to be able to detect an intruder by monitoring the surveillance system. This aspect will enable persons around the area to be able to spot suspicious people in a given restricted area. To facilitate this, other features in landscaping and lighting such as implementing appropriate window structures will be taken into consideration in order to increase visibility within the area.

               

SECTION 4 – Outdoor barriers

Outdoor barriers are specifically physical security features offering first line protection within the built environment, against unauthorized intrusion. These include parameter walls, fences and gates, which are also used in demarcating areas within organizations in order to increase security. They are important as they indicate given restricted areas hence increase privacy around buildings, and at the same time offer some protection to organizational structures such as offices.

             

SECTION 5 – Locks

Locks are integral elements in security, as they deter unauthorized personnel’s from gaining entry into restricted areas. In this scenario, the following sets of locks will be considered to enhance security within and outside the building depending on the threat level and nature of resources inside the areas.

High-security locks: They are locks that will be used to prevent skilled and programmed burglary and theft cases within and inside the organization. In this case, the high-security locks will be used to secure entrances and doors securing areas with sensitive information/data.

 

                                      

Resistant locks: They are locks that will be used inside the organization. They will be used to deter unskilled employees and intruders with ill motives from accessing the sensitive areas.

Basic locks: They will be used in areas such as the car park and main entrance which are not sensitive, but to provide some form of access control to the building.

                                        

SECTION 6 – Lighting considerations

Parking lot: To implement security design principles, there will be options for using flood lights, or wall mounted lighting devices in this section. In considering the options, the option chosen will be important as it would help provide illumination during night time for safety and security in order to prevent damage to resources in these areas.

Entry: This will need to be very visible as it will allow workers to gain entry in the area. The LED wall light will be used in this area, as it would help guide users or employees entering the building. In considering the implementation of lighting in this area, the lighting system should be connected to the emergency circuit of the organization in order for the entry to have a source of illumination in case there are power outages.

Office space: This is the most delicate area given that employees will be available in these areas most of the times. In considering this, a florescent tube for office lighting will be installed to provide enough light. The above will be important in order to provide enough light and most importantly enough illumination in terms of quality and quantity, in regard to the areas.

SECTION 7 – Alarm options

In implementing an alarm option, there will be the need to implement a central station signalling system, as it would enable the organization to be connected to other agencies such as the fire department that would be important in emergency situations where there is need for external help, which would facilitate a faster response rate and coordination in order to achieve efficiency. The central signalling system would also reduce costs of constructing infrastructural facilities for the same purpose.

In implementing the system, the options would be to install a fire alarm and a burglar alarm system. The fire alarm would alert the administration during fire outbreak while a burglar alarm would help scare intruders from gaining access into the building.

 

 

 

SECTION 8–Entry control

To enforce the above, an employee badging system will be used, with options of the standard ID card, proximity cards and smart cards depending on the level of security and privileges of persons using the badges.

The standard ID cards: These will be used for identification purposes, in that employees accessing the building will need to display the cards.

Proximity cards: These types of cards will be fitted with an RFID feature that will enable the system to capture employee or visitor information upon a close swipe.

Smart cards: They are more advanced since they will be able to store employee information, which on the other hand would be essential when tracking employee movement for the organizational security purposes.

SECTION 9 – Conclusion

Secure design remains an integral element that is important in the 21st century, as it helps organizations with sensitive information to prevent theft cases. In analysing the various elements, a Crime Prevention through Environmental Design (CPTED) approach remains the best approach in implementing various security features within the organization, as it encompasses the various elements critical in deploying a standard security system in an organization of high potential to attack due to the nature of operations and activities therein.

It will therefore be important to include part of the CPTED concepts, in order to minimise security breaches, while maintain a conducive environment necessary for the organizational activities and operations.

Sharing is: CARING

Are you looking for homework writing help? Click on Order Now button below to Submit your assignment details.

Homework Writing Help
We Can Help you with this Assignment right now!
Sample Essay on Physical Security

Are you looking for homework writing help on (Sample Essay on Physical Security)?Well, you can either use the sample paper provided to write your paper or you could contact us today for an original paper. If you are looking for an assignment to submit, then click on ORDER NOW button or contact u today. Our Professional Writers will be glad to write your paper from scratch.

 

 

 

We ensure that assignment instructions are followed, the paper is written from scratch. If you are not satisfied by our service, you can either request for refund or unlimited revisions for your order at absolutely no extra pay. Once the writer has completed your paper, the editors check your paper for any grammar/formatting/plagiarism mistakes, then the final paper is sent to your email.

Privacy| Confidentiality

Sample Essay on Physical Security

We do not share your personal information with any company or person. We have also ensured that the ordering process is secure; you can check the security feature in the browser. For confidentiality purposes, all papers are sent to your personal email. If you have any questions, contact us any time via email, live chat or our phone number.

Our Clients Testimonials

  • I appreciate help on the assignment. It was hard for me but am good to go now

    Impact of pollution on Environment
  • Am happy now having completed the very difficult assignment

    Creative Message Strategies
  • Your writer did a fine job on the revisions. The paper is now ok

    Ethics: Theory and Practice
  • The paper was so involving but am happy it is done. Will reach you with more assignments

    Title: Privatization in or of America
  • I expected perfection in terms of grammar and I am happy. Lecturer is always on our head but was pleased with my paper. Once again, thanks a lot

    Title: Bundaberg Inquiry
  • The paper looks perfect now, thank to the writer

    Health Care Systems
  • You helped me complete several other tasks as you handled paper. wonna thank you

    Critique Paper on Political Change

Related Articles

Sample Essay on Physical Security

Get more from us…

Would you like this sample paper to be sent to your email or would you like to receive weekly articles on how to write your assignments? You can simply send us your request on how to write your paper and we will email you a free guide within 24-36 hours. Kindly subscribe below!

Email Address: support@globalcompose.com