SECTION 1- Introduction
There is a need for organizations to implement and deploy some form of physical security within their organizations to protect assets against damage and theft. This can be done by implementing various techniques of security technologies, as a method of protecting organizational assets. This document has therefore been developed to highlight some specifications on the project and the expectations including benefits of implementing such an approach.
SECTION 2 – Crime Prevention through Environmental Design Approach- CPTED
A layered approach can be used in this case through the CPTED approach. To understand this approach in detail, it is defined as a method of mitigating crime through the use of an analysis function and site design. This approach is used by law enforcement officers to reduce instances of insecurity within the built environment. In implementing the CPTED approach, there are various approaches which can be used, among them being legibility, natural access control, surveillance and territorial reinforcement, of which will be highlighted in depth to address the security design issues in order to guarantee the maximum possible security within the organizational setup.
Within the organizational security set-up, an area is said to be legible if it has been designed to easily allow people to be able to understand and to know their whereabouts at any given point of time. In other words, people accessing the given area should be able to know where they are heading to without being confused. Therefore, in implementing this principle, it would make the area to be accessible by various parties, through giving direction in known ways. Therefore, people would be able to know where they are heading to, whereby any suspicious movement or persons that are lost would raise some attention hence reducing instances of theft and breakage.
Natural Access Control
The principle of natural access control aims to reduce unauthorized access to a given organizational facility. In implementing this principle, the organization shall reduce tendencies of unauthorized access as well as the interference with other structural elements and areas including those closer to the buildings. This will however be implemented by placing access gates and other barriers in areas of entry.
This is the commonest security design feature used in most urban environments. This design feature will be used to demarcate the territory in order to distinguish between the private and public environments, hence, will also establish the jurisdiction of the two areas which will help prevent intruders from gaining access to such demarcated and controlled regions. Other than demarcating the organizational areas, there will be the need to reinforce the territorial concept through the use of visual aides to deter intruders and other on looking individuals from accessing the facility. To implement this, visual aids and signage will be considered in order to guide and control external internal movements within and outside the facility, hence bring out a clear separation between a public and private space.
SECTION 3 – Surveillance:
Surveillance has been used almost everywhere in the world of security, with it being to detect an intruder in restricted areas. In order to implement the security element, the design will consist of features to increase visibility within the building so as to be able to detect an intruder by monitoring the surveillance system. This aspect will enable persons around the area to be able to spot suspicious people in a given restricted area. To facilitate this, other features in landscaping and lighting such as implementing appropriate window structures will be taken into consideration in order to increase visibility within the area.
SECTION 4 – Outdoor barriers
Outdoor barriers are specifically physical security features offering first line protection within the built environment, against unauthorized intrusion. These include parameter walls, fences and gates, which are also used in demarcating areas within organizations in order to increase security. They are important as they indicate given restricted areas hence increase privacy around buildings, and at the same time offer some protection to organizational structures such as offices.
SECTION 5 – Locks
Locks are integral elements in security, as they deter unauthorized personnel’s from gaining entry into restricted areas. In this scenario, the following sets of locks will be considered to enhance security within and outside the building depending on the threat level and nature of resources inside the areas.
High-security locks: They are locks that will be used to prevent skilled and programmed burglary and theft cases within and inside the organization. In this case, the high-security locks will be used to secure entrances and doors securing areas with sensitive information/data
Resistant locks: They are locks that will be used inside the organization. They will be used to deter unskilled employees and intruders with ill motives from accessing the sensitive areas.
Basic locks: They will be used in areas such as the car park and main entrance which are not sensitive, but to provide some form of access control to the building.
SECTION 6 – Lighting considerations
Parking lot: To implement security design principles, there will be options for using flood lights, or wall mounted lighting devices in this section. In considering the options, the option chosen will be important as it would help provide illumination during night time for safety and security in order to prevent damage to resources in these areas.
Entry: This will need to be very visible as it will allow workers to gain entry in the area. The LED wall light will be used in this area, as it would help guide users or employees entering the building. In considering the implementation of lighting in this area, the lighting system should be connected to the emergency circuit of the organization in order for the entry to have a source of illumination in case there are power outages.
Office space: This is the most delicate area given that employees will be available in these areas most of the times. In considering this, a florescent tube for office lighting will be installed to provide enough light. The above will be important in order to provide enough light and most importantly enough illumination in terms of quality and quantity, in regard to the areas.
SECTION 7 – Alarm options
In implementing an alarm option, there will be the need to implement a central station signalling system, as it would enable the organization to be connected to other agencies such as the fire department that would be important in emergency situations where there is need for external help, which would facilitate a faster response rate and coordination in order to achieve efficiency. The central signalling system would also reduce costs of constructing infrastructural facilities for the same purpose.
In implementing the system, the options would be to install a fire alarm and a burglar alarm system. The fire alarm would alert the administration during fire outbreak while a burglar alarm would help scare intruders from gaining access into the building.
SECTION 8–Entry control
To enforce the above, an employee badging system will be used, with options of the standard ID card, proximity cards and smart cards depending on the level of security and privileges of persons using the badges.
The standard ID cards: These will be used for identification purposes, in that employees accessing the building will need to display the cards.
Proximity cards: These types of cards will be fitted with an RFID feature that will enable the system to capture employee or visitor information upon a close swipe.
Smart cards: They are more advanced since they will be able to store employee information, which on the other hand would be essential when tracking employee movement for the organizational security purposes.
SECTION 9 – Conclusion
Secure design remains an integral element that is important in the 21st century, as it helps organizations with sensitive information to prevent theft cases. In analysing the various elements, a Crime Prevention through Environmental Design (CPTED) approach remains the best approach in implementing various security features within the organization, as it encompasses the various elements critical in deploying a standard security system in an organization of high potential to attack due to the nature of operations and activities therein.
It will therefore be important to include part of the CPTED concepts, in order to minimise security breaches, while maintain a conducive environment necessary for the organizational activities and operations.