DaitrusGarnes_CJ380_Week4_Assignment
docx
keyboard_arrow_up
School
ECPI University, Virginia Beach *
*We aren’t endorsed by this school
Course
380
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
4
Uploaded by Daigar2095
Why is it important to consider physical security measures during the remodel or new construction process? What are the specifics of designing various types of protection?
Physical security measures during the remodel or new construction process is important for many reasons. These reasons include building usage and security threats constantly changing and
becoming more sophisticated, security technologies rapidly advancing offering more expansive and timesaving tools, and upgrading to the right technologies will save the facility money. Certain specifics include door security that include access control, window security, video surveillance, alarm system, system monitoring, and an integrated security platform that consolidates all of security into one place to have everything needed to enforce, defend, detect, and respond to today’s threats with full-spectrum visibility (ATSWI, 2018).
How does information technology integrate into the various types of physical security systems? Please outline an example.
In the modern world, it’s become increasingly likely that virtual systems and IT-adjacent technologies are utilized to manage and control installed physical security devices, meaning that an effective and safe security system must be designed with input from both physical security and IT teams. Integrated IoT sensors, alarms, surveillance cameras and access systems can be used to provide a more holistic view of an organization’s physical security defenses utilized through a cloud-based security management system (Segil, 2023). An example would be the utilization of a cloud server within the intranet of a company’s network to backup videos and images taken from video surveillance or CCTV system for storage purposes.
What are the top risks to the exterior? Interior?
Internally, top risks include tailgating or an unauthorized person following an authorized person into a secured area, theft of physical items and sensitive documents and information, unaccounted visitors, social engineering attacks, and identity theft. External risks include forced entry or break-ins, vandalism, unauthorized entry from people outside of staff or approved visitor
list, and burglaries (Ahola, 2021).
What are the top interior and exterior security tools used to prevent and deter incidents?
Top interior and exterior security tools used to prevent and deter incidents include gates and fences, cameras and CCTVs, alarm systems, intrusion devices, access control systems, proper lighting systems, document and equipment disposal systems, and regular audits of these systems (McClure, 2021). Outline the different types of perimeter systems that exist to include the various types of lighting fixtures, fence protection, intrusion devices, and access control systems.
With lighting fixtures, the lighting can either be ongoing lighting or motion sensor. The lighting can be fixated on the buildings itself, or alongside poles and fences. With fence protection, many different forms of fences are available and used. These include barb-wired fences, electric shock fences, or electronic gates that open and close with keycard access, For intrusion devices, certain devices include electrostatic field disturbance sensors, microwave barriers, spot vibration sensors, fiber optic detection sensors, metal detectors, and lock rooms for anyone that gain initial
access without utilizing appropriate access protocols for entry. Access control systems include keycards and badges, turnstiles, thumbprint and retina scanning access systems, voice recognition access systems, keypad systems, and biometric pattern systems (TriStar, 2024),
What types of CCTV, biometric, alarm, and identification systems exist? Please outline examples in your submission.
Certain types of CCTVs include dome cameras, bullet cameras, IP cameras, degree cameras, 4K security cameras, PTZ cameras, night vision cameras, and varifocal cameras. Types of biometrics
include facial recognition, hand geometry, thumbprint, voice recognition, and DNA recognition. Types of identification systems include ID badges, personal identification numbers, barcoding, digitalized photography, and public key infrastructures.
Explain the importance of guard patrols. What are the challenges? Limitations? Costs?
The prime purpose of guard patrol is to maintain the security of the area and act as a crime deterrent. Their presence alone is enough to secure the client's site and reduce the risk of vandalism or theft at their property. Challenges include dealing with unpredictable circumstances, risk of physical harm, long and irregular hours, monotony, lack of recognition, emotional stress, and legal complexities. Limitations include inability to be in more than one place at a time, inability to make arrest and carry a weapon depending on the site and company, and inability to search belongings and vehicles without consent. What environmental variables need to be considered when planning physical security?
Environmental variables include geological activity like earthquakes, high-risk industries in the area, risk of flooding, and risk of force majeure, extreme temperatures, and extreme weather conditions.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
REFERENCES
ATSWI. (2018, December 01). Associated Technical Services. Physical Security Measures to Consider in Building Assessments. Retrieved from: https://atswi.com/physical-security-
measures-to-consider-in-building-assessments/
Segil, J. (2023, August 22). Help Net Security. IT’s Rising Role in Physical Security Technology. Retrieved from: https://www.helpnetsecurity.com/2023/08/22/physical-security-technology/
#:~:text=Integrated%20IoT%20sensors%2C%20alarms%2C%20surveillance,challenges%20for
%20this%20type%20of
Ahola, M. (2021). U-Secure. Top 5 Physical Security Risks - And How to Protect Your Business. Retrieved from: https://blog.usecure.io/physical-security-risks
McClure, M. (2021, February 02). CBT Nuggets. Top 7 Physical Security Controls. Retrieved from: https://www.cbtnuggets.com/blog/certifications/security/top-7-physical-security-controls
TriStar. (2024). TriStar Security Services. What Are The Different Types Of Perimeter Security? Retrieved from: https://tristarcommercial.com/perimeter-security/