Preview

Advances in Physical Security

Powerful Essays
Open Document
Open Document
3592 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Advances in Physical Security
Advances in Physical Security
Terry L. Boss
SEC- 581
Legal & Ethic Issues in Security Management
April 13, 2014
Professor Elliott
DeVry University

I. Objective Statement
A. Security today
B. Security of Tomorrow
II. Electronic detection systems
A. Inferred lasers
B. Night Vision Cameras
C. Eye scanners
D. Palm Scanners
E. Finger Print Scanners
F. Security Code Devices
III. Barriers A. Plastic B. Concrete C. Steel D. Water Filled
IV. Fences A. Chain Link B. Barb Wire C. Razor Wire
V. Training A. Hands- On B. Simulation Trainers C. Devices
VI. Conclusion A. How Advances in Security Help Today

INDEX
1. Cover Page 1
2. Outline Page 2-3
3. Index Page 4
4. Objective Statement Page 5
5. Main Body Page 5-15
6. Conclusion Page 15
7. References Page 16-19

Objective Statement
Security today:
Today’s advances in physical security are just temporary because criminals are learning ways to get around these systems. By always upgrading and

You May Also Find These Documents Helpful

  • Good Essays

    Every day, US department, retail, and grocery stores lose an estimated 91 million dollars to shoplifting. But how is this happening? Are our technologies too simple, too easy to outsmart? Or are the people in today’s society underestimating their ingenuity? Despite the psychological effect of stopping some people from becoming shoplifters, anti-theft devices don't actually stop or deter the professional or determined. Not only do anti-theft devices waste people's time, they do not catch or identify shoplifters any better than a camera could.…

    • 536 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 5 Bsa/310

    • 4336 Words
    • 18 Pages

    It is extremely important to realize that security is not a single technology. A person cannot go and buy security. Security is a mindset; it is a combination of feeling safe, knowing data is secure, and being as sure as possible that the network will not go down at any moment. These are not tangible items they are emotions.…

    • 4336 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your…

    • 717 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Physical perimeter boundaries is a clear delineation between public property and restricted locations is often required to isolated project areas. The use of fences, wire entanglements, concrete bollards, beams, signs and cleared land ( for observation purposes) ensures that private property is clearly identified and access by all but the most determined intruder is prevented or deterred. This method will avoid the accidental intrusion and provides a psychological barrier against intrusion (Deutsch).…

    • 1927 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The technological advances in past few years have been far and reaching. The average person cannot keep up with the dizzying pace of new and improved technological products. Criminals and terrorists continue to use the newest and most advanced technology to terrorize the public and steal from them. The 9/11 terrorists could enter the US illegally using fake passports/IDs produced with sophisticated computers and software. Secure and disposable cell phones were used to communicate with and they were financed with money laundered through financial shell organizations that used technology to hide the…

    • 780 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The advancement of technology is affecting everyone in their everyday lives whether we want to accept it or not. The criminal justice system is no stranger to this; it has created more work for them and in order for them to keep pace with criminals they have to continue to evolve and stay current with the progress of technology. Technology changes from one day to the next and in order to fight and prevent crime the criminal justice system must stay current with the many changes of…

    • 849 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Johnstone, R. William. "Not Safe Enough: Fixing Transportation Security." Issues in Science and Technology Vol. XXIII No. 2. Winter 2007: 51-60. SIRS Issues Researcher. Web. 20 Oct 2012.…

    • 1285 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    To understand the importance of physical security is the security of people and technology. The use of physical security consists if a series if actions that are used to protect someone against unwanted or illegal invasion. There are three levels of physical security which are the security practitioner should be concerned with. They are the outer perimeter, inner perimeter, and the interior.…

    • 707 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The Criminal Justice system in the United States date back to colonial days when the citizens were subject to the laws and rules of the British. Many times the laws and subsequent punishment were not always fair and just](para. 1). Policing and technology has a lot to do with these changes. The criminal justice system has changed somewhat for the worst, but mostly for the better. Nevertheless, the goal and urgency of protecting the community and it’s citizens has not changed, but has only gotten stronger to fulfill. Technology will only cause improvements with the fight to deter crime. As crime increases, so will technology. As technology increases, so will crime. Advancements of technology will also change policing as well. Laws will become more strict, making it harder for criminals to fight…

    • 1476 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Security Issues and Solutions Part 4: Physical Security and Auditing | Physical Security | Inform IT. (n.d.). Retrieved from http://www.informit.com/articles/article.aspx?p=25850…

    • 583 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Essay On Security Checks

    • 955 Words
    • 4 Pages

    Within the last several years, security checks, especially in the United States, have become more advanced along with rules and regulations of security being enforced. This is due to the increasing amount of threats, attacks, and use of illegal substances or items throughout the world. Authorities have increased security in the school system, national borders, trading ports, and airports. The increasing amount of security checks has a positive impact on society and these checks should be improved often to assure the safety of all people.…

    • 955 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    from attacks like nine eleven by “strengthening” security controls such as monitoring emails and social media.…

    • 978 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The research presented here introduces the concept of security, highlighting its links to, as well as the aspects through which it differs from, safety, with the aim to evaluate the prevailing perception that the two concepts are interchangeable. The study attempts to identify the differences between the two disciplines, and determine whether they should be segregated. Moreover, the approach to security and safety issues in high-risk environments are explored by conducting a questionnaire-based survey to be completed in various risk environments. The research study is based upon a review of literature surrounding the subjects of security, safety and risk, as well as data captured through quantitative questionnaires and qualitative data acquired that measured safety and security concerns.…

    • 11286 Words
    • 46 Pages
    Powerful Essays