Preview

Business

Better Essays
Open Document
Open Document
2429 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Business
Perimeter Security Applications
Robinson Paulino
DeVry College of New York
Sec- 330
Professor: Gerard Beatty

Perimeter Security Applications
Outline
Introduction 2 Intruder Detection Accuracy 3 Security Cameras 4 1. Using Size Filters for Video Analytics Accuracy 4 2. Geo-Registration and Perimeter Security Detection Accuracy 5 3. Clarity against a moving background 5 Perimeter Security Best Practices 6 Auto Tracking PTZ Camera 6 Long Range Thermal Camera 6 Covering Perimeter Camera Blind Spots 7 Determine a Perimeter Camera’s Range 7 Perimeter Fence . 8 Chain-Link Fences Protection 8 Electric and Infrared Fences 8 Fiber Optic Intrusion Detection Systems 9 In-Ground Intrusion Detection Systems 10 References 11

Perimeter Security Applications
Introduction
Physical security is the protection offered for property, these may be buildings or any other form of asset, against intruders (Arata, 2006). . The idea therefore, is to keep off unwanted persons or objects from ones premises. One’s premise is defined by a boundary which separates private property from the rest of the land. This boundary is referred to as the perimeter.
The perimeter could be physical or logical. Physical security is intended to keep intruders from land and grounds around such property. Logical perimeters on the other hand, are for protection against computer sabotage or any other remote malicious activities (Fennelly, 2012). In a nutshell, perimeter security is being precautious against any form of harm that may be intended against property or even people on that property. If the adversary could be noticed before any harm is done, it would be certainly better. Therefore, in addition to the physical security it is wise to have an intrusion detection system.
Intruder Detection Accuracy Intrusion detection is a process that involves monitoring of the events taking place around and within the boundaries of the property. These events are monitored



References: Giallorenzi T. G. (1985) Optical Fiber Sensor Technology. in Proc. IEEE 1985 International Electron Devices Meeting 31, p. 116. Philpott, D., & Einstein, S. (2006). The Integrated Physical Security Handbook. Arlington, Va.: Homeland Defense Journal. Bucaro J. A., Dardy H. D., Carome E. F. (1977). Optical Fibre Acoustic Sensor. Applied Optics 16 (7), 1761-1762. Philpott, D., & Einstein, S. (2006). The Integrated Physical Security Handbook. Arlington, Va.: Homeland Defense Journal. Tyska, L. A., & Fennelly, L. J. (2000).Physical Security: 150 Things You Should Know. Boston: Butterworth-Heinemann.

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    a) Physical Security - Is intended to detect and deter unauthorized personnel from gaining access.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Cjs/250 Appendix D

    • 574 Words
    • 3 Pages

    A six foot fence secures the outer perimeter. Video surveillance is active on the north fence and inactive on the south. A manned guard station permits entrance into the outer perimeter from the west; an unmanned and unlocked gate permits entrance from the east. No Trespassing signs are posted at intervals upon the perimeter fence; Employees Only is posted on the gate. Visitors must obtain a pass at the guard station.…

    • 574 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    References: Clifford, M. (2004). Identifying and Exploring Security Essentials. Upper Saddle River, NJ: Pearson Prentice-Hall…

    • 705 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    The SANS Institute (2012). Logging and Monitoring to Detect Network Intrusions and Compliance Violations in the Environment: http://www.sans.org/reading-room/whitepapers/detection/logging-monitoring-detect-network-intrusions-compliance-violations-environment-33985…

    • 577 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Airport Security Post 9/11

    • 2158 Words
    • 9 Pages

    Clark, J., & Bean Yancey, K. (2008, May 22). TSA Gives New Advice for Airport Security. USA Today.…

    • 2158 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Physical perimeter boundaries is a clear delineation between public property and restricted locations is often required to isolated project areas. The use of fences, wire entanglements, concrete bollards, beams, signs and cleared land ( for observation purposes) ensures that private property is clearly identified and access by all but the most determined intruder is prevented or deterred. This method will avoid the accidental intrusion and provides a psychological barrier against intrusion (Deutsch).…

    • 1927 Words
    • 8 Pages
    Better Essays
  • Better Essays

    sec 410

    • 1157 Words
    • 5 Pages

    It is important for all organizations to have physical security. Physical security protects the organization in every way. Every individual needs to be aware of the importance of physical security. Not only is important for the individual to be aware of the importance physical security has in an organization but to be able to understand how physical security works within the organization. In this paper the writer will be describing the core concepts of physical security. Additionally the writer would be writing about the security assessments. Last the writing would be writing about the basic physical controls.…

    • 1157 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Kim, D. , & Solomon, M. (2012). Fundamentals of Information Systems Security. Sudbury, MA: Jones & Bartlett Learning.…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Johnstone, R. William. "Not Safe Enough: Fixing Transportation Security." Issues in Science and Technology Vol. XXIII No. 2. Winter 2007: 51-60. SIRS Issues Researcher. Web. 20 Oct 2012.…

    • 1285 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    References: Bullock, J., Haddow, G., Coppola, D., Yeketaysi, S. (2010). United States Customs and Border Protection. Introduction to Homeland Security, 102.…

    • 1394 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Firewall

    • 384 Words
    • 2 Pages

    4. Assess the effectiveness of these devices in protecting the perimeter of the network. Include an explanation of what they do protect and what they do not protect…

    • 384 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    [7] T.Nagatsuma and M.Shinagawa, “Photonic measurement technologies for high frequency electronics,” NTT REVIEW, Vol.14, No.6.pp. 12-24, 2002.…

    • 918 Words
    • 4 Pages
    Powerful Essays