Preview

Physical Security

Better Essays
Open Document
Open Document
1733 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Physical Security
INTRODUCTION. Physical security starts with a rather simple basic premise; those who do not belong on your institution’s property should be excluded from your institution. This may happen in three often interrelated ways: when those who do not belong are identified, stopped and denied admission, when those who do not belong are denied admission by a physical device, such as a locked door. When those who do not belong are denied admission because they decide that your institution is too difficult to enter and thus they do note entry. This section will consider the various methods of excluding those who do not belong: access control, key control and locks, protective devices and alarms, windows and doors, fencing and gates, protective lighting, general deterrence.

PHYSICAL SECURITY AND CRIME PREVENTION AND CONTROL
Access Control
Access control means that, when your facility is open, no visitor, delivery service person or unknown individual is able to enter your facility without being both observed directly or indirectly. Several techniques to accomplish that goal may include any or all of the following.
Security Desk A security desk should be setup in them in lobby of each building which has an open-access or open-door policy. A sign-in and outlet supervised by an employee who validates identification prior to allowing visitors to proceed into the building, is highly advisable. Most supermarkets, five star hotels, foreign embassies, parliament buildings and major organizations have this measure in place in order to monitor the staff and clients as they come in and out to ascertain no harmful contrabands are sneaked in or pilferage of equipments and other relevant materials from the organization. When entering a building like I&M where Standard Group have offices or Nation Centre where NTV is housed you have to produce your National ID, register your name, office and purpose of your visit then insured with a visitors pass in order to gain access to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    within the facility, and training goals on the recognition and prevention of social engineering attacks. Authorization policies will also include access controls for data by specifying which data should be encrypted, they would…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    a) Physical Security - Is intended to detect and deter unauthorized personnel from gaining access.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    | Metal detectors at all entrances, have armed guards and unarmed guards, security cameras and CCTV installed.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4222-264 Answers

    • 302 Words
    • 2 Pages

    Every setting will have visitors from time to time. We need to ensure that everyone entering are clear on which areas they can access, where fire exits are and what contact, if any, they have with…

    • 302 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Limit unauthorized use of network resources by allowing access during businiess hours only. Do not allow remote access permitions to anyone, except those that…

    • 563 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    b. Unwanted access can be turned off, or excluded when logged in via a monitoring service, as well as time restricted login. Any unauthorized logins will be recorded and terminated as well as site information and tracing information. Security measures are implied (camera, onsite security, etc.).…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The patients’ security in general is being looked after by having locked exit doors, and a fence around the garden. This stops people from leaving/coming in.…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Project Part 1

    • 1209 Words
    • 4 Pages

    Guil, F. (2003, April). Computer rooms-meet the physical security measures . In GIAC.com. Retrieved March 15, 2014, from http://www.giac.org/paper/gsec/2892/computer-rooms-meet-physical-security-measures/104866…

    • 1209 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cache L3

    • 543 Words
    • 3 Pages

    All entry point of the setting should be secured. All visitors and staffs should sign in and out on the relevant record book. No visitors should be allowed without the relevant information. The children should allowed to leave with the authorised person with prior permission. Ratio of the adults to children should be met at all times in each room and outdoor area. The room should be enough to accommodate the children. Every children…

    • 543 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Upon entry the door was locked and a key card was required for this single point of entry. There were security cameras outside of the building. There was a dumpster outside that was not secured, which could allow anyone access to sensitive information. Locking the dumpster or placing it in a secured location would mitigate this risk. The receptionist did not ask me to verify my identity. The receptionist should be required to verify the identity of everyone entering building to prevent a person from entering the building that isn’t authorized. There was a security room with security personnel viewing the monitors. Office 1-1 had a post it note taped to computer monitor with names that could be passwords. Increased password security should be implemented to reduce the risk of someone hacking into a system. Both office 1-1 and 1-2 had fingerprint scanners, which increases access control. In office 1-2 there was an unattended paper shredder, which should be secured due to sensitive information. In the hallway there was a security camera and a utility box but the wire cabinet was not locked. As such, anyone can access the hardware inside. A lock should be installed to prevent unauthorized access to the hardware. Also in the hallway there was an Ethernet jack which allowed access to the internet. Controls should be put in place to require security access to logon to the network.…

    • 698 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In addition to these safety features, Coal Harbour condominiums provide access control. Access control is the ability for condo owners to selectively restrict or grant access to the building; however, access control does not alert owners to the fact that a side door in their condo may be open or that the main door did not properly latch. Keep it Light Lighting is one of the most important as well as one of the easiest and cheapest ways to deter crime. Make sure to report any burnt out lights in the entry way, the hallway, or the stairwells.…

    • 709 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Staff and visitors have to sign in and out using an electronic scanning system. Each member of staff/visitor has a card with photo ID, name and bar code to identify themselves and use to sign in and out of the premises.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 4 1.2 and 1.4

    • 2237 Words
    • 9 Pages

    We have a secure entry system which prevents unauthorised access into the nursery and a signing in book for staff and visitors so that the purpose of visitors within the building is monitored and known.…

    • 2237 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    In the setting there should never be any unauthorized person. If a visitor comes into the setting it’s important for that person to sign in the visitor’s book. It’s also important for that visitor to wear a visitors badge so everyone in the setting is aware that the visitor is authorized. If I or the staff seen a visitor in the building without a badge on then it’s important for me to challenge the visitor. For example asking where they are going or what room do they…

    • 387 Words
    • 2 Pages
    Satisfactory Essays