Premium Essay

Physical Security Operations

In: Other Topics

Submitted By DarkBrown53
Words 717
Pages 3
Faye A. Smith
October 29, 2012
Terence Hunt, MSS, CPP

To understand the importance of physical security is the security of people and technology. The use of physical security consists if a series if actions that are used to protect someone against unwanted or illegal invasion. There are three levels of physical security which are the security practitioner should be concerned with. They are the outer perimeter, inner perimeter, and the interior.
Your actual property line defines the outer perimeter. In controlling the outer you must control who can drive/walk onto your property. You can use barbed wire fence, a guard shack. You need to weigh the risk of an intruder entering your property and the cost of the available physical security measure.
There are two concepts involved in perimeter security, which is Natural Access Control and Territorial Reinforcement. Natural Access Control is the use of building and landscaping features to guide the people as they and enter/exit a space. You all also want to discourage intruders to close any and all potential exits. potential (1) Clearly defined entrances the first thing to the access control is the approach to your area. That is can a car drive onto your property without it being notice? If this does happen that means you need to consider of using curbs, barriers, gates to direct the traffic to a single control area. A guard shack would be a good deterrent to any intruder. Now there is the foot traffic to consider now. Can an unauthorized person walk into your building without being noticed? There should be at least one entrance to the building and the foot traffic should be direct to a receptionist or guard shack. Roof access is another problem are for the building. The only ones that should direct access to the roof is the...

Similar Documents

Free Essay

Logical and Physical Security

...CONVERGENCE OF LOGICAL AND PHYSICAL SECURITY SYSTEMS INTRODUCTION Up to now, majority of organizations have their physical and logical access systems operating as independent structures, with each being run by a totally separate department. The information technology security system, which controls access to information technology infrastructure including mail servers, the internet, database applications and web servers was managed by the department of information technology. The physical security system, which incorporates door access into buildings, systems of life support such as CCTV and Fire, and the badging process of employees, was run by the department of facilities (Mehdizadeh, Y, 2003). Currently, security operations involve the guarding of buildings and equipment in addition to protection of networks, taking care of issues of privacy, and risk management. The interrelation between the aspects of the security initiatives necessitates consolidation of the two security systems. Such a convergence of the IT and physical security functions is important in achieving an efficient security system (Mehdizadeh, Y, 2003). However, such an operation is also lined up with disadvantages. This paper looks at the pros and cons of combining the IT and physical security functions in a medium to large-size firm with complex IT system requirements and a global footprint. It also analyzes the fundamental components of an IT security system and explains how their integration......

Words: 1624 - Pages: 7

Free Essay

Cjs 250 Full Course - Introduction to Security

...CJS 250 Full Course - Introduction to Security CJS 250 Full Course - WEEK 1 CJS 250 Week 1 CheckPoint - Historical Laws and Security CJS 250 Week 1 Assignment - Allan Pinkerton CJS 250 Full Course - WEEK 2 CJS 250 Week 2 DQ: - 1 - Security gaps analysis for real-life locations CJS 250 Week 2 DQ: - 2 - Consider the definition of security given on pp. 71-72 of the text. Can any target environment ever be 100% stable or 100% predictable? Why or why not? Why does the author stress that security efforts for any target environment will be a “never-ending process” and that security objectives will change over time? How can complacency pose a problem for security professionals? CJS 250 Week 2 Appendix B - Threat and Risk Assessment CJS 250 Full Course - WEEK 3 CJS 250 Week 3 CheckPoint [Appendix C] - Risk Management CJS 250 Week 3 Assignment - Security Objective Components CJS 250 Full Course - WEEK 4 CJS 250 Week 4 DQ: - 1 - While it may be ideal for security planners to utilize or install the latest technology, it may not always be practical. How do you think a security professional can balance the limitations, such as budget or space, of a particular environment with the need for keeping abreast of the latest industry technology and trends? How much knowledge of technology do you think security professionals should have? How broad or detailed should that knowledge be? CJS 250 Week 4 DQ: -...

Words: 679 - Pages: 3

Premium Essay

Physical Security Survey

...Physical Security Survey Report for: Magnolia Utility Citizens’ Cooperative Prepared for: Janet Garret, Director of Security By: Top Notch Security Specialist Jake Johnson Date of Survey: 6 January 2012 Introduction My company conducts physical security surveys and we were hired to perform an evaluation on Magnolia Utilities Citizens’ Cooperative. I was given access to many personnel throughout the organization and was able to receive tangible data to conduct a thorough survey. Mr. Gorsky was in charge of the security check point at the vehicle yard. Mr. Videtti is the warehouse supervisor. Mr. Williams is the tool and equipment distribution center supervisor. Interviewing these personnel gives me an inside look to the physical security layout. The Magnolia organization currently employees 32 personnel and business is conducted within two separate locations. Cash management area, Electric Way hours are conducted between 10AM to 12PM and 2PM to 5PM. Cash Management Area South Street functions are conducted between 8AM and 6PM. Warehouse tool and equipment distribution center is opened from 5Am to Midnight. The provided information and information gathered throughout the survey has led me to an evaluation which concentrates on areas that need improvement. After interviewing all employees it is evident that not all of them receive security training on a regular basis. In order to maintain a highly secure working environment all employees regardless of...

Words: 1217 - Pages: 5

Premium Essay

Devry Sec 360 Final Exam

...Down Load IF You Face Any Problem Then E Mail Us At JOHNMATE1122@GMAIL.COM Question Page 1 Question 1.1. (TCO 1) Security policy contains three kinds of rules as policy clauses. What are they? (Points : 5) Preventive, detective, and responsive Prohibitive, permissive, and mandatory Administrative, technical, and physical Management, technical, and operational Roles, responsibilities, and exemptions Question 2.2. (TCO 2) The _____ of the 17 NIST control _____ can be placed into the 10 IISSCC _____ comprising the common body of knowledge for information security. (Points : 5) technologies, domains, families controls, families, domains domains, families, technologies principles, domains, families controls, domains, principles Question 3.3. (TCO 2) What are the effects of security controls? (Points : 5) Confidentiality, integrity, and availability Administrative, physical, and operational Detection, prevention, and response Management, operational, and technical Question 4.4. (TCO 3) Three of the most important jobs of security management are to ensure _____ are organized according to sensitivity, ensure that roles maintain _____, and to manage _____ because that is the enemy of security. (Points : 5) assets, accountability, software assets, separation of duties, complexity software, separation of duties, complexity software, accountability, people people, separation of......

Words: 961 - Pages: 4

Premium Essay

Sec 402 Request for Proposals (Rfp)

...Summary Details The Board of Directors request that their information security strategy be upgraded to allow greater opportunities of secure cloud collaboration. Also dress the concerns on the recent number of hack visit attacks that have caused the network to fail across the enterprise. The organization has know brand products across the world and expects top-secret methods for safeguarding proprietary information on its recipes and product lines Note to Proponents: Please be sure to review the RFP document in its entirety before submitting proposals. Submission Format 1. Letter of Introduction • Preferably a one page document introducing the proponent and proponent’s submission. • It should include a brief history of your company and how long you have been in business. 2. Proposed Approach, Project Resources, Costs • An outline of the proposed project approach, process, procedures and timelines in other to meet the objectives of the project. If you have a lengthy document please provide a summary no more than 3 pages. • Performance measures for each of the key result areas (objectives.) • One of the key roles and equipment that needs to be monitors is our servers that monitor our security software on it. This would detail a 24 hours monitoring. • To provide 24 hours support in our Data Center on the QDX servers and threads. • Identification of the project manager and key project support personnel. Include a brief resume of the persons providing the......

Words: 1200 - Pages: 5

Premium Essay

Ccsecurity Mp Outlin

...SECURITY MASTER PLAN OUTLINE for CHABOT LAS POSITAS Community College District Submitted by: CATALYST Consulting Group, Inc. 851 Napa Valley Corporate Way, Suite D Napa, CA 94558 In Association With: DMJM, Program Management For Measure B Bond Program 6601 Owens Drive, Suite 238 Pleasanton, CA 94588 May 2, 2005 9/21/2005 2 SECURITY MASTER PLAN OUTLINE Chabot Community College District This outline presents the fundamental topics of the Security Master Plan, an independent document incorporated by reference into the TBP Architecture District Master Plan for the Chabot College campus new construction and building improvements. To develop the Security Master Plan, CATALYST has first performed numerous site surveys and interviews, analyzed crime index data, reviewed the relevant technologies, and assessed the campus physical environment to define the risks and vulnerabilities that need to be addressed for a long-term vision of campus security. From this goal set, CATALYST has developed the guidelines and recommendations for the District to standardize the approach and cost of physical security on their campuses. The Security Master Plan will include the topic sections listed in the outline following. The primary intent of the Security Master Plan is to define security mitigation standards that integrate efficiently with new building construction and building improvements, saving upgrade costs today by planning for the campus of tomorrow. By first......

Words: 1345 - Pages: 6

Premium Essay

Security Management Case Study #1

...6, 2011 Case Study #1 Building the Foundation – Security Assessments As the security manager of a major corporation tasked with creating the initial security assessment and auditing program for the company, the first step in developing proposals for the security services would be conducting a comprehensive survey (policies, procedures and operations) of the entire facility to identify the critical factors affecting the security of the premises (Broder, 2006). The next step would be to analyze the vulnerabilities and recommend protection which is cost-effective (Broder, 2006). To start, establishing policies and procedures which define the mission of the security department should be the bare minimum in the role of the security department. These would include the following: * Protection against internal and external theft (to prevent embezzlement, fraud, burglary, robbery, industrial espionage and theft of trade secrets and proprietary information) * Developing access-control procedures (to protect the perimeter of the facility and other sensitive areas) and anti-intrusion systems * Establishing lock-and-key control procedures * Establishing a workplace violence program * Controlling the movement of people on the premises * Reviewing security personnel hiring and deploying * Establishing emergency and disaster recovery plans * Identifying the resources needed and available for the security program to operate efficiently * Developing and...

Words: 802 - Pages: 4

Premium Essay

Information Systems and Security

...Information Systems are the backbone to support the management, operation and decision function of every business or organization. Information Systems (IS) are composed of hardware, software, infrastructure and trained personnel where all the information are digitally processed and be accessible for the use of authorized personnel. Let first resume Information Systems history: • In the 70’s, IS was made of mainframe computers were the data was centralized. They have fewer functions like payroll, inventory and billing process. • Then in the 80’s came the automation process where computers and peripheral devices started to be connected using Local Area Network (LAN). Also started the use of word processors and spreadsheets to automate the flow of information within departments. • In the 90’s the advance of technology brings the ability of corporation to stablish connection between branches and remote offices using Wide Area Network (WAN). Corporations started to look for systems and data integration, leaving behind stand-alone systems. • In the 2000, the introduction of the Internet expand WAN for global enterprises and business involved in supply chain and distribution between countries. Data sharing across systems was the main focus for corporations. The use of electronic mail (email) become a global standard communication between corporations. • In Current time, the advance on technology brings Wireless connectivity where new devices like tablet pc and......

Words: 764 - Pages: 4

Free Essay

Case Study 1: Harriet’s Fruit and Chocolate Company

...1. Determine the investigation you will do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building. After doing some detailed investigations of the physical infrastructure of the orchards, orchard shacks, and the cold storage building revealed some ideas that we can implement in the network design. The investigation also showed that wireless technology would be the best solution between the three areas. With that being said the orchard area would be the only problem we would need to find out how big the orchard area is so we can install access points so a good signal can all ways be delivered. Determining the distance will also aid in the network design on what cables like fiber optics or RJ cables, as well as the selection of technologies and devices to meet the design goals. The number of buildings should be determined and what equipment they should contain which types of network devices needed for this landscape. 2. Make a list of business goals for Harriet’s Fruit and Chocolate Company and determine the constraints that will affect these goals. Business goals for Harriet’s Fruit and Chocolate Company are to provide high quality products to customers. Also to provide immediate and real-time access to inventory data to aid in sales, to do this an upgrade logistics would have to take place which in turn everything would have to go digital, we would not be able to continue with the older mom and pop structure we have been...

Words: 582 - Pages: 3

Premium Essay

Data Center Operation

...1. The company I work for is a federal forensics lab for a major metropolitan area. The organization deals with many different investigations dealing with all types of computer crimes. Therefore the organization must have a very robust operations security because the criminals have extensive resources and are very savvy in computer techniques that might enable them to access the evidence if not protected properly. Also, the other possibility of high level corporate embezzlement where employees may be approached by individuals who may bribe them into tampering or destroying incriminating evidence. 2. The organization is a 24 hour a day operation, so many security controls need to be put in place to protect the assets and evidence located in the facility. Operations security focuses on the processes, personnel and technology and is needed to protect assets from threats during normal use. These controls are: -Preventative controls -Detective controls -Corrective controls -Deterrent controls -Application controls -Transaction controls The three most common controls are Physical, Administrative, and Technical (Johnson, 2011). The first step when hiring employees would be a pre employment screening to eliminate anyone who could possibly be a risk. The next step in personnel would be employ principle of least privilege. If they do not have a need to access the evidence to do their job, they should not have access. Separation of duties is another personnel......

Words: 555 - Pages: 3

Premium Essay

Information Technology/Network Security Threats

...password, policy, to educate the users. SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE. Each information security environments unique, unless modified to adapt to meet the organization’s needs. The System Development Life Cycle (SDLC) the system development life cycle starts with the initiation of the system planning process, and continues through system acquisition and development, implementation, operations and maintenance, and ends with disposition of the system. Service decisions about security made in each of these phases to assure that the system is secure. The initiation phase begins with a determination of need for the system. The organization develops its initial definition of the problem that solved through automation. This followed by a preliminary concept for the basic system that needed, a preliminary definition of requirements, and feasibility and technology assessments. Also during this early phase, the organization starts to define the security requirements for the planned system. Management approval of decisions reached is important at this stage. The information developed in these early analyses used to estimate the costs for the entire life cycle of the system, including information system security. An investment analysis determine the appropriate strategy for achieving the system requirements, while taking mission needs and budget constraints into account. Expenditures for security before the system built. It......

Words: 1444 - Pages: 6

Free Essay

Ris Management

...Risk Assessment Methodology: Key Principles of External Building Security Presented By Name Institution Instructor Course Title Date of Submission Abstract External building security is a critical part in the building design process in order to construct a building that provide conducive social, intellectual, creative, and physical activities of its shareholders. There are numerous key principles of external building security with ability to withstand various attack types. This paper lists, describes and assesses these principles. Security is a fundamental part of the building design process and should be considered as an issue that provide clear guidance regarding the design, methods and materials of building that enhance effective, acceptable and affordable security to all building stakeholders. Planning of a building should be conducive to all intellectual, physical, social, and creative activities of the stakeholders. Buildings should be secure enough to provide lively as well as welcoming operational environment that does not over-power, impersonate or institute personal hazards while accommodating range of activities. External building security, right from the preliminary stage to final building construction, focuses on the built environment, threatened internally and externally by vandalism that includes graffiti and glass breakage, theft, arson, and burglary. It addresses actions taken to protect buildings, property and assets......

Words: 1514 - Pages: 7

Free Essay

Security Objective Componants

...Security Objective Components STEPHANIE CASBY CJS 250 October 30th, 2011 Jenelle Velarde Security Objective Components Have you ever been to church and thought you had to worry about your safety? I know for myself that is one place besides my home that I have always felt safe. People in church attend with little thought given to their safety while they are there. Church is supposed to be a place of peace and serenity, not violence or death. In the last 50 years churches and other religious sites around the world has been victim’s to violent acts of crimes. There are several reasons for this type of crime in these religious places of worship; differences in religious beliefs, domestic disturbances, and racism are number one reason for these acts. In the last ten to fifteen years there has been an increase in violent crimes reported in churches, schools, and malls that seemed to be the target. In this paper I will discuss what component of the overall security objective deserves the most attention in the environments from the article. I will also discuss what components would be less pertinent for the environments during a vulnerability assessment. I will describe counter measures or possible solutions for the shootings, incidences of arson and bombing. Then I will discuss the components of the overall security objective that would be ore pertinent had the events occurred at the mall and if they would present alternative countermeasures that I will list and......

Words: 815 - Pages: 4

Premium Essay

Cjus254 Unit 5 Ip

...the relationships between the Department of Homeland Security and private sector companies. She has requested an information paper that shows her why these relationships are important, as well as how the DHS uses these companies as a tool for the protection of critical infrastructure and key resources. To: Director, Executive Secretariat of the Office of the Secretary, DHS From: Action Officer, Executive Secretariat of the Office of the Secretary, DHS Ma’am, Cooperation with all levels and forms of security entities is of paramount importance. We cannot profess to be the best at what we do if we are blind to this fact. There are hundreds of security firms that specialize in all different types, as well as local, state, tribal, and territorial governments and law enforcement agencies that just know the area, the terrain, and the local customs and day to day operations better than any federal agencies ever could. This is why it is important for us to work with these agencies on the ground when we are tasked with preventing or reacting to any security emergencies. This is important because the private sector actually owns and controls the grand majority of the infrastructure that we are sworn to protect. This makes it slightly more complicated for us to control the safety of anything, if we aren’t in direct control. Rather than create a fascist state that dictates laws that may not be the best for the security of a particular field, we have established......

Words: 1338 - Pages: 6

Premium Essay

Is4550 Week 5 Lab

...------------------------------------------------- Week 5 Laboratory: Part 1 Part 1: Assess and Audit an Existing IT Security Policy Framework Definition Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in the 7 domains of a typical IT infrastructure * Review existing IT security policies as part of a policy framework definition * Align IT security policies throughout the 7 domains of a typical IT infrastructure as part of a layered security strategy * Identify gaps in the IT security policy framework definition * Recommend other IT security policies that can help mitigate all known risks, threats, and vulnerabilities throughout the 7 domains of a typical IT infrastructure Week 5 Lab Part 1: Assessment Worksheet (PART A) Sample IT Security Policy Framework Definition Overview Given the following IT security policy framework definition, specify which policy probably can cover the identified risk, threat, or vulnerability. If there is none, then identify that as a gap. Insert your recommendation for an IT security policy that can eliminate the gap. Risk – Threat – Vulnerability | IT Security Policy Definition | Unauthorized access from pubic Internet | Acceptable use policy | User destroys data in application and deletes all files | Backup Recovery Policy | Hacker penetrates your IT infrastructure and gains......

Words: 1625 - Pages: 7