Preview

Physical Security - Essay

Better Essays
Open Document
Open Document
1334 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Physical Security - Essay
Physical Security CJA 585 January 10, 2011

In the United States everyone is concerned about safety in their homes and in his or her workplace. Individuals go to great lengths to ensure that all their possessions that they own could not be stolen from them. According to the 1999 FBI Uniform Crime Reports, nationwide 408,217 robberies were committed with the estimated amount of losses being reported at $508 million in losses. Many measures can be put in place to prevent such losses. This paper will discuss physical security and other components such as building security, grounds security, access control systems, perimeter security, information systems, and technology security.
Physical Security According to Search Security (2011), Physical security is “Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism.” Physical security can be described as measures taken to prevent and to deter intruders or attackers from gaining access to facilities, resources, or information stored on physical media. Physical security also provides guidance on ways to design structures to resist various hostile acts. As physical security can have seemed to be this elaborate task, but can be a simple act of locking a home or business door and not given an easy access to an intruder. To keep individuals, families, or employees safe one has to think about the things that are important to them and the things one also wants to protect.
Ground Security Ground security can be looked at as ways to protect areas around airports. Since September 11, 2001, airports have gone through many changes to ensure that their passengers are safe and all bags and equipment are safe before the leave the ground and enter the



References: Robbery. (2011). Retrieved from http://www2.fbi.gov/ucr/cius2009/offenses/violent_crime/robbery.html | | | Morrison, Blake. (2002) Attendants question ground security. Retrieved on January 7, 2011 from http://www.usatoday.com/news/nation/2002/04/04/ground-security.htm Intrusion Detection. (2012). Retrieved on January 7, 2011 From http://www.webopedia.com/DidYouKnow/Computer_Science/2005 Net Security. (2011). Retrieved on January 7, 2011 From http://netsecurity.about.com/cs/hackertools/a/aa030504_2.htm

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    a) Physical Security - Is intended to detect and deter unauthorized personnel from gaining access.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    | Metal detectors at all entrances, have armed guards and unarmed guards, security cameras and CCTV installed.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Project Part 1

    • 1209 Words
    • 4 Pages

    Guil, F. (2003, April). Computer rooms-meet the physical security measures . In GIAC.com. Retrieved March 15, 2014, from http://www.giac.org/paper/gsec/2892/computer-rooms-meet-physical-security-measures/104866…

    • 1209 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Perimeter Defense Essay

    • 779 Words
    • 4 Pages

    The Basics of Perimeter Defense: You Only Own It As Long As You Can Defend It…

    • 779 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Since 9/11, security specialists are concentrated on wide security investments to defend and protect targets from terrorist attacks which is the main threat nowadays, theft, criminality and harm. Security experts entrusted with ensuring these facilities must conform to redesigned principles and controls while tending to the necessities of people and airlines. Physical security is by all account not the only concentration in today's assessed dangers. Network security is as critically essential as physical security. The way to deal with "solidify" airports requires security staff to interest in innovation that offers more prominent assurance, insight and IT…

    • 97 Words
    • 1 Page
    Good Essays
  • Good Essays

    Safeguarding Case Study

    • 615 Words
    • 3 Pages

    1. Leroy may be the victim of neglect as there is evidence that his parents are persistently failing to meet his basic physical and psychological needs and that this is likely to cause impairment to his health and development. HM Government (2006). Maccoby and Martin (1983) assert that a child may suffer neglect if that child’s needs form a low priority within the family unit. In addition to neglect, Leroy may well be the experiencing emotional abuse. Emotional abuse involves the “persistent maltreatment of a child such as to cause severe and persistent effect on their emotional development.” HM Government (2006:39). This may include conveying a feeling of worthlessness; being unloved; inappropriate expectations of a child’s ability or level of responsibility, which are out of kilter with that child’s age and stage and being witness to the maltreatment and abuse of others.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Good Essays

    To understand the importance of physical security is the security of people and technology. The use of physical security consists if a series if actions that are used to protect someone against unwanted or illegal invasion. There are three levels of physical security which are the security practitioner should be concerned with. They are the outer perimeter, inner perimeter, and the interior.…

    • 707 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    This paper will address the September 11 attacks and the problems with airport security personnel and the outdated technology that was being used in most airports The September 11 terrorist attacks could have been avoidable if airport security was up to par with new security devices and better trained personnel. The government should have passed a new airport security law to update security devices and to make sure employees were properly trained long before September 11. Airport security would…

    • 981 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Security today has been on the top of many companies and businesses list of priorities. Where in the past a single security guard proved sufficient, today alarmed sensors, metal detectors and security guards are required to conduct the same security. The need for some type of security implementation is necessary in every business. There are a few options when considering the hiring of security. A company’s first need is to decide how much money it wants to spend on security along with the type of security needed. According to Contract Security Agencies (2009),…

    • 762 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Capstone Checkpoint

    • 270 Words
    • 2 Pages

    I believe that it is essential for security professionals to be well familiar with their surroundings and have great knowledge of their primary targets, while roaming their environment. It is critical that all security professionals must maintain full control of the environment they are assigned to, and are aware of not leaving a vulnerable gap to the criminals. These security professionals must be ready to notice the slight changes of the environment, and must keep in mind that all areas are different. Therefore, they must plot a defense mechanism based on the type of environment they are assigned to.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security Controls

    • 467 Words
    • 2 Pages

    Physical Controls are exactly what they sound like, physical obstacles used to prevent or deter access to IS resources. Physical controls can be barriers such as locked doors, requiring some sort of authentication/authorization command to enter, like a cipher lock or keycard. Biometric scanners are also excellent controls to identify and allow access to authorized personnel. Video cameras and closed-circuit television are also examples of physical controls. For organizations requiring extreme security measures, perimeter barriers such as walls or electric fences are used; additionally, security guards fall into the physical controls category.…

    • 467 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Essay On Safeguarding

    • 2773 Words
    • 12 Pages

    * Children are most likely to be abused by adults whom they now and trust and most abusing children is done by a men the women dose between 5/10 per.…

    • 2773 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    A risk assessment (figure a.) will be included along with a perimeter protection plan to include a total cost breakdown. (figure b.) Based on the budget, and proposal of contractual security. (figure c.) Will provide at compressive breakdown of the job duties and the reason twenty four hour contractual security…

    • 1460 Words
    • 6 Pages
    Better Essays