Physical Security

2127 words 9 pages
Physical Security

Table of Contents

INTRODUCTION III
ELEMENTS AND DESIGN III
EXAMPLES OF PHYSICAL SECURITY III
PHYSICAL SECURITY ELECTRONIC ACCESS III
CASINOS AND GAMING III
EDUCATION III
TRANSPORTATION III
Goggle Search iii
Dictionary Search iii

Introduction

This paper examines Physical Security from the perspective of perimeter such as gates/guards, building access controls, room access controls, enforcement options, auditing approaches, risk determination for physical attack vectors, etc. Physical Security describes measures that prevent and/or deter attackers from accessing a facility, resource, or information stored on physical media. It can be as simple as a locked door or as elaborate as multiple
…show more content…

In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed. Although the term closed-circuit television (CCTV) is common, it is quickly becoming outdated as more video systems lose the closed circuit for signal transmission and are instead transmitting on computer networks. Advances in information technology are transforming video monitoring into video analysis. For instance, once an image is digitized it can become data that sophisticated algorithms can act upon. As the speed and accuracy of automated analysis increases, the video system could move from a monitoring system to an intrusion detection system or access control system. It is not a stretch to imagine a video camera inputting data to a processor that outputs to a door lock. Instead of using some kind of key, whether mechanical or electrical, a person's visage is the key.

Private factory guard
Intertwined in these four layers are people. Guards have a role in all layers, in the first as patrols and at checkpoints. In the second to administer electronic access control; In the third to respond to alarms. The response force must be able to arrive on site in less time than it is expected that the attacker will require breaching the barriers; And in the fourth to monitor and analyze video. Users obviously have a role also by questioning and reporting

Related

  • Organizational Security Plan
    1911 words | 8 pages
  • Cis 333 Final Term Paper
    2543 words | 11 pages
  • General Security Policy
    4699 words | 19 pages
  • SEC440 Week 7
    1020 words | 5 pages
  • Term Paper
    2041 words | 9 pages
  • IS3220 Assignment 3
    990 words | 4 pages
  • Role of Security Department in an Organisation
    2090 words | 9 pages
  • FXT2 Task 1
    1196 words | 5 pages
  • Public Policing vs Private Security
    1774 words | 8 pages
  • Wgu Capstone
    8762 words | 36 pages