All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Physical Security, Essay Example

Pages: 5

Words: 1282

Essay

Question 1

What elements would you include in providing a layered security system for a three-building corporate campus that includes a five-story building housing a financial services company in the following scenario?

The campus is located adjacent to a river that flows into Chesapeake Bay and sits on ground 8 feet above sea level. The building is in a suburban location, sited on approximately five acres adjacent to an interstate highway ramp. Parking is included within the campus boundary and approximately 250 employees are present daily, plus approximately 50 visitors.The loading docks can be accessed from the parking lot via side roads.

Building 1 contains the headquarters offices of the financial service company; Building 2 contains the physical files and computer equipment room; and Building 3 holds administrative offices and storage facilities.The computer room is in the basement to provide a cool operating environment. The storage facilities hold equipment and supplies used to maintain the grounds.

See the map on the next page. Light poles are indicated by the “+” symbol.

Light poles

Access to university campuses during business hours is typically open to the public. With the exception of certified employment access to the various limited access locations located in the computer room in the basement and storage facility, and also buildings 1, 2, and 3, the headquarters offices of the financial service company; physical files and computer equipment room; and administrative offices and storage facilities respectively, no particular form of security beyond video cameras will likely be employed during daylight hours. During the evening hours, weekends and holidays, campus closure must be secured with limited access cards allocated to employees.

Smart cards present the most viable option to a multilayered security environment with little option for total physical enclosure. Although 6’ fencing, security windows of double to triple thickness, and multiple locking systems should be built into infrastructure of the entire campus, additional security might be added to the financial services building and the mainframe computer environment. Electronic lifting steel barriers at entrances for vehicle passage should be active for control to parking access in no-visitor areas at all times. Much of the physical security of the campus might be best monitored and secured with biometric cards that enable the embedding of unique identification of personnel into the cares for optimum reliability in control of credential. Biometric proponents cite that biometrics cost equivalent to the more used radio frequency identification (RFID) cards on the market.

The smart cards offer easy swipe entrance into secured locations, and can of course be limited according to range of identified credentials within each individual profile. The cards make everything from entrance into an enclosed area by car, parking, and also access to designated buildings and elevators according to level of access ensured by allocation of university administration. Remote sensing capabilities connected to the cards must be also be monitored as information might be modified by satellite. Furtherance of surveillance on the campus might include thermal imaging technologies (i.e. infrared cameras) for night security in high security areas related to information control.

Question 2

What CPTED strategies would you use for a typical hospital? Consider the area around the building(s) as well.  Be sure to refer to the CPTED principles stated in the lecture notes.

Do not use outside resources except for gathering background information about hospitals in general.

The architectural design of most hospital environments tends to incorporate a high degree of control in terms of access nodes, and thoroughfare channels that might be reached by the public. External qualities to hospital construction share much of the institutional material (i.e. security windows) inputs akin to other institutions seeking a high degree of security despite public access (i.e. universities). If hospitals seek basic Crime Prevention Through Environmental Design (CPTED), they also employ a range of strategies for protection of patients and IT systems integral to patient care. Healthcare Management Information Systems (HMIS) IT interfaces can be augmented with a number of standardized security architectures, dependent upon the types of platforms controlling database and distributed control system (DCS) (i.e. chemicals) within the network. Hazard zones subject to regulatory management by OSHA must be marked with signage, and also monitored according to the institution’s risk assessment and management protocol.

The Health Insurance Portability and Accountability Act (HIPAA) set the framework for privacy and security regulations in the US healthcare industry, and sets established standards for the global e-health industry. Hybrid Public Key Infrastructure (HPKI) solutions comply with HIPAA regulations as cryptographically strong PKI schemes are deployable for mutual authentication and distribution of sensitive yet computational non-intensive data; at the same time efficient symmetric cryptographic technology is available for storage and transmission of high volume of medical data like medical images.

Due to the high security focus of all retention of integrity and non-disclosure factors within patient record, technological security is heightened as lead institutions begin to expand HMIS toward linking insurance providers, patients, specialists, suppliers and the entire referral network into their systems. The utilization of smart cards is again prevalent here, as either biometric or  radio frequency identification (RFID) cards allow for maximum control over the physical environment, while offering different levels of access to information and data distribution pertaining to care of patients. Traditional security locking equipment, medication, syringes will of course be present, and can require digital signatory for access and dual locked with both key and card security. Video cameras within the internal and external environment will be monitored around the clock at all points within the facility as protection of patients is linked to institutional liability to a duty of a standard of care within physician-patient law.

Question 3

Report the findings of a comprehensive physical security risk assessment of the facilities (A Large auto dealer (such as CarMax)) listed — be sure to address each of the basic elements of the assessment process.

Large auto dealer (such as CarMax)

Do not use outside resources except  for gathering background information about the facility.

Auto dealers in urban setting are designed for maximum security of property. Due to the fact that city dealers typically store vehicles in a multistoried parking lot, control of movement is relatively easy in that physical control of entrance and exit ramps can be achieved by actual raised barriers with limited employee access outside of business hours. Video cameras offer security guards universal monitoring capacity. Vehicles can be locked with keys that are then locked in a secure area of the administrative offices in the showroom, and additional physical security such as tire boots and steering wheel blocks might be employed in high crime areas. Showroom windows contain electronic alarm facility to warn would be intruders upon touch or proximity in the case of infrared systems.

Car dealers that inventory vehicles on outdoor lots use similar strategies, and typically chain the area with iron posts. In all models of the auto dealer showroom and inventory facility, employees might be provided smart cards as an option for control of building and other access. Limited use of keys at auto dealer facilities, if nothing else, might lead to reduction of minor property damage. Fortunately, unlike clinical and urgent care settings, most of the damage caused on location at auto dealers is property related, and not pertaining to direct human impact. Indemnity of property allows for less concern.  Still, cyber-security of inventory and fiscal information toward ensured privacy of audit and protection against corporate espionage (i.e. competitor spying) is substantial.

References

Biringer, B.E. et al. (2007). Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. Hoboken, NJ: Wiley.

Demkin, J.A. (2003). Security Planning and Design: A Guide for Architects and Building Design Professionals. Hoboken, NJ: Wiley

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Relatives, Essay Example

People have been bound by bloodline and kinship since times immemorial. This type of relation is much more complex than being simply unified by common [...]

Pages: 1

Words: 364

Essay

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay

Relatives, Essay Example

People have been bound by bloodline and kinship since times immemorial. This type of relation is much more complex than being simply unified by common [...]

Pages: 1

Words: 364

Essay

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay