0% found this document useful (0 votes)
25 views2 pages

Casestudy Solutions

There are several ways to prevent security issues, including physical barriers, natural surveillance, alarm systems, video surveillance, access control systems, security personnel, and more. Physical barriers like fences deter intruders, while natural surveillance through landscaping design allows authorized activity to be observed. Alarm systems detect unauthorized access and notify security personnel for response. Video surveillance both deters and allows assessment of past incidents. Access control systems like locks, gates and turnstiles regulate ingress. Security personnel are crucial to operate and respond to all protective layers and systems.

Uploaded by

jerlieh sapon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views2 pages

Casestudy Solutions

There are several ways to prevent security issues, including physical barriers, natural surveillance, alarm systems, video surveillance, access control systems, security personnel, and more. Physical barriers like fences deter intruders, while natural surveillance through landscaping design allows authorized activity to be observed. Alarm systems detect unauthorized access and notify security personnel for response. Video surveillance both deters and allows assessment of past incidents. Access control systems like locks, gates and turnstiles regulate ingress. Security personnel are crucial to operate and respond to all protective layers and systems.

Uploaded by

jerlieh sapon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Solutions

There are ways to prevent different kind of security issues. Regarding to


computer security issues there are ways to prevent document loss. Having a secured
machine and site to be used in an office can prevent virus which is able to transfer
information from one system to another. This virus is commonly used by hackers. In
able to prevent virus computer system should always be secured and up to date.
Another security issue is the physical security issue. The initial layer of security for a
campus, building, office, or other physical space uses crime prevention through
environmental design to deter threats. Some of the most common examples are also
the most basic: warning signs or window stickers, fences, vehicle barriers, vehicle
height-restrictors, restricted access points, security lighting and trenches. Physical
barriers such as fences, walls, and vehicle barriers act as the outermost layer of
security. They serve to prevent, or at least delay, attacks, and also act as a
psychological deterrent by defining the perimeter of the facility and making intrusions
seem more difficult. Tall fencing, topped with barbed wire, razor wire or metal spikes are
often emplaced on the perimeter of a property, generally with some type of signage that
warns people not to attempt entry. However, in some facilities imposing perimeter
walls/fencing will not be possible (e.g. an urban office building that is directly adjacent to
public sidewalks) or it may be aesthetically unacceptable (e.g. surrounding a shopping
center with tall fences topped with razor wire); in this case, the outer security perimeter
will be defined as the walls/windows/doors of the structure itself.

Natural surveillance is another major form of deterrence that can be


incorporated into the design of facilities is natural surveillance, whereby architects seek
to build spaces that are more open and visible to security personnel and authorized
users, so that intruders/attackers are unable to perform unauthorized activity without
being seen. An example would be decreasing the amount of dense, tall vegetation in
the landscaping so that attackers cannot conceal themselves within it, or placing critical
resources in areas where intruders would have to cross over a wide, open space to
reach them (making it likely that someone would notice them). Then Alarm systems can
be installed to alert security personnel when unauthorized access is attempted. Alarm
systems work in tandem with physical barriers, mechanical systems, and security
guards, serving to trigger a response when these other forms of security have been
breached. They consist of sensors including perimeter sensors, motion sensors, contact
sensors, and glass break detectors. However, alarms are only useful if there is a prompt
response when they are triggered. In the reconnaissance phase prior to an actual
attack, some intruders will test the response time of security personnel to a deliberately
tripped alarm system. By measuring the length of time it takes for a security team to
arrive (if they arrive at all), the attacker can determine if an attack could succeed before
authorities arrive to neutralize the threat. Loud audible alarms can also act as a
psychological deterrent, by notifying intruders that their presence has been detected. In
some jurisdictions, law enforcement will not respond to alarms from intrusion detection
systems unless the activation has been verified by an eyewitness or video. Policies like
this one have been created to combat the 94–99 percent rate of false alarm activation in
the United States.

The most important security system to be used in an organization is the video


surveillance. Surveillance cameras can be a deterrent when placed in highly visible
locations and are useful for incident assessment and historical analysis. For example, if
alarms are being generated and there is a camera in place, security personnel assess
the situation via the camera feed. In instances when an attack has already occurred and
a camera is in place at the point of attack, the recorded video can be reviewed.
Although the term closed-circuit television (CCTV) is common, it is quickly becoming
outdated as more video systems lose the closed circuit for signal transmission and are
instead transmitting on IP camera networks.
Video monitoring does not necessarily guarantee a human response. A human
must be monitoring the situation in real time in order to respond in a timely manner;
otherwise, video monitoring is simply a means to gather evidence for later analysis.
However, technological advances like video analytics are reducing the amount of work
required for video monitoring as security personnel can be automatically notified of
potential security events.
It is also important to have Identification systems and access policies it is another
form of access control (procedural) includes the use of policies, processes and
procedures to manage the ingress into the restricted area. An example of this is the
deployment of security personnel conducting checks for authorized entry at
predetermined points of entry. This form of access control is usually supplemented by
the earlier forms of access control (i.e. mechanical and electronic access control), or
simple devices such as physical passes. Moreover mechanical access control systems
is very important to security issues, it include turnstiles, gates, doors, and locks. Key
control of the locks becomes a problem with large user populations and any user
turnover. Keys quickly become unmanageable, often forcing the adoption of electronic
access control.
And the last is the Security personnel that play a central role in all layers of
security. All of the technological systems that are employed to enhance physical
security are useless without a security force that is trained in their use and
maintenance, and which knows how to properly respond to breaches in security.
Security personnel perform many functions: patrolling facilities, administering electronic
access control, responding to alarms, and monitoring and analyzing video footage

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy