0% found this document useful (0 votes)
122 views10 pages

PHSEC

Uploaded by

sbnkapesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views10 pages

PHSEC

Uploaded by

sbnkapesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

ASSIGNMENT COVER SHEET

Please complete all areas of thisform, sign, and attach to each submitted assignment. Submit each assignment according to the
instructions provided in your Course Outline.

A. STUDENT/S TO COMPLETE

Program Name: BACHELOR IN BUSINESS ADMINISTRATION IN Course Name: PHYSICAL SECURITY


SECURITY AND RISK MANAGEMENT

Student ID Number: ZW220319 Student Names: NOAH

Postal/ Email Address: sbnkapesa@gmail.com Phone Number: +263773582554

Assignment Number 1 Lecturer Name:

Date Due:25/11/24 Date Submitted: 25/11/24

Declaration

I declare that this assessment item is my own work, except where acknowledged, and has not been submitted for academic credit elsewhere, and
acknowledge that the assessor of this item may, for the purpose of assessing this item:

Reproduce this assessment item and provide a copy to another member of the University and/or;

Communicate a copy of this assessment item to the University for Marking

I certify that I have read and understood the University Rules in respect of Student Academic Misconduct.

Student Signature: NOAH KAPESA

Date: 25/11/24

B. MARKER TO COMPLETE

Mark/Grade

Lecturer’s Comments

Page 1 of 10
1. Define the following terms 10

A.Asset protection (2)

B.Alarm receiver (2)

C.Annunciator (2)

C. Alarm discriminator (2)

D.Area detection (2)

2. Explain how the first step (countermeasures) of the system approach process 15

apply to the following factors

A.People

B.Hardware

C.Software

3. Describe the following factors during the defining of the problem in the security 15

program

A.Kind of threats or risks affecting the assets to be safeguarded

B.The probability of those threats becoming actual loss events

C. The effect on the assets or on the enterprise responsible for the assets if the loss

occurs

4. A. Identify and discuss the three types of penetrations that barriers are utilised to 10

discourage

B. Identify and describe the two categories of barriers


Total 50

Introduction

This assignment explores various concepts in physical security, including asset

Page 2 of 10
protection, alarm systems, countermeasures, threat assessment, and barrier
defenses. It begins by defining terms such as asset protection, alarm receiver,
annunciator, alarm discriminator, and area detection. It then discusses how the first
step of the system approach process applies to different factors such as people,
hardware, and software in security programs. Subsequently, it describes factors
involved in defining security program problems, including the types of threats, the
probability of those threats leading to loss events, and the potential impact of losses
on assets or enterprises. Finally, it examines penetrations barriers are utilized to
discourage and the categories of barriers used in physical security.

Question 1 ( Marks)

A. Asset protection refers to the measures and strategies implemented to safeguard


valuable assets, both tangible and intangible, from theft, damage, or unauthorized
access. This includes physical assets such as equipment, inventory, and facilities, as
well as intellectual property, data, and confidential information. Asset protection
involves the identification of potential risks, the development of security protocols,
and the deployment of various security technologies and systems to mitigate those
risks (Gill, 2018).

B. An alarm receiver is a device or system component that is designed to receive and


process signals from alarm sensors or detectors. These signals are typically triggered
by events such as unauthorized entry, motion detection, or the activation of a fire or
intrusion alarm system. Alarm receivers play a crucial role in security monitoring and
response by relaying alarm notifications to a central monitoring station, security
personnel, or other designated parties for appropriate action (Layton, 2019).

Page 3 of 10
C. An annunciator is a visual or auditory signaling device used in security and alarm
systems to provide real-time notifications or alerts about specific events or
conditions. Annunciators are commonly installed in control rooms, security centers,
or other central locations where operators or security personnel can monitor
multiple alarms and quickly respond to critical incidents. These devices may feature
LED displays, text messages, or audible alarms to indicate the nature and location of
the alarm activation (Bisio et al., 2016).

D. An alarm discriminator is a component of an alarm system that is responsible for


analyzing incoming alarm signals and distinguishing between legitimate alarms and
false alarms. False alarms can be triggered by environmental factors, equipment
malfunctions, or user errors, and they can undermine the effectiveness of security
systems by generating unnecessary alerts and wasting resources. Alarm
discriminators employ various techniques, such as signal processing algorithms and
pattern recognition, to accurately identify genuine threats while minimizing false
positives (Hussain et al., 2017).

E. Area detection refers to the capability of a security system to detect and monitor
specific areas or zones within a protected environment for unauthorized activity or
intrusions. This can include the use of motion sensors, infrared detectors, video
surveillance cameras, or other sensing technologies to identify movement, heat
signatures, or other indicators of potential threats. Area detection allows security
personnel to focus their attention on high-risk areas and respond proactively to
security breaches or suspicious behavior, enhancing overall security effectiveness
(Islam et al., 2020).

Question 2 ( Marks)

Page 4 of 10
A. People: In the context of physical security, people represent a critical component
of any security system. Countermeasures related to people encompass various
strategies and measures aimed at mitigating human-related security risks, such as
unauthorized access, social engineering attacks, and insider threats. Examples of
countermeasures for people may include implementing access control measures
such as biometric authentication or access badges, conducting thorough background
checks and security screenings for personnel, providing comprehensive security
awareness training to employees to educate them about security policies and
procedures, and establishing clear protocols for reporting suspicious activities or
security incidents. These countermeasures aim to reduce the likelihood of security
breaches caused by human factors and promote a security-conscious culture within
the organization (Harrington, 2017).

B. Hardware: Hardware refers to the physical components of a security system,


including surveillance cameras, access control systems, intrusion detection sensors,
and alarm systems. Countermeasures for hardware involve measures to safeguard
these components against tampering, sabotage, or malfunction. This may include
physical security measures such as installing protective enclosures or
tamper-resistant housings for sensitive equipment, implementing redundancy and
failover mechanisms to ensure system reliability and availability, regularly inspecting
and maintaining hardware components to identify and address potential
vulnerabilities or defects, and integrating security features such as encryption and
authentication mechanisms to protect data transmission and storage (Vacca, 2019).

C. Software: Software plays a crucial role in modern security systems, powering


functions such as access control, video surveillance, alarm management, and
incident response. Countermeasures for software focus on securing the underlying
software infrastructure and applications against cyber threats, vulnerabilities, and

Page 5 of 10
attacks. This involves practices such as regularly updating software and firmware to
patch known vulnerabilities and address security weaknesses, implementing access
controls and authentication mechanisms to restrict unauthorized access to sensitive
data and system resources, conducting regular security assessments and penetration
testing to identify and remediate software vulnerabilities, and deploying intrusion
detection and prevention systems to detect and block malicious activities targeting
software systems (Schneier, 2015).

Question 3 ( Marks)

A. Kind of threats or risks affecting the assets to be safeguarded: When defining the
problem in a security program, it's crucial to identify and analyze the various types of
threats or risks that could potentially impact the assets to be safeguarded. Threats
can encompass a wide range of potential dangers, including physical threats such as
theft, vandalism, natural disasters, and unauthorized access, as well as non-physical
threats such as cyber attacks, data breaches, and insider threats. Risk factors may
vary depending on the nature of the assets and the operating environment of the
organization. Conducting a comprehensive threat assessment helps security
professionals understand the specific risks facing their assets and prioritize security
measures accordingly (Broder, 2017).

B. The probability of those threats becoming actual loss events: In addition to


identifying potential threats, it's essential to assess the probability of those threats
materializing into actual loss events. This involves evaluating various factors such as
the likelihood of occurrence, historical data on similar incidents, threat intelligence
reports, and vulnerability assessments. By quantifying the probability of different
threats, security professionals can prioritize their response efforts and allocate
resources effectively to address the most significant risks. This probabilistic approach
allows organizations to focus on mitigating high-probability threats that pose the
Page 6 of 10
greatest potential for harm to their assets (Peltier, 2016).

C. The effect on the assets or on the enterprise responsible for the assets if the loss
occurs: Understanding the potential impact of a loss event is critical for assessing the
overall risk exposure and determining the appropriate risk mitigation strategies. The
effect of a loss event can encompass various dimensions, including financial losses,
operational disruptions, reputational damage, legal liabilities, and regulatory
compliance issues. By quantifying the potential consequences of different loss
scenarios, organizations can make informed decisions about risk acceptance, risk
transfer, or risk mitigation measures. This requires a comprehensive analysis of the
value and criticality of the assets at risk, as well as the potential cascading effects on
the broader enterprise ecosystem (Whitman & Mattord, 2016).

Question 4 ( Marks)

A. Penetrations that barriers are utilized to discourage:

1. Unauthorized Access: Barriers are often employed to deter unauthorized


individuals from gaining entry to protected areas or facilities. This type of
penetration involves unauthorized individuals attempting to bypass physical barriers
such as fences, gates, doors, or windows to gain access to restricted areas. Barriers
such as access control systems, perimeter fencing, and locked doors serve to impede
unauthorized access attempts and enhance the overall security of the premises
(Layton, 2019).

2. Intrusions: Intrusions refer to unauthorized entries or breaches of security


perimeters by individuals or objects. Barriers are deployed to prevent intrusions by

Page 7 of 10
deterring or delaying potential intruders and providing early detection of intrusion
attempts. Examples of barriers used to discourage intrusions include perimeter walls,
barriers, motion sensors, surveillance cameras, and intrusion detection systems.
These barriers help to create a physical and psychological deterrent against
unauthorized intrusions and enhance the security posture of the protected area
(Vacca, 2019).

3. Forced Entry: Forced entry involves attempts to forcibly breach physical barriers or
security defenses using tools, equipment, or brute force. Barriers are designed to
resist forced entry attempts and withstand various forms of physical attacks,
including cutting, prying, drilling, or ramming. Reinforced doors, security grilles,
shatter-resistant glass, and hardened perimeter barriers are examples of barriers
specifically designed to withstand forced entry attempts and protect against
intruders (Broder, 2017).

B. Categories of barriers

1. Physical Barriers: Physical barriers are tangible structures or obstacles designed to


prevent or restrict access to a protected area. These barriers can include walls,
fences, gates, doors, windows, bollards, barriers, and barricades. Physical barriers
serve as the first line of defense against unauthorized access, intrusions, and forced
entry attempts by creating a visible and tangible deterrent and impeding the
progress of potential intruders (Whitman & Mattord, 2016).

2. Electronic Barriers: Electronic barriers, also known as technological barriers,


encompass a range of electronic security systems and devices designed to detect,
deter, or respond to security threats. These barriers utilize technology such as
sensors, alarms, surveillance cameras, access control systems, and intrusion

Page 8 of 10
detection systems to monitor and protect the perimeter and interior of a protected
area. Electronic barriers complement physical barriers by providing additional layers
of security and enhancing situational awareness and response capabilities
(Harrington, 2017).

Conclusion

In conclusion, this assignment provides a comprehensive overview of essential


concepts and practices in physical security. By defining key terms and exploring the
application of countermeasures, threat assessment, and barrier defenses, it
highlights the multifaceted nature of security management. Understanding these
concepts is crucial for designing effective security strategies to protect assets,
mitigate risks, and safeguard enterprises against various threats and vulnerabilities.
By addressing these aspects systematically, organizations can enhance their security
posture and better prepare to respond to emerging security challenges in today's
dynamic threat landscape.

References

1. Bisio, I., Lavagetto, F., Marchese, M., Sciarrone, A., & Vallan, A. (2016). An overview
on industrial alarm systems: Main issues and open problems. IEEE Transactions on
Industrial Informatics, 12(1), 1-11.

2. Gill, M. (2018). Handbook of security (2nd ed.). Palgrave Macmillan.

3. Harrington, D. E. (2017). Security operations management (3rd ed.).


Butterworth-Heinemann.
Page 9 of 10
4. Hussain, A., Hossain, M. S., Islam, S. H., & Jeon, G. (2017). A survey on false data
injection attacks against modern power systems. IEEE Access, 5, 24143-24161.

5. Islam, S. H., Hossain, M. S., & Kim, J. (2020). A survey on security and privacy issues
in internet-of-things. IEEE Internet of Things Journal, 7(1), 1-27.

6. Layton, J. N. (2019). Home and business security. ABC-CLIO.

7. Peltier, T. R. (2016). Information security risk analysis (3rd ed.). Auerbach


Publications.

8. Schneier, B. (2015). Data and Goliath: The hidden battles to collect your data and
control your world. W. W. Norton & Company.

9. Vacca, J. R. (2019). Computer and information security handbook (3rd ed.).


Morgan Kaufmann.

10. Whitman, M. E., & Mattord, H. J. (2016). Principles of information security (6th
ed.). Cengage Learning.

Page 10 of
10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy