PHSEC
PHSEC
Please complete all areas of thisform, sign, and attach to each submitted assignment. Submit each assignment according to the
instructions provided in your Course Outline.
A. STUDENT/S TO COMPLETE
Declaration
I declare that this assessment item is my own work, except where acknowledged, and has not been submitted for academic credit elsewhere, and
acknowledge that the assessor of this item may, for the purpose of assessing this item:
Reproduce this assessment item and provide a copy to another member of the University and/or;
I certify that I have read and understood the University Rules in respect of Student Academic Misconduct.
Date: 25/11/24
B. MARKER TO COMPLETE
Mark/Grade
Lecturer’s Comments
Page 1 of 10
1. Define the following terms 10
C.Annunciator (2)
2. Explain how the first step (countermeasures) of the system approach process 15
A.People
B.Hardware
C.Software
3. Describe the following factors during the defining of the problem in the security 15
program
C. The effect on the assets or on the enterprise responsible for the assets if the loss
occurs
4. A. Identify and discuss the three types of penetrations that barriers are utilised to 10
discourage
Introduction
Page 2 of 10
protection, alarm systems, countermeasures, threat assessment, and barrier
defenses. It begins by defining terms such as asset protection, alarm receiver,
annunciator, alarm discriminator, and area detection. It then discusses how the first
step of the system approach process applies to different factors such as people,
hardware, and software in security programs. Subsequently, it describes factors
involved in defining security program problems, including the types of threats, the
probability of those threats leading to loss events, and the potential impact of losses
on assets or enterprises. Finally, it examines penetrations barriers are utilized to
discourage and the categories of barriers used in physical security.
Question 1 ( Marks)
Page 3 of 10
C. An annunciator is a visual or auditory signaling device used in security and alarm
systems to provide real-time notifications or alerts about specific events or
conditions. Annunciators are commonly installed in control rooms, security centers,
or other central locations where operators or security personnel can monitor
multiple alarms and quickly respond to critical incidents. These devices may feature
LED displays, text messages, or audible alarms to indicate the nature and location of
the alarm activation (Bisio et al., 2016).
E. Area detection refers to the capability of a security system to detect and monitor
specific areas or zones within a protected environment for unauthorized activity or
intrusions. This can include the use of motion sensors, infrared detectors, video
surveillance cameras, or other sensing technologies to identify movement, heat
signatures, or other indicators of potential threats. Area detection allows security
personnel to focus their attention on high-risk areas and respond proactively to
security breaches or suspicious behavior, enhancing overall security effectiveness
(Islam et al., 2020).
Question 2 ( Marks)
Page 4 of 10
A. People: In the context of physical security, people represent a critical component
of any security system. Countermeasures related to people encompass various
strategies and measures aimed at mitigating human-related security risks, such as
unauthorized access, social engineering attacks, and insider threats. Examples of
countermeasures for people may include implementing access control measures
such as biometric authentication or access badges, conducting thorough background
checks and security screenings for personnel, providing comprehensive security
awareness training to employees to educate them about security policies and
procedures, and establishing clear protocols for reporting suspicious activities or
security incidents. These countermeasures aim to reduce the likelihood of security
breaches caused by human factors and promote a security-conscious culture within
the organization (Harrington, 2017).
Page 5 of 10
attacks. This involves practices such as regularly updating software and firmware to
patch known vulnerabilities and address security weaknesses, implementing access
controls and authentication mechanisms to restrict unauthorized access to sensitive
data and system resources, conducting regular security assessments and penetration
testing to identify and remediate software vulnerabilities, and deploying intrusion
detection and prevention systems to detect and block malicious activities targeting
software systems (Schneier, 2015).
Question 3 ( Marks)
A. Kind of threats or risks affecting the assets to be safeguarded: When defining the
problem in a security program, it's crucial to identify and analyze the various types of
threats or risks that could potentially impact the assets to be safeguarded. Threats
can encompass a wide range of potential dangers, including physical threats such as
theft, vandalism, natural disasters, and unauthorized access, as well as non-physical
threats such as cyber attacks, data breaches, and insider threats. Risk factors may
vary depending on the nature of the assets and the operating environment of the
organization. Conducting a comprehensive threat assessment helps security
professionals understand the specific risks facing their assets and prioritize security
measures accordingly (Broder, 2017).
C. The effect on the assets or on the enterprise responsible for the assets if the loss
occurs: Understanding the potential impact of a loss event is critical for assessing the
overall risk exposure and determining the appropriate risk mitigation strategies. The
effect of a loss event can encompass various dimensions, including financial losses,
operational disruptions, reputational damage, legal liabilities, and regulatory
compliance issues. By quantifying the potential consequences of different loss
scenarios, organizations can make informed decisions about risk acceptance, risk
transfer, or risk mitigation measures. This requires a comprehensive analysis of the
value and criticality of the assets at risk, as well as the potential cascading effects on
the broader enterprise ecosystem (Whitman & Mattord, 2016).
Question 4 ( Marks)
Page 7 of 10
deterring or delaying potential intruders and providing early detection of intrusion
attempts. Examples of barriers used to discourage intrusions include perimeter walls,
barriers, motion sensors, surveillance cameras, and intrusion detection systems.
These barriers help to create a physical and psychological deterrent against
unauthorized intrusions and enhance the security posture of the protected area
(Vacca, 2019).
3. Forced Entry: Forced entry involves attempts to forcibly breach physical barriers or
security defenses using tools, equipment, or brute force. Barriers are designed to
resist forced entry attempts and withstand various forms of physical attacks,
including cutting, prying, drilling, or ramming. Reinforced doors, security grilles,
shatter-resistant glass, and hardened perimeter barriers are examples of barriers
specifically designed to withstand forced entry attempts and protect against
intruders (Broder, 2017).
B. Categories of barriers
Page 8 of 10
detection systems to monitor and protect the perimeter and interior of a protected
area. Electronic barriers complement physical barriers by providing additional layers
of security and enhancing situational awareness and response capabilities
(Harrington, 2017).
Conclusion
References
1. Bisio, I., Lavagetto, F., Marchese, M., Sciarrone, A., & Vallan, A. (2016). An overview
on industrial alarm systems: Main issues and open problems. IEEE Transactions on
Industrial Informatics, 12(1), 1-11.
5. Islam, S. H., Hossain, M. S., & Kim, J. (2020). A survey on security and privacy issues
in internet-of-things. IEEE Internet of Things Journal, 7(1), 1-27.
8. Schneier, B. (2015). Data and Goliath: The hidden battles to collect your data and
control your world. W. W. Norton & Company.
10. Whitman, M. E., & Mattord, H. J. (2016). Principles of information security (6th
ed.). Cengage Learning.
Page 10 of
10