Physical Security

2127 words 9 pages
Physical Security

Table of Contents

INTRODUCTION III
ELEMENTS AND DESIGN III
EXAMPLES OF PHYSICAL SECURITY III
PHYSICAL SECURITY ELECTRONIC ACCESS III
CASINOS AND GAMING III
EDUCATION III
TRANSPORTATION III
Goggle Search iii
Dictionary Search iii

Introduction

This paper examines Physical Security from the perspective of perimeter such as gates/guards, building access controls, room access controls, enforcement options, auditing approaches, risk determination for physical attack vectors, etc. Physical Security describes measures that prevent and/or deter attackers from accessing a facility, resource, or information stored on physical media. It can be as simple as a locked door or as elaborate as multiple
…show more content…
In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed. Although the term closed-circuit television (CCTV) is common, it is quickly becoming outdated as more video systems lose the closed circuit for signal transmission and are instead transmitting on computer networks. Advances in information technology are transforming video monitoring into video analysis. For instance, once an image is digitized it can become data that sophisticated algorithms can act upon. As the speed and accuracy of automated analysis increases, the video system could move from a monitoring system to an intrusion detection system or access control system. It is not a stretch to imagine a video camera inputting data to a processor that outputs to a door lock. Instead of using some kind of key, whether mechanical or electrical, a person's visage is the key.

Private factory guard
Intertwined in these four layers are people. Guards have a role in all layers, in the first as patrols and at checkpoints. In the second to administer electronic access control; In the third to respond to alarms. The response force must be able to arrive on site in less time than it is expected that the attacker will require breaching the barriers; And in the fourth to monitor and analyze video. Users obviously have a role also by questioning and reporting

Related

  • Healthcare It Security and Cloud Computing
    2587 words | 11 pages
  • Physical Therapist Assistant
    2027 words | 9 pages
  • Physical Diversity in the Workplace
    1438 words | 6 pages
  • General Security Policy
    4699 words | 19 pages
  • Organizational Security Plan
    1911 words | 8 pages
  • Security and Privacy
    1855 words | 8 pages
  • Procedures in the Physical Science
    1469 words | 6 pages
  • Role of Security Department in an Organisation
    2090 words | 9 pages
  • The Social-Emotional, Cognitive and Physical Benefits of Physical Activity
    1154 words | 5 pages
  • Homeland Security
    1394 words | 6 pages