Physical security is the wide phenomena that are taken for the prevention or determent of attackers from a possible access of a resource, information that is stored within physical media and facilities. Physical security is viewed under three fundamental aspects. These are;
• Responding adequately to the measures of security that would repel or catch the possible attackers in the event of detection.
• Using gadgets and implements that are forthwith important in the control of secure atmosphere. This could include cameras, security lighting and use of alarms, patrols by security guards that provide easy noticing of attacks.
• Facilitation of obstacles that are aimed at frustrating any possible attackers and delaying the serious security cases.
A proper set of security designs has the compliment of all these structures that work cohesively with one another. A good physical security design is a compliment of four important factors which are intrusion detection, electronic and mechanical access controls, environmental design and video monitoring. Physical security is based on various principles that are applied to solve various security concerns at varied depths. (Walter, 1997). These include;
Building security: Buildings are the source of residence for human beings. However, their structural planning and establishments is compromised by various security threat factors that make the life of those living in them unsafe. Building security therefore implies all the fundamental components of architectural and construction concerns that make buildings safe places for living and hostage. It is the compound of all structures that provide authenticity in the physical structures that provides the safest levels for the habitation.
The guarantee for this security is well accorded during the designing phase of the building. The aspect of this security is inclusive of both the internal and the external environments that are occupied by the building. The physical structure of the building should be designed in the most appropriate manner that provides the highest levels of security measures for its inhabitants. It should include a coordinated design in the roofs, walls outlet such as doors, windows and locks (Donald, 1997)
Ground security: This is the protective aspect that is attached to airports and its surrounding environment. It includes all aspects that are attached to the physical structure of an airport that makes it a safe place for the various activities that goes on within their contemporaries. It incorporates adequate placement of the structures such as runways, surveillance services, communication systems and all aspects that are endowed within the structures of an airport. Due to the delicacy of the airport operations, high importance should be attached in the highest levels of security for the activities and processes of the airport (Azari, 2003)
Access control systems: These are systems of control that are applied in securing adequate security towards information and other facets of information systems. This is the provisions of providing the legitimate users with the principles with which they should apply in assessing stored data. Information is deemed as an essential aspect and a resource aspect within any organization. Access control systems should therefore address the fundamentals with which the information should be mined, shared and made into use. Improper and illegitimate use of data and information may lead to comparative disadvantages for the organization.
Improper and inappropriate use of information is subject to huge loses to an organization through misuse of the data and information that leaves the organization at a competitive disadvantage when its information is used by its competitors to develop business strengths. Importantly, the aspects of corporate intelligence as well as industrial espionage are two important aspects that define the rationality for data security. The current business environment and the expanding technological advancement have seen this process fully acknowledged. Various tools have been used to safeguard the organization information and their respective systems. Substantially therefore, physical security on information and their systems remains implicit for the success of the organization (Harold, 2003)
Perimeter security: This is the broad components of techniques and methods that are used in providing an outer bounder security of premises. This is essential in preventing possible access of unauthorized persons within the premises. These may keep off trespassers, thieves, unauthorized persons and others persons. It can be secured using physically constructed walls and fences. Perimeter security is made to advance the most optimal security prospects that would help to safeguard the internal structures that are endowed within premises. Perimeter security should be advanced therefore as protective measures that safeguard the internal prospects of the premises.
Technological advances security: This is the security protection for innovations, technological advancements, designs and process improvements. This should be protected to avoid losses through comparative disadvantages occurring form business competitors. It includes intellectual property security that can be provided through trademarks. Innovations come as the process of advancement in specific lines of production and manufacturing or personal production of his/her intellectual work. Security on these productions providing the environment with which the producer or the copyright owners can be safeguarded form any possible activities of misuse of the product that may make the profit motive of the technology to be unmet. (Peter, 2000)
Courtney from Study Moose
Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/3TYhaX