Effective Physical Security

2468 Words5 Pages

In order to have an effective physical security program you need to know what you are protecting and why you are protecting it. Physical Security encompasses the protection of people, places, things, and data. Protecting each of these elements requires different pieces of equipment or different avenues but the philosophy of the protection is the same. In this I mean that you are protecting from unauthorized access to the places, people, things, and data.

As stated by Fennelly, “no business is without security problems and assets protection risks. “ I have read this and still don’t understand what he is getting at so I came up with my interpretation of his statement; no business is without security problems and the need for asset protection. This being said everyone understands that problems will exist in any security program, and assets will always need to be protected from unauthorized access or loss. The key is to find the correct mix of physical layers that’s cost effective while providing a strong physical security posture.

People have been using physical security measures such as barriers for protection for centuries (McCrie, 2007). Every living thing uses physical security to protect their home, family, and themselves with some form of barriers. These barriers can be either man-made or natural as long as they define, delay, or detect unauthorized access (Fennelly, 2004). These barriers are used to protect not only the facility but the assets located inside. I will describe these barriers starting from the outside and working into the facility.

When your facility is being designed you need to be included so you can ensure the security measures you want are in place. This way you are able to incorporate your needs and...

... middle of paper ...

...once all the protective measures and policies have been incorporated into the culture of the company the safety of personnel will follow.

Works Cited

Fennelly, L. J. (2004). Effective Physical Security,. Burlington, MA: Elsevier Butterworth-Heinemann.

Johnson, B. R. (2005). Principles of Security Management. Upper Saddle River, NJ: Pearson Prentice Hall.

Kovari, P. (2005). WebSphere Security Fundamentals. International Technical Support Organization (IBM.com/redbooks).

McCrie, R. D. (2007). Security Operations Management. Burlington, MA: Butterworth-Heinemann.

Robert J. Fischer, E. H. (2008). Introduction To Security. Burlington: Butterworth-Heinemann.

Service, D. S. (2006, February). National Industrial Security Program Manual. DoD 5220.22-M .

Tipton, H. F. (2004). Information Security Management Handbook. Boca Raton, FL: Auerbach Publications.

Open Document