Cjs250 Appendix D The Three Models of Physical Security | Documents and Forms | Research Papers

Cjs250 Appendix D The Three Models of Physical Security

Cjs250 Appendix D The Three Models of Physical Security BA-425
In Stock
$ 4.99 USD
Quality Academic Papers
Buy and Download > Description

Part I: Office Building Description A six foot fence secures the outer perimeter. Video surveillance is active on the north fence and inactive on the south. A manned guard station permits entrance into the outer perimeter from the west; an unmanned and unlocked gate permits entrance from the east. No Trespassing signs are posted at intervals upon the perimeter fence; Employees Only is posted on the gate. Visitors must obtain a pass at the guard station.  The outer perimeter contains the parking lot and office building. The perimeter has two light posts that, when functioning, illuminate the entire parking lot. Currently, the light post on the south side is not functioning.  The office building exterior has three outer doors and one window. The first door is marked with an Employees Only sign and requires a badge for access. The second door is the main entrance for visitors and is manned by a guard, who requires a visitor’s pass for admittance. The third door is an emergency exit only and is clearly marked. Any attempt to gain access through the first door without a badge, the second door without a pass, or the third door at all, results in alarm activation and guard response. The window is locked from within; any attempt to gain access through the window also activates the alarm and alerts the guard.  The interior of the office building is segmented into two major areas. The first area is the employee workstation; only employees can access this area. Visitor and employees can access the second area. Both the first and second areas are monitored by active video surveillance.  The second area has two doors, both of which lead to smaller offices. The first door is unlocked, but is within sight of video surveillance and employees within the work station. A visitor trying to attempt access to this office results in alarm activation. The second door is obscured from both employees and video surveillance and is unlocked. Each office contains valuable assets. Employees can access either office at will.  Within the workstation and smaller offices are several computers. Passwords are required for access to each computer. Each employee has a password and can access network information at any time.  Part II: Describe the three models of physical security as they apply to this particular environment. Summarize the environment’s strengths and weaknesses within each model.  Lines of Defense: The Lines of defense model refers to the security plan developed by the facility in order to secure the perimeter inside and out. What this means is security is addressed from the very outside of the facility and then move inwards to secure the entire environment. In the above scenario the facility has followed this defense model by securing the perimeter with a fence and locking and securing all outer doors. The facility has also provided doors manned by guards or security alarms for both inner and outer doors and video surveillance. The weakness of this model in c

Part I: Office Building Description A six foot fence secures the outer perimeter. Video surveillance is active on the north fence and inactive on the south. A manned guard station permits entrance into the outer perimeter from the west; an unmanned a
Recent Reviews Write a Review!
0 0 0 0 reviews