Saturday, June 15, 2019

Convergence the use of bothTechnology and Physical Security Research Paper

Convergence the use of bothTechnology and Physical Security - Research account ExampleUnlike in the past, bodily assets are now information-based. This has suppleed corporations to integrate both physical and information security measures measures to prevent unauthorized access to the corporate assets. In addition, the rapid advancements in the technology sector has brought into question the effectiveness of security functions in preventing criminal attacks in organizations. Explored in the research are the implications of adopting security convergence within an organization, analysis of trends affecting security and loss prevention, and evaluation of non-traditional approaches to crime prevention from a multi-disciplinary approach.As mentioned, physical security disapproves unauthorized individuals from accessing facilities. on that point are several types of deterrence methods, which function by convincing attackers that imminent attacks on a facility are futile due to the pr esence of brawny defenses. They include physical barriers, security lighting, natural surveillance, intrusion detectors/ electronic surveillance, access control among others. Physical barriers represent the outermost layers of security measures, which include fences, warning signs, and fomite barriers. Their sole purpose is to delay attacks by acting as psychological deterrents. Security lighting installed at entrance points such as gates and doors deter unauthorized entrants, as guards can clearly see the well-lit areas. Natural surveillance entails altering the design or architecture of a facilitys security deposit to prevent unauthorized entry for example, the vegetative cover between the fence and the facilitys walls is less dense giving guards a clear row of sight. Intrusion detectors/ electronic surveillance comprise of alarm systems, which function by alerting security personnel when unauthorized entrants attempt to trespass a secured area. Without prompt response from sec urity personnel, alarm systems prove futile in preventing unauthorized

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.