26 Nov 2022

54

CPTED Applications: Surveillance Options

Format: APA

Academic level: College

Paper type: Research Paper

Words: 1181

Pages: 4

Downloads: 0

When carrying out any business, the security of the assets, visitors, and employees is one area of key concern. Given that the nature of the subject business is mainly data management, enhanced security measures are vital. Confidential data management such as that of United States citizenship requests calls for regulatory restrictions that will aim at controlling access to both physical and virtual systems (Barker, 2012). Threats to this business include robbers, hackers, aggrieved persons such as those denied citizenship, insider activity (employees, visitors), and natural calamities, among others. Poor security systems will render the facility vulnerable to attacks by these threats. This plan will act as a guide when constructing the facility and conducting business operations. One effective way of avoiding risk at the center is implementing Crime Prevention Through Environmental Design (CPTED) solutions. CPTED will ensure the environmental conditions around the facility are considered to lower the likelihood of crime and increase the level of security monitoring (Landstrom, 2017). One CPTED principle that can be utilized is natural surveillance. This will involve using the land in a way that creates clear sightlines to deter criminals. For example, clearing vegetation that may be blocking views and trimming plants along the perimeter will minimize intruder and hiding options. Access control will minimize opportunities for crime and will involve activities such as directing users (employees, suppliers, visitors, etc.) in orderly and restricted directions. The third principle is territorial reinforcement which refers to designing the areas at the facility in such a way that helps the users feel safe and enjoy it. Through this, all users will be able to notice any security breaches and attempt to prevent it or call for help. Public and private sections must be well labeled for easy distinction. Fourthly, space management is a principle that requires the spaces in and out of the building to be utilized well. Keeping the area clean and tidy and prompt repair works are some activities to abide by this principle. Users will, in turn, feel proud to be part of such a space. Rural areas have reduced human activity. The need for indoor and outdoor surveillance is therefore increased because it is easier for criminal activity to be conducted unseen in such an area. Surveillance options are both natural and technical. Natural surveillance can be enhanced through architectural designs that allow enough light into the building and enhance the visibility of the surrounding areas. Surveillance technology such as CCTV cameras will be used to enhance natural surveillance. Some factors to consider when choosing the best surveillance technology are as follows: 

Location of the surveillance equipment . The technology is best installed in vulnerable areas like those that are partly or fully concealed from normal view. Other areas are those that experience reduced activity for significant amounts of time. Electronic monitoring equipment such as number plate readers is suitable for entrances and exits. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Amount of lighting . Since surveillance technology may need to work around the clock, lighting is important for maximum performance, especially at night. CCTV cameras, for example, are sensitive to light and it may be necessary to control the amount of light in the space being monitored. This will enhance the quality of the images produced. Gates and doors must also be well-lit to ensure the technology used performs effectively. 

Security of the equipment . The installation should be done in a tamper-proof manner. They should be placed up high or in guarded areas to prevent unauthorized access. The infrastructure for such should be provided before the equipment is procured. 

Provision for remote access . Security personnel should be able to access information from this equipment whenever necessary. This is especially important during emergencies. Thus, the technology is best fitted with remote access options to enhance monitoring activities at the facility. 

The facility is set on a large area that covers 30,000 square feet of land and will, therefore, have significant barriers across the area. These barriers can be natural or structural. Natural barriers are included in the terrain and vegetation. Structural barriers like gates, fences, walls, posts, and barricades, among others, are installed in specific areas as necessary. Barriers are a great deterrent for intruders because they restrict movement. In this way, an intruder’s speed and direction are altered any time they come across a barrier. As a result, security persons are able to catch up with them and take necessary action. Some barriers such as posts and barricades can be moved as needed in cases of crowd control. Limiting and preventing of access using locks is one way of enhancing physical security at the facility. Locks are used for door and window control. In addition to locking, minimal access is important to reduce contact with secret and confidential information. Such information is best stored in safes that have digital locks and are fire and waterproof. These safes are opened using codes specifically assigned to the particular safe which minimizes access to the stored items to only those in possession of the codes. Storage rooms are also suitable for storing highly confidential material. The rooms can be accessed through doors fitted with security card readers and/or code locks. At the minimum, all doors especially the high-security areas should have a three-digit combination lock. Main doors may have deadbolt locks for that extra layer of security. Ample lighting is important for enhanced security. Given the kind of business operations, light is an important factor for job performance at the premises. Lighting at the parking lots should illuminate all blind corners and prevent shadow and glare. This will help drivers to navigate well and pedestrians will be able to see their surroundings comfortably. At the entry points, lights should be bright enough to identify all persons and objects but dimmed to avoid glares. Security personnel at these points will have an easy time controlling access into and out of the building in comfortable lighting conditions. Office spaces are best lit naturally during the day to help users remain comfortable while working and moving around. At night, normal indoor lighting is applicable. Desk lamps can also be installed to allow users to control the amount of light without interfering with other users. Central station signaling has an advantage over a local alarm system for the premises because it is monitored round the clock which helps to identify security breaches as soon as possible. Qualified system handlers are alerted by the system in real time. This reduces the response time. Further, the system is computerized and it logs the information received which is vital for further investigation and future crime prevention strategies. Entry control mechanisms control access to the business premises. For easy identification of different groups of people, unique identification cards should be issued. Employee badging is available in at least three forms. Pre-printed cards will only have the name of the cardholder. These are essential for temporary users such as visitors and suppliers. Proximity cards are embedded with antennae that can be read when within the range of a reader, they have the employee’s information as inputted on issuance. PVC/plastic cards are types of smart cards that have a memory chip. They are similar to credit cards. Both proximity cards and PVC are suitable for computerized doors that promote better entry control. 

Conclusion 

This plan is aimed at protecting data in form of confidential information that includes that of potential US citizens from loss, damage, and unauthorized access. The data center is very vulnerable to unauthorized persons and applications due to the sensitive nature of the information it handles. If properly designed, tested, and implemented, the plan will help the organization to maintain its ability to conduct business while keeping the large volumes of information well protected and safe from any kind of alteration. Physical security is definitely important to ensure the safety of the premises, including its users and all resources, and the general public. 

References  

Barker, D. (2012). A guide to physical security for data centers. The Data Centre Journal. http://www.datacenterjournal.com/a-guide-to-physical-security-for-data-centers/ 

Landstrom, B. (2017). Data center risk avoidance with CPTED. Bob Landstrom. Retrieved from http://www.boblandstrom.com/data-center-risk-avoidance-cpted/ 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 17). CPTED Applications: Surveillance Options.
https://studybounty.com/cpted-applications-surveillance-options-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

HACCP: A Systematic Approach to Food Safety

HACCP entails an organized preventive undertaking to food safety from chemical, biological, and physical hazards in the processes of production which can make the finished products unsafe. A collaborative effort...

Words: 268

Pages: 1

Views: 142

Sampling: The Selection of a Particular Sample or Group to Represent an Entire Population

Sampling involves the selection of a particular sample or group to represent an entire population. Sampling techniques are categorized into two major groups that comprise non-probability and probability sampling. In...

Words: 564

Pages: 2

Views: 186

GIS Uses in National Wildlife Refuge Management

GIS is also known as the geographic information systems; these are computer systems that are used in the manipulation of data. These computer systems include both hardware and software systems, working together for...

Words: 679

Pages: 2

Views: 111

Factors That Least Affect the Global Environment

Introduction Kutz (1) defines environmental degradation as the destruction of habitats and ecosystems and the depletion of natural resources. The destruction of the environment arises from a combination of both...

Words: 1188

Pages: 4

Views: 88

Restoration of the Chesapeake Bay

A desirable ecological balance is one in which the factors that make the given environment what it is desirable. The Chesapeake Bay is one of those ecosystems which has lost the desirable balance and hence, has...

Words: 259

Pages: 1

Views: 132

Hazard Analysis Techniques for System Safety

A hazard is the potential of a risk occurring if a particular machine, item, or process is left uncontrolled. Workplaces have several hazards which may be caused by machines, energy sources, raw materials, chemicals,...

Words: 679

Pages: 2

Views: 143

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration