12 Dec 2022

128

Disaster Recovery and Business Continuity: Physical Security Measures

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 636

Pages: 2

Downloads: 0

The current business owners face numerous security problems at every turn. Due to advancing technology, the threat can emanate from anywhere. However, many have not taken into consideration the importance of physical security. While numerous businesses direct their prevention efforts on hacking and cyber-security, they should not ignore physical threats. Every breach, whether small or big can dramatically affect various businesses ranging from damaged reputation, financial losses to employees feeling insecure ( Ali & Awad, 2018 ). It is therefore important for any business whether big or small to put the right physical security measures in place to keep their business and data safe. Some various technologies and countermeasures can be implemented to address the problem of providing physical security in the unattended facility ( Chowdhury et al., 2021 ). These technologies include perimeter fencing, closed-circuit television (CCTV), audio scanning, key-card controlled entry, and alarm systems. 

Perimeter fencing 

They are designed to surround an area and prevent unauthorized vandalism and access 

The perimeter fence can indicate your property from the rest and is commonly utilized for privacy, visual appeal, and security 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The commonly used perimeter fences come in a series of vertical concrete or metal bars and are perfect for high-security properties. 

The perimeter fence is ideal because they create a barrier that provides security from unauthorized people and other forms of crime 

Perimeter fences increase privacy and allow people to perform their activities without worrying about external things. 

Closed-circuit television (CCTV) 

It involves video camera utilization to transmit a signal to a particular area on a limited set of monitors. 

CCTV depends on strategic placement of cameras and camera input observation on monitors 

CCTV cameras are applied in areas that need ongoing monitoring or additional security to establish a more secure perimeter 

Installing a CCTV network gives a person visibility into the places that need to be protected to respond and mitigate criminal activity onsite 

They are used to maintain perimeter security and further obtain a visual record of various activities in areas where proper security is required. 

Alarm systems 

It is a system that is developed to detect intrusion of unauthorized entry into building or business areas. 

They are made up of sensors that detect trespassers and an alert device that indicate the intrusion.   

Some of the components of the alarm system include a premises control unit, alerting devices, interconnections, sensors, and keypads ( Tan et al., 2017 ). 

The system operates by sending signals to a monitoring station when sensors are faulted. This makes the system respond based on the programming setting for the zone 

Alarm system mainly protect buildings from burglary and intrusion, offer a safe working environment and real-time security updates 

Key-card controlled entry 

It is a security token that gives a person access through electric-powered doors 

The system requires a keycard reader that is installed on the door and a person gain access to a building by swiping, inserting, or tapping the card 

Once the reader notices the access credentials of a person, it communicates with the door lock that sends a signal to the lock to begin an unlock event. 

The main advantage of a key card controlled entry is that it removes the hardship of using traditional keys 

Keycard offers restrictions of an unauthorized person into a building thereby providing safety and security to staffs 

Security lighting 

It is lighting that detects or deters intrusions on a building thereby increasing safety. 

The best outdoor security lights that can be used include Ring Floodlight Cam, RAB Lighting Super Stealth Bullet Floods, and LITOM LED Solar Outdoor Lights 

Security lighting is important because it provides a level of illumination to identify objects or persons and develop a psychological deterrent to criminal activity 

Continuous and standby lighting are the most commonly used lighting units for security lighting systems 

In conclusion, business owners should provide appropriate perimeter security to prevent their premises from intrusion and theft. The use of security lighting, key-card controlled entry, alarm systems, CCTV, and perimeter fencing are some of the perimeter security technologies that can prevent criminal activities from happening.  

References 

Ali, B., & Awad, A. I. (2018). Cyber and physical security vulnerability assessment for IoT-based smart homes.  sensors 18 (3), 817. 

Chowdhury, S., Covic, A., Acharya, R. Y., Dupee, S., Ganji, F., & Forte, D. (2021). Physical security in the post-quantum era.  Journal of Cryptographic Engineering , 1-37. 

Tan, W., Sun, Y., Azad, I. I., & Chen, T. (2017). Design of univariate alarm systems via rank order filters.  Control Engineering Practice 59 , 55-63. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Disaster Recovery and Business Continuity: Physical Security Measures.
https://studybounty.com/disaster-recovery-and-business-continuity-physical-security-measures-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

How AI Can Help Retailers Solve Business Problems

The global marketplace is currently more integrated than ever before. This situation presents a never-before experienced opportunity for retailers. Multinational organizations whose sole basis is the internet have...

Words: 2700

Pages: 5

Views: 138

The Natural Organizational Model and the Informal Groups

The nature of an organization is based on different factors such as the environment it is set up in. also, the type of activity it undertakes. This paper will examine the natural organizational model, the informal...

Words: 3009

Pages: 10

Views: 239

Why Pinkberry should focus on making orange and yellow the two prevailing colours

The fact that Pinkberry has evolved from a storefront to a nationally recognized brand makes this franchise of frozen dessert yogurt shops an example to be followed. Yes, the personality of a brand created a platform...

Words: 582

Pages: 2

Views: 93

Ford Motors: Board Presentation For Electric and Hybrid cars Production

Executive Summary The motor vehicle industry in America and worldwide is highly competitive with major players no longer enjoying the dominance that they had had before. Innovation and identification of trends...

Words: 1088

Pages: 4

Views: 129

Home Remodel Project Plan

Project Overview Home remodeling is one of the notable key projects undertake through project management, as a project manager is expected to come up with a clear plan that would help in meeting the expected...

Words: 2152

Pages: 8

Views: 68

How Airbnb Achieved Success

Hospitality industry includes firms that provide lodging and dining services for customers. Many of the businesses in the travel and hospitality industry offer customers with prepared meals, accommodation, snacks,...

Words: 906

Pages: 3

Views: 63

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration