Updated:

Providing Physical Security in an Unoccupied, Unattended Facility Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introducing the Topic

During the pandemic worldwide, many companies, large and small, successfully switched to work distantly, and thousands of offices remained empty due to a lack of demand. Many organizations faced with the new reality were concerned about the possibility of various thefts, burglaries, and other forms of unauthorized entry into their workplaces. Due to this, there is a need to ensure the physical security of equipment and other assets of the enterprise. To solve the security problem at unoccupied and unattended facilities, it is necessary to introduce technologies, preventive and detective controls. The countermeasures will fill the gap in the business continuity planning and provide reliable protection of the facility, especially since the digital world resources provide new opportunities, including security.

Cards and IDs

  • Currently, for access control, various types of cards and identifiers of varying degrees of complexity of the device are used, differing in the presence of additional capabilities.
  • Smart cards “provide great flexibility in access control;” the large storage capacity allows for recording the fingerprint or iris of the rightful cardholder. (Thompson et al., 2018, p. 79)
  • The whole procedure takes about half a second, and the card does not even need to be removed from the wallet.

Combination Locks

  • These devices are reliable, but the level of protection they provide is limited by passing or guessing a password.
  • A combination lock usually allows entering many different codes, giving each user an individual one.
  • To increase the security level of this access system, it is necessary to periodically change the codes; this is not particularly difficult, and using combination locks provides some security, performing the functions.

Biometrics

  • Highly reliable, affordable biometric verification tools – primarily by fingerprint – are coming to the fore in the security arsenal.
  • Biometric identification is used not for identification by searching for a match in the user database but for verifying a person identified using technologies of personality recognition categories (Yang et al., 2019).
  • Identification is carried out by card / PIN-code, and then verification by fingerprint is performed.

Photography and Video Surveillance

  • Cameras can record vehicle numbers at checkpoints and, combined with step sensors, photograph people in essential areas.
  • CCTV cameras installed covertly or openly can be used to conduct surveillance indoors or in the area adjacent to the building as a deterrent and for subsequent analysis of incidents (Goyal et al., 2017).
  • In the case of unoccupied facilities, remotely controlled cameras are most relevant. New technologies make it possible to automate due to using software that detects changes in the television picture.

Sensors and Alarms

  • Implementing an alarm system and its sensors is a good way to control the facility; motion, heat, and contact pairs sensors are used to detect door openings.
  • Additional types of sensors can be used in the CC alarm systems – laser barriers, step, touch, vibration sensors (Tseloni et al., 2017).
  • An excellent option would be if the sensors are connected to the network, it becomes possible to remotely monitor and control movements from access control devices.

Summary

Unoccupied and unattended facilities need to improve systems for ensuring the physical security of equipment and other assets of the enterprise. At the moment, there are many effective ways to monitor the workspace without being in it. The above measures of the permit regime, video surveillance, and alarms can be considered detective since these are the leading technologies of our digital reality to ensure physical security. The problem and its solution require an integrated approach with an analysis of all risks and requirements. The combination of various identification methods is needed to increase the level of reliability.

References

Goyal, S., Desai, P., & Swaminathan, V. (2017). . Sensors Journal, 17(22), 7497-7501. Web.

Thompson, R., Tseloni, A., & Tilley, N. (2018). Reducing burglary. Springer.

Tseloni, A., Thompson, R., Grove, L., Tilley, N., & Farrell, G. (2017). Security Journal, 30(2), 646-664. Web.

Yang, W., Wang, S., Hu, J., Zheng, G., & Valli, C. (2019).Symmetry, 11(2), 141. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, November 15). Providing Physical Security in an Unoccupied, Unattended Facility. https://ivypanda.com/essays/providing-physical-security-in-an-unoccupied-unattended-facility/

Work Cited

"Providing Physical Security in an Unoccupied, Unattended Facility." IvyPanda, 15 Nov. 2022, ivypanda.com/essays/providing-physical-security-in-an-unoccupied-unattended-facility/.

References

IvyPanda. (2022) 'Providing Physical Security in an Unoccupied, Unattended Facility'. 15 November.

References

IvyPanda. 2022. "Providing Physical Security in an Unoccupied, Unattended Facility." November 15, 2022. https://ivypanda.com/essays/providing-physical-security-in-an-unoccupied-unattended-facility/.

1. IvyPanda. "Providing Physical Security in an Unoccupied, Unattended Facility." November 15, 2022. https://ivypanda.com/essays/providing-physical-security-in-an-unoccupied-unattended-facility/.


Bibliography


IvyPanda. "Providing Physical Security in an Unoccupied, Unattended Facility." November 15, 2022. https://ivypanda.com/essays/providing-physical-security-in-an-unoccupied-unattended-facility/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1