The “concentric ring” theory of physical security, also known as defense-in-depth Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

In various cases, it has from time to time been obligatory for higher-ranking officials of chief executives, envoys and governments to live inside a complex with secured boundaries, and to journey out of it only in a group.

This may perhaps, in various cases, be easier and calmer for all apprehensive people including families, than endeavoring to formulate a secluded stronghold of each entity. It does, though, depend on a key strategy result by the government, and will consequently be exceptional.

An individual bastion can be well-built — although almost certainly, not tough enough to discourage a military assault by a big, well equipped guerilla division. But to discourage something short of this, the same protection in power is essential for a plant or office multi-part.

This implies that concentric rings to holdup and give caution of attack, adjacent with determination built house with a ‘keep’ for extended defense pending help. (Goldstein, 1990)

The external concentric loop is once more a practical one: the objective should avoid conventional routines, and maintain the comprehension of his whereabouts only to those who require the knowledge.

The second ring is both ritual and material: he ought to try not to let everybody see him getting into or out of his automobile, nor in opening a gateway or garage access. As previously pointed out, his exit and arrival are his most susceptible moments.

The third ring — which develops into the outer ring as soon as he is within the abode — will be a valuable boundary barricade, lacking cover for people to hide from view close to it, very well lit, hard to traverse, and with a vigorous and dependable alarm structure.

The fourth ring ought to be a whole halo of open land in-between the boundary barricade and the quarters. This can be offered by clearance of the plot and patio of uncalled for flowering shrubs and hedges. It ought to be very well lit, exclusive of shaded spots like the area at the rear of buildings or foliage in which people may hide from view.

Where extraordinary strength is obligatory, the backyard may be covered by motion/movement detectors, as depicted above for ‘vulnerable areas’ in industrial units. Feelers or sensors of the buried-line model which are able to cover an area of up to 200 yards or more are highly appropriate.

So much can be discussed about floodlights, or additional floodlights, which may be activated by the alarm on the perimeter wall or linked to motion/movement detectors that may be covering the backyard.

An unexpected bright flash of light can astonish any intruder who is away from a shade and startle them into perplexity or departure. It is equally applicable to a noisy alarm or bell, with optional manual and automated systems of starting.

The doors of the home ought to, of course, be physically sturdy, electronically locked and subjected to visual perception via means of identifying visitors via CCTV, wide-angled eyeholes or reflectors and it should also have remote-controlled opening. This ought to also applicable to the external gateway of the boundary which, if not manned, ought to be controlled from the quarters.

Points of entry ought to be reduced to the least sum, but optional exits must be accessible, e.g., in case a fire breaks out, or to enable the family unit and others to flee at the same time as access is being gained at the focal door.

Portholes ought to be secured or draped. If there is a danger of an explosion, coated glass or epoxy resin polyester film will decrease the risk of soaring glass, and chain mesh may deter grenade assaults.

Inside an endangered dwelling there must be an intercom system, substitute telephones (one may possibly be linked directly to the law enforcement officers) and maybe a broadcasting connection. Fire sensors may be modified also to communicate a ‘panic button’ pointer to the law enforcement officers, or to echo an earsplitting alarm.

Also — as in an industrial unit or workplace — the ‘keep’ must have strong substitute communication apparatus, if possible as well as a battery broadcasting transmitter which may be netted to the police force frequency.

On any one occasion, a dishonest or unfaithful member of the family/household can invalidate all other protective procedures. A terrorist group after a specific victim will with no doubt strive to penetrate his family circle most likely through his private workforce.

They may try to induce or compel them. Scrupulous care ought to be taken when selecting servants to guarantee that they are not susceptible to blackmail or pressure — possibly via coercion of their family units. The accounts of cases of abductions as well as shootings are jam-packed with instances of personnel who desired to be steadfast but gave in due to intimidation against their family units.

References

Bonoma, T., & Slevin, D. P. (1978). Executive survival manual. Boston: CBI Publishing Company.

Brown, J., Kroszner, R. & Jenn, B. (2002). Federal tourism insurance. Cambridge. MA: Harvard University Press.

Buford, J. A. Jr., & Bedian, A. G. (1988). Management in extension. Alabama: Auburn University Press.

Chambers, R. (1993). Challenging the profession: Frontiers for rural development. London: Intermediate Technology Publications.

Cherrington, D. J. (1989). Organizational behavior: The management of individual and organizational performance. Boston: Allyn and Bacon.

Clark, R. C. (1992). Basic concepts and theories of administration and supervision. Toronto: Simon and Schuster.

Covey, S. R. (1992). The 7 habits of highly effective people. Toronto: Simon and Schuster.

Delmey, J. (2003). The aftermath of September 11: The impact on and systemic risk to the insurance industry. Geneva Papers and Risk and Insurance – Issues and Practices 28(1) , 65-70.

Drucker, P. R. (1966). The effective executive. New York NY: Harper & Row.

Fielder, F. (1966). A theory of leadership effectiveness. New York, NY: Mc-Graw Hill.

Fogelson, R. (1977). Big-city police. Cambridge MA: Harvard University Press.

Goldstein, H. (1990). Problem-oriented policing. New York, NY: Mc-Graw Hill.

Hobsbawm, E. (1968). Industry and empire. Harmondsworth: Penguin Books.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, May 14). The "concentric ring" theory of physical security, also known as defense-in-depth. https://ivypanda.com/essays/the-concentric-ring-theory-of-physical-security-also-known-as-defense-in-depth-essay/

Work Cited

"The "concentric ring" theory of physical security, also known as defense-in-depth." IvyPanda, 14 May 2019, ivypanda.com/essays/the-concentric-ring-theory-of-physical-security-also-known-as-defense-in-depth-essay/.

References

IvyPanda. (2019) 'The "concentric ring" theory of physical security, also known as defense-in-depth'. 14 May.

References

IvyPanda. 2019. "The "concentric ring" theory of physical security, also known as defense-in-depth." May 14, 2019. https://ivypanda.com/essays/the-concentric-ring-theory-of-physical-security-also-known-as-defense-in-depth-essay/.

1. IvyPanda. "The "concentric ring" theory of physical security, also known as defense-in-depth." May 14, 2019. https://ivypanda.com/essays/the-concentric-ring-theory-of-physical-security-also-known-as-defense-in-depth-essay/.


Bibliography


IvyPanda. "The "concentric ring" theory of physical security, also known as defense-in-depth." May 14, 2019. https://ivypanda.com/essays/the-concentric-ring-theory-of-physical-security-also-known-as-defense-in-depth-essay/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1