Basic Physical Controls
Basic physical controls will include controls that are less advanced but still effective as other types of security. No matter what other types of controls will use, basic security controls will always be important to business for certain low risk areas like bathrooms, offices, equipment, labs, or even lunch areas. Some of the basic control will include the traditional lock and keys, fencing for the outside area, lighting, and guards. These types of controls will make any area more secure.
Traditional locks and keys can actually make a business feel more secure because the mere use of locks will make it longer for an intruder to gain access. When a business makes it more difficult it will make it easier to be noticed because of the length of time. An intruder is looking for easy access, so they can be in and out and unseen. This type of control is also cheaper and can be used on larger areas such as office areas.
Basic physical controls actually set the stage for interior and exterior security. Locks and keys can be used more internally but can also be used on fencing Lighting is a type of control that can also be used for both. Lighting can be used in target areas such as alley ways, dark corners on the inside, and in parking lots. Lighting can help to prevent petty crimes such as vandalism or break-ins. It increases the risk of being seen by another individual.
Fencing is used on areas such as construction sites, around the building, and even in areas such as access points internally. Fencing can make it more difficult to gain access and lower the amount of theft and other threats.
Regardless of the amount of technology that is useable in and around a facility guards are a basic control that will maintain the other types of physical security such as alarms, sensors, alarms, and other devices. Guards that are present during an incident can take action and assess and take control over any situation before it gets out of hand. Some security can even call in law enforcement for assistance (University of Phoenix, 2011).
Perimeter protection is more in depth controls. A business can have several different perimeters that will work together and make security more successful. Perimeter protection may include protection of employees, customers, and the business information and technology. Computers are becoming a popular trend. A business database will contain important information and perimeters will be set to keep intruders such as hackers from getting any or too much information. Basic physical controls will support the defense of perimeters. Perimeter will use controls such as badges, security dogs, technical controls, or smart cards.
Perimeter protection can also be used in layers to protect a business. Several types of these protections working together can make it difficult to obtain any data or information about a business and keep employees and customers at ease. The outer perimeter may use different types of characteristics for badges. At a perimeter gate, guards may ask for these types of identification before allowing access to the property.
Smart cards will have information about individuals and include a chip for identifying each individual. This type of smart card can be put in ids and scanned at different areas throughout the building. Because of the different levels of risk, certain smart cards may have limited access. Setting a perimeter can detect and mitigate attacks. A private database will use perimeters to control the ability to access the database and the data. A perimeter can include protections such as anti-virus software or hardware for a computers database to catch threats before occurrence and try and send it to another network. Perimeter protection may be used both internally and externally.
External Building Security
The exterior of a building can be just as threatening. External Security could never be the only kind of security for control. A good security plan would include security that starts from outside of the business and continues inside for internal threats. External security may include different types of surveillance, fencing, lighting, and intrusion alarms.
The outside of a business that is vulnerable can cause more internal issues for a business. Security can help to minimize outside threats and be more aware of any individuals that may want to present harm to the environment.
Intrusion alarms can be sounded to warn a business faster of any threats. If an individual is trying to gain access and is found out at an access point such as the main gate, or employee entrance. Security can escort the individual off the property before entering the building.
Internal Building Security
Every business will vary in size and needs for internal protection. Each threat or event that occurs is used to help determine areas that are weak or need a higher demand for protection. The types of crimes that are committed more frequently are internal theft. The amount of employees that will work with business assets, will give the authorized access to certain areas that public visitors could never gain access to without a security guard or other personnel present. An employee will train and be able to gain certain access to specific areas of interest. Security may patrol hallways and public places to the employees such as a break room. Internal building patrol may be one way to protect business assets. However, in areas with higher risk, internal security can assess the vulnerabilities and lower risk. One limitation internally will include areas such as the bathroom. This area is private and cameras will only be place on the exterior of the bathroom. If an employee or other individual was able to successfully commit a crime such as theft and was unseen from surveillance it is much harder to prove.
Access Control and Protective Systems
Access Control is a common tactic for identifying employees before entering certain areas. An access point may include a gate, security check, identification verification, and other ways to protect the business and keep employees and visitors safe from harm while working. Protective systems will need assessment to keep up with newer changes. Change and consistency is important for control. Protective systems and access controls will teach employees discipline and increase the risk of getting caught by the business.
An important factor for access control and protective systems is surveillance. Surveillance systems are not meant to replace security but enhance it. When thinking about the amount of security guards and the area that will be covered There may be areas that remain vulnerable because of the lack of surveillance. Surveillance camera will catch things that a guard might not always catch even during patrol. Surveillance systems are utilized to fill in the gaps for better protection over company assets. A guard can walk right by as a crime is occurring and not even realize it is occurring. Also some areas may be patrolled more than others. In areas that are weak in surveillance, cameras are a good alternate because it can even catch a crime during the act. Surveillance systems are good but still need individuals to keep track of what is going on. Theft is occurring in an area on more than one occasion. A business might find some form of surveillance to strengthen the area and increase the risks of getting caught. Surveillance systems are utilized to protect the business, environment, and other assets. Surveillance systems can make it easier to cover more ground and catch any criminal activity that might not be seen as easy by security personnel
Protective Systems are always changing a business using security to help fight the vulnerabilities and make a business stronger. Without security there would be more threats, risks, and weaknesses. Security has several main functions used to build more protection for business assets such as the people, products, services, and the business as a whole. There are some issues that may require more security. The significance of concentric layers of security is for better protection. Even security needs some organization. Working in layers can help to break down a business into sections and build security for more specific needs. For example, one area may face different threats and may need special attention geared toward the threat. Each system has a purpose for protection of a business. A system can help to organize the different parts of protection and address any issues in the current system. Finding a solution is easy if the problems are addressable (Jennifer Goff May, 17th 2012).
A security budget can keep track of the finances. Everything in a business including security will have a price. The only problem is that every business is different and type of budget will vary. Budgeting for security is only a smaller percent of the total organizational budget. The more money a business makes, the more money is available for the budget. A budget for a business will include security personnel budget and security capital.
A business will not run itself. Each employee will be paid a certain salary for the job and this will be part of a budget for security. For example, the amount of hours times the amount of hourly pay will need to be budgeted for employee services to the business.
The Security capital budget may include any products or services provided to the business by other businesses. Any business will use outsourcing to obtain security, equipment, software, and other devices. Each of these services or products will have a price and will be a part of the budget. A budget will include any goods or services of the business.
Budgeting can be easy or hard to keep up with. The size of a business can make the need for budgeting higher than a smaller business and fewer threats. Budgeting each location in a building and their needs for security to minimize damage.
General security expenses are also a thing to indentify for budgeting purposes. General Security expenses will be used to see how much money a business has for a security. After learning of the amount of money available for budgeting, general expenses will paid first before any other expenses.
A good security plan will include basic physical controls, perimeter protection, external and internal security, access control, protective system, and a budget for recommendations. Each system and form of protection will work together to prevent harm to a business. Layers of protection only makes a business feel safer than just using the traditional locks and keys. Locks and keys are used for higher quantities.