This website uses cookies to ensure you have the best experience. Learn more

Physical Security Plan Essay

1728 words - 7 pages

Perimeter Protection

As the Security Manager of Palm Beach Marina Cove (PBMC), I was informed that there will be an expansion to the existing condominium. PBMC II will be built next to PBMC on the east side of the property near the seawall. ABC construction will be the lead company to erect the PBMC II. A construction site has a high probability of internal and external threats. With the ongoing construction, we must put in place a perimeter protection plan. The perimeter protection plan must include best practices in perimeter protection for a construction site that integrates with the contiguous existing building, properly safeguard the perimeter of both sites during ...view middle of the document...

Once the truck reaches the entry control point, they will be met by a Security Officer. The Security Officer will take that individuals badge and use a scanner. The scanner will be able to inform the security guard if they have access to the construction site. If the individual does not have access to the site, the scanner will inform the Security Guard that he or she does not have access. With all the personnel that is hired by ABC Construction, they might think they are able to switch drivers that works at another site. If this happens, the Security Guard will pull the truck to the inspection lane. The driver will then call his point of contact (POC) and inform him of the situation. The POC will then meet the Security Officer and give them his or her badge. The Security Officer will then scan the badge for access. The POC will escort the driver to the drop off point and stay with them at all times. When the driver is waiting for the POC, the other Security Officer will conduct an inspection of the trailer. This will be logged in a commercial vehicle log with all the drivers information. This ensures that no illegal equipment or items are going or leaving the construction site. This is the same practice for individuals entering leaving the construction site. This is just for the entry to the construction site, now we have to look at other options once these individuals and trucks are on the site and how we can safeguard our tenants, ABC’s employees, and equipment.

The sight of new construction brings out unfavorable individuals that will try to gain access to the construction site and areas around that site. Now that the equipment and employees are on the PBMC property, we are now responsible to ABC construction and our tenets to ensure proper security of their personnel property. The use of portable storage containers is the best way to secure smaller equipment. The first thing ABC construction must do is to identify assets and property that they are bring to the construction site. The inventory will be conducted with the site manager of ABC construction and the security manager of PBMC. Once the inventory is completed the original inventory list will be maintained by the site manager and a copy with the security manager. The next step in this process is designate a location where the equipment will be secured. The area should be in a high visible area where there are security guards and construction employees. Once the location has been designated, then a secure, portable storage container will be used to house all the smaller equipment. The storage container will have a key type lock accompanied by a deadbolt lock. The construction site manager will appoint a tool issue supervisor and six individuals that will handle the issuing and receiving of the tool. The tool room will be opened during the normal work day. The key to the tool room will be maintained by the construction site supervisor. The supervisor will maintain a...

Other Papers Like Physical Security Plan

Understand Security Essay

1491 words - 6 pages security management plan. The security management plan will detail the design criteria for systems / procedures and state which standards are to be complied with as a minimum, for example Vetting of security personnel to BS 7858:2006 and electronic system standards for access control BS EN 50133. Conclusion. Security Management is a broad field of management related to asset management, physical security and human resource safety functions. It

It Audit Guide Essay

4838 words - 20 pages . Information Security Documentation 17 6.4. Information Security Monitoring 20 6.5. Cyber Security Incidents 22 6.6. Physical & Environmental Security 24 6.7. Personnel Security for Information Systems 26 6.8. Product & Media Security 27 6.9. Software, Network & Cryptographic Security 30 6.10. Access Control & Working Off-site Security 33 Appendix A – Accreditation Governance 36 The ISM & Certification 36 Compliance

Global Security Policy - Week 5 - Cmgt-400

969 words - 4 pages Global Security Policy CMGT-400 Monday, May 11, 2015 Vijay Bhaskar Jonnalagadda Global Security Policy Organizations with offices in multiple countries have to strategically implement personnel, logistics, network configurations, and inventory; but they also have to create a security plan to secure these assets to keep their customer, brand integrity, and profits. Some of the issues faced while maintaining security for a company in

It Security

2097 words - 9 pages Information Security Policy University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Mark Cherry Date: 03/11/2012 * Table of Contents 1. Executive Summary 1 2. Introduction 1 3. Disaster Recovery Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security

Cyber Security: Physical and Digital Security Measures

3505 words - 15 pages Cyber Security: Physical and Digital Security Measures Abstract Due to the issues associated with cyber security and the appropriate application thereof, this paper will strive to address different cybersecurity measures that may be employed, both physically and digitally. It will identify what cyber security is, measures that may be taken, the tools needed to ensure implementation, and provide information regarding the different resources

The Importance of Measuring Enterprise Impact

561 words - 3 pages have the keys needed to decrypt and understand it. Many companies are incorporating automatic encryption into applications. Networks establish firewalls that encrypt information when data is going to unsecured sites. Although security breaches may happen, keeping the information encrypted will protect many companies from losing valuable information to dishonest crooks. Establishing a preventative breach plan will prevent operational breakdown

Week 3 Chapter 5

399 words - 2 pages ) The Madoff Act d) The Enron Act 11. Another name for a disaster recovery plan is _____. a) an alternative plan b) just in case plan c) Plan B d) business continuity plan True/False 1. IT Security covers the protection of information, communication networks, and traditional and e-commerce operations to assure their confidentiality, integrity, availability, and authorized use. True Fales 2. Human error

Information Security

3941 words - 16 pages millions of customers globally. Canon has huge customer data which need to be secured. Risk Management Plan Information security is very important for Canon. Canon has established a good system to prevent the confidentiality, integrity and availability of its information by maintaining high standard logical security and physical security. Canon has an information security committee which manages the issues. The committee has experts in the field

Computer Science Xyz Company

1026 words - 5 pages have documented the security plan for the organization and they keep on reviewing and improving the same. Lifecycle It deals with the configuration management system implemented in the company. On every Wednesday, the management plans a meeting for a change request. All the things regarding the change is discussed in the meeting, like why the change is required, what would be its benefits & is their any risk to execute them in the system, etc. The

Security Plan

567 words - 3 pages Security plan The security plan is based on the fact that the institution is working on a stringent and anything expensive would be unfair and might seem unreasonable. The security plan is as a result of the increasing population at the institution. Its also facilitated by the fact that Physical plant intrusion eg burglary A watch tower should be raised above the MPSETC this will ensure that everything around the institution can be seen well

Administrative Controls

606 words - 3 pages corporate liability. How do Administrative Controls influence the choice of Technical and Physical Controls? I would say that the Administrative Controls lay the framework for the Technical and Physical controls to follow. The Administrative Controls is the plan for protecting the information on an information system and the Technical and Physical controls are the physical measures and technical applications that actually prevent, detect

Related Essays

Public Policing Vs Private Security Essay

1153 words - 5 pages main focus is on keeping the company and personnel safe. Most private security is not bound by the same regulations that public police have to follow, such as reading a suspect their Miranda Rights. There are three important elements that make up a comprehensive security plan, which are physical, personnel, and information security (Lemke, 2011). The physical aspect of the security plan is building design, fences, locks, lighting, and alarm

Cap Study Guide Essay

5295 words - 22 pages sectors have policies, procedures, standards and guidelines that must be followed – the Payment Card Industry (PCI) Data Security Standard required by Visa and Master Card is such an example. Other examples of administrative controls include the corporate security policy, password policy, hiring policies, and disciplinary policies. Administrative controls form the basis for the selection and implementation of logical and physical controls

Security Management Case Study #1

819 words - 4 pages initial policies and procedures that the custom-tailored security plan of the company is created. Prevention, Control and Recovery – Surveying Security Once the baseline has been established, effort must be made to scrutinize weaknesses in the policies by establishing a security survey. In Appendix A of Broder’s Risk Analysis and the Security Survey, The following security surveys should be used each time to generate a survey report when

Hospital And Healthcare Security Essay

1854 words - 8 pages financial support and a budget. The organization of the security department must arrange all the security and facility access controls, they must have a crime prevention plan, must coordinate with states public safety laws, how employees and staff will participate on the protection program and physical facilities and grounds design. According to K. Vellani (2006) “Security policies and procedures may include a security management plan, an