Internal Building Security Proposal SEC/410
Your security firm has contracted with a development company for a new industrial building currently under construction. It is your firm’s job to create an internal building security proposal for the new building.
Write a 1,400- to 1,750-word proposal for the internal building security in which you address the following:
Surveillance Protection of high-value areas
Internal Building Security Proposal SEC/410
The benefits of a physical protection system cannot be overstated. Every organization has to ensure that it has in place internal as well as external security systems for the protection of its people, procedures as well assets such as equipment from potential natural and human threats. These are risks that are bound to interfere with the ability of the organization to undertake viable business activities and operations. The physical protection system is not a one size fit all. This is so because different organizations will have different physical protection needs for their internal as well as external security of their building depending on the type of business they are running, (Garcia, 2001). As such, the success of the process as a whole will greatly rely on the ability of the designer to take into account the particular needs of the organization in question as well as the available resources for the designing as well as the implementation of the internal security system.
Access control forms the backbone of the internal security system plan of the building of every organization. The system is critical in the sense it keeps unauthorized personnel out of the company premises as well as create an integration with the other internal security systems of the organization such as the CCTVs, alarm system and security guards among others. The first thing that will be addressed in the process of designing an effective control system in the vulnerabilities of the organizations and the first one is the perimeter of the premises. This will include the entrances, parking lots, and garages. This will then move inwards to the inwards in concentric circles to cover the access areas of the facility such as the main entrance into the building to specified zones within the premises, (Wheeler, 2011).
There are various benefits that the company will get from the implementation and successful installation of the access control system. The system will allow employees to gain access to the various zones within the organization based on their clearance level using their access cards and figure prints. What this means is that only the employees or individuals who have the necessary authorization level will in gain access to the various access points within the organization. This is a move that will not only control the movement of people into the building but also the flow of goods into and out of the building. As such the company will be in a better position to manage the activities with the company because the management will be aware of who is in a particular area at a given moment, (Wheeler, 2011). The result is that accountability will improve among the employees as well as the visitors coming into the building will significantly increase.
The team will design the system in a manner that will allow the users to program the setting without significant challenges. Access to such features will only be restricted authorized personnel. These individuals will be able to use the keypad to enter the configuration data into the system. The configuration will then allow the employers and other users of the system to view prompt display messages. It is also important to mention that this is a system that has a complex configuration and the analysis of the data may present a challenge to the organization. However, this problem is overcome by the fact that the system will be interfaced with a computer which will be programmed to programmed specifically to detect as well as responding to the required elements.
The second parameter of the internal security of the building is surveillance. Surveillance is a very critical part of the system that will give the management of the company the eyes to see remotely monitor the activities of the organization within the shortest time possible using less effort. Surveillance cameras will be placed in strategic positions within the premises, and this will give the security personnel the ability to monitor who is getting in and out of the various areas within the organization especially the protected areas. When one enters the premises, he or she will be able to see a notice at the entrance informing them that the building is under CCTV surveillance as required by the law. Also, as mentioned earlier, the monitoring system will be interfaced with the access control system, and this will allow the security personnel to view and identify the individuals trying to access restricted areas without authorization.
Various issues will be considered during the design as well as the implementation of the surveillance system. First and foremost, the system will be made simple while at the same time maintaining a high-security level to prevent anyone from hacking into the surveillance network. The simplicity will see to it that the users, the security personnel, will be able to learn and adapt to using the system within the shortest time possible, (Garcia, 2001). What this means for the company is that less money will be spent in regards to training the necessary personnel on how to use as well as perform minor repairs and maintenance procedures on the system. This will greatly help the company cut on costs associated with constant and regular training of the security personnel as a result of the surveillance system bring complex.
It is also important for the system to be flexible in regards to serving the intended purpose. The system will be composed of video cameras, recording devices as well as receiving monitors. The success of the surveillance system will be evaluated based on the ability of its various components to work perfectly well within the specified predetermined areas. Flexibility is also a quality that will allow the team to modify the cameras as well as the entire system for the areas within the premise that require special attention such as the production section. This is so because the entrance and reception section of the company may use the regular camera without any modification whereas areas such as the production line will require the cameras and the entire system in that section to be modified so as to protect it from potential wear and tear agents such as dust or harmful gasses, (Tipton & Krause, 2006).
The building will have various areas that will need to be put under
surveillance. Putting the whole premise, even those less critical areas, under
surveillance will prove to be ineffective to the organization. As such, the
team will assess the premise and after that come up with a comprehensive report
regarding the most important areas that should be given priority when designing
the surveillance system. This will then be presented to the management of the
organization for approval before the commencement of the whole process. Also,
the organization will have to add or remove some of the areas that they feel
need to be included or excluded in the surveillance radius based on their
internal need assessment results or requirements. This is a move that will make
surveillance system more efficient in regards to producing the desired results (Vellani, 2007).
Protection of High-value Areas
There are also high-value areas within the organization that has to be protected. The organization will have various high-value assets that will have to be protected to ensure that the company is a better position to realize its goals and objectives. As a manufacturing company, the organization’s assets can be classified into various categories. These include information assets, software assets, physical assets as well as services assets. In this case, the highest priority will be given to the physical assets followed by the information and software assets. The physical assets will include delicate heavy as well as light manufacturing equipment that needs to be handled by authorized personnel only. The specific areas where such equipment are located will be isolated using physical partition barriers, and one would need an authorized assess card or figure prints to access the room, (Tipton & Krause, 2006).
The fact that the company will be engaged in manufacturing activities which involve the massive capital investments poses a security threat to the organization. This is so because criminal or even terrorist may target the organization to steal either the expensive manufacturing equipment or even steal information from the organization database. As a business entity, the company may be in possession of the critical information regarding their employees, customers or even employees that may be used to aid criminal and terror activities which may have adverse negative effects to the organization and the general public as a whole. To achieve this, the above-mentioned access control system would be used to grant or deny access to such areas. Moreover, any access attempt by unauthorized personnel will trigger an alarm in the security staff who will them identify the particular access point in question as well as take the necessary actions as determined by the management of the company, (Garcia, 2001).
After all is said and done, one critical aspect of this proposal is the budget and financial requirement for the design as well as the implementation of the security mentioned above measures. To begin with, the whole project will cost a total of $250,000. Out of this amount, $100,000 will be used for the purchase of the required equipment such as biometric scanners, CCTV cameras, recorders and computers among other items that will be specified in the financial statements of the project. The remaining $150, 000 will go towards the costs associated with the design as well as the installation of the systems within the premises. Moreover, this cost also includes the cost of running the project’s pilot phase for three weeks under the management of our firm before the official hand over to the company.
It is important to recap on the importance of undertaking this
process to the new building that the company is putting up. First and foremost,
the organization will be able to secure its internal business environment just
the same way it does its perimeter. Also, the company will be able to use the
system for other uses such as checking the attendance of the employees as well
as monitoring their movements within the various places within the
organization. It is also important to mention the fact that we will take into
consideration all the legal as well as ethical issues associated with the
design and implementation of the internal security system. The firm works hand
in hand with professionals in various work environments to ensure that the
system complies with all the laws such as access to the premises by individuals
with disability among other ethical and legal requirements.
Garcia, M. (2001). The design and evaluation of physical protection systems (1st ed.). Boston: Butterworth-Heinemann.
Tipton, H. & Krause, M. (2006). Information security management handbook (1st ed.). [London]: Taylor & Francis e-Library.
Vellani, K. (2007). Strategic security management (1st ed.). Amsterdam: Butterworth-Heinemann.
Wheeler, E. (2011). Security risk management (1st ed.). Waltham, MA: Syngress.