Physical Security Research Paper

Improved Essays
Another physical threat to supply chain security is related to facility maintenance and how it can be structurally vulnerable. These vulnerabilities can come in many forms but can be protected with a variety of access controls such as perimeter security (i.e. fencing, barriers, security guards, etc.), and monitoring equipment such as surveillance and alarm systems. It is imperative that preventive maintenance procedures are scheduled for these security devices to identify any environmental wear and tear or suspected tampering. As with all other supply chain security issues, written procedures should be produced and preventive maintenance schedules should be followed to keep security current. Compliance with facility maintenance must be standardized across supply chain networks to have the utmost success in the security of goods and personnel.
Physical security is a great first line of defense to deflect intruders. It visually discourages an intruder to see physical barriers in addition to armed personnel guarding the perimeter of a facility. A facility that has well maintained security will not only promote the protection against terrorist threats, but will also support an organization’s goals to maintain a strong flow of supply chain deliveries and thus maximizing
…show more content…
Lessons have been learned from the tragic events in recent U.S. history, that acts of terrorism are premeditated through the surveillance of weaknesses in supply chain supply chain security. The shift to preventive security has drastically changed the ways that supply chain security manages its risk. Supply chain abilities to secure international business relationships are of premium importance to the U.S. government and its citizens. It’s realistic to say, that regardless of an intruders agenda, they are never going to give up on seeking to

Related Documents

  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In regards to FPS physical security initiatives, it is imperative to stay current with technological advances in security systems to mitigate risks to federal facilities. Innovation has provided the agency with better ways of effectively implementing security measures to protect federal facilities through upgrades in…

    • 503 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Gun Safes Research Paper

    • 326 Words
    • 2 Pages

    Types Of Gun Safes Not all gun safes are created equal. In fact, not all gun safes are really gun safe. For the most part, there are two types of gun storage options: actual gun safes and gun lockers. Confusing as they might be, for the sake of marketing juice many gun lockers call themselves gun safes. Clear as mud now?…

    • 326 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    A1: Business Objective: Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals. A2: Security Principle The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In 1776 the founding fathers signed the Declaration of Independence to free themselves from the tyrant King George of Great Britain. This caused a war of independence that freed the people of the United States from an unfair government, but left them in need of leadership. After several failed attempts the leaders of the new nation formed a government that would be free from tyranny. The Founders wrote the constitution to limit the powers of the government to insure that the government would not create a new tyrant.…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Security needs increasingly affect all kinds of businesses in the West, and merchants in the United Kingdom and United States face possible litigation, property losses and nightmare PR scenarios when preventable deaths occur on their property. It doesn't really matter if these threats are deliberate, accidental, or natural disasters if negligence contributes to the damage or harm. Terrorism, hostile intent, and accidental encroachments on your property can generate big legal bills and settlements if full or partial negligence or poor building and landscape design contribute to your vulnerability and liability regardless of whether the harmful acts are committed by people who are hostile, careless, intoxicated, or incapacitated. Fortunately, security bollards can prevent unthinkable or unlikely intrusions of…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The lack of preparedness in the event of an active shooter scenario could potentially result in mass casualty. In order to ensure the safety of students and faculty on campus, we have scrutinized and noted deficiencies in the contemporary safety and lockdown procedures at Penn State Altoona. Furthermore, we have implemented a holistic approach to evaluate safety and lockdown procedures at additional institutions and performed a comparative analysis, to determine effectiveness. We have collected data for this report by analyzing statistical information about school shooting frequency. We also distributed surveys to students to gain an understanding of how safe they feel, and how their safety relates to the inherent demand for fortified safety…

    • 393 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Week two of our material provided us with several different elements of the homeland security assessment process. What I gathered most from the material was based on the “Baldrige Assessment Criteria and the eight step process for a successful assessment” (Fisher, 2004). However, the consensus is that the key elements in the homeland security assessment process are “a threat assessment, a vulnerability assessment and a criticality assessment” (Decker, 2001). In my opinion, these three key elements are equally critical components of any emergency management plan and/or emergency management service. Virtually every day we hear of heightened degrees of already proposed threats or new means of threats to our nation, as well as the criticality of them.…

    • 626 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The Department of Homeland Security is one of 15 department in the U.S. Cabinet. Homeland Security is in charge of ensuring the safety of Americans from threats of all kinds. This includes the prevention of terrorist attacks, the protection against natural and man-made disasters, the watching of borders, and the protection against cyberspace. To prevent future terrorist attacks the department informs the government about potental targets based on collected information from files. Homeland security is also the first to send aid to victims of disasters.…

    • 196 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Soon after, the prevention and preparation of any future terrorism became a priority at all levels. Data revealed several new homeland security…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    “Balancing the Risks, Benefits, and Costs of Homeland Security.” Homeland Security Affairs 7, Article 16. Veronique, R. (2010). “The Economics of Homeland Security,” in Terrorizing Ourselves: Why U.S. Counterterrorism Policy Is Failing and How To Fix It,(eds). Washington, DC: Cato…

    • 487 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The U.S. national security should takes some extra steps in order to protect our citizens and keep our country safe. For the sake of our nation’s security, the United States…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Homeland Security and Critical Infrastructure The events of September 11, 2001, highlighted significant gaps in the country’s emergency preparedness and more specifically, its ability to identify threats and protect against terrorist attacks. The resulting analyses of the incident and the response efforts stressed the need for an overarching program that would coordinate the efforts of a multitude of government agencies with competing goals and requirements. A program that would improve the transfer of critical intelligence and maximize response efforts.…

    • 1808 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Fourth, a cybersecurity industry should also ask their supplier if they are using in-licenses. There are a variety of programs and services that are given built-in licenses that can be abused by their company employees. It is important for cybersecurity industries to make sure that the supplier monitors these licenses that may be abused by their own employees. Fifth, one final question that a cybersecurity industry should ask when they are communicating with their suppliers is what kind of software that is critical to their operations. Many suppliers have a variety of applications that they user to analyze and manage their organizations operations.…

    • 824 Words
    • 4 Pages
    Improved Essays

Related Topics