Introduction
The administration block plays a vital role in safeguarding the documents and other essential information that can be used in organizational support. Thus the security of the administration block is critical to the performance of the firm. Despite the physical security, the administration block does not have a proper security system that can regulate the access of staff members to the entire two floors. One of the important security issues is the physical accessibility of numerous rooms that are not protected. For instance, the safe in the payroll office on the first floor is exposed, posing security issues. The safe room can be accessed on both sides, increasing the risk of theft.
Additionally, the safe is not secured by the use of technology, such as the CCTVs and the biometrics. More so, the use of biometrics locking, which is a familiar concept in controlling access, is not used on both the floors, giving the staff members and other authorized members full access to the entire block. The firm should install CCTV cameras and biometrics on all perimeter opening to help track and regulate access levels to all workers within the office.
The factors to be considered when you are purchasing and installing locking devices for security purposes
The buying and installing a new security system requires a series of considerations that will reduce the potential jeopardizing of the security objectives. One of the reviews to help foster security at the build is through deciding whether to install visible surveillance or hidden cameras. The installation of the visible CCTV will discourage any crime. The installation of the visible CCTVs will protect the organization from losing vital data, or damaging of the office property. On the contrary, the installation of a hidden camera may encourage crimes, since workers are not aware of the surveillance. Additionally, the installation of these cameras is expensive, since they require proper customization of the building.
The basic principles of an effective key control plan
Security principles of a valid key control plan require better integration and flexibility to offer both securities and act on an emergency escape. To begin with, high-quality locks integrated into smart card technology should be incorporated into both the interior and the exterior of the organization for restricted protection. Moreover, the technology should offer quick-change capability in the event of car key loss. Secondly, exterior doors designated for exit should only be fitted with alarms, rather than reinforced physical security. Lastly, the employees' lockers should be located at the exit and entrance locations to help reduce access to the main building.
The Two Results of an Effective Surveillance System
Effective surveillance requires to be reliable and working by all means. Through this, the system should be able to maintain and recover from failures, which helps to guarantee maximum security. Secondly, the surveillance security system should help keep all the unwanted intruders out of the system. The security should play a vital role in securing the network and other crucial infrastructures within the organization.
How the various openings in a perimeter can be effectively protected and secured.
The use of CCTVs is one of the most suitable concepts in dealing with surveillance and securing objects. According to Fischer et al., (2008), the location of installing the CCTVs play a vital role in ensuring that all potential areas that may pose a threat are covered. In this case, outlining of the regions and the possible opening that may increase the danger should be mapped and given a higher priority before any security steps are adopted. One of the ways in ensuring that security is maximum achieved is through mapping the blind spot areas and the areas with a higher degree of obstruction.
Additionally, critical decision making must be considered to ensure that the right decision in enforcing security is attained. Among the main question that should be considered is the decision regarding the purpose of the CCTV. In this case, the choice between choosing a camera to deter crime or a hidden camera to help in a criminal prosecution is essential. According to Fischer et al., (2008), the use of visible CCTV prevents crime, a concept that may be used to protect the opening of a perimeter. However, the use of a hidden camera for criminal prosecution may encourage higher rates of crime, making the perimeter a suitable sport for crim.
The choice of height and location are among other factors that are worth considering, especially where exact data and identification of the offenders is required. Placing the camera slightly at the exit of the perimeter provides a suitable opportunity to capture the desired image of the offender. Additionally, the positioning of the camera at the doorway gives the victim little chance to think and react about concealing his or her identity. According to Fischer et al., (2008), the choice of mounting the camera in a bank plays a vital, especially where useful information about the victim is needed. Placing the CCTV at the counter, and operating it when the robbers are on the action, may threaten the life of the worker involved. However, placing the camera at the exit, it gives the robbers little time to think about the security in the building.
Security Techniques
The use of surveillance cameras has been one of the key concerns for many organizations, especially in ensuring that physical security is heightened to the expectations. The increase in technology and the migration to the use of digital cameras, with the ability, not only to pose the risk of blowing the robbers cover but also able to offer real-time data to the command center remains to be a suitable approach. According to Mahfuth et al., (2017), the physical protection of organizations continues to be one of the most common methods of providing safety of the products within the organization. Through this, physical reinforcement and enhancement using both traditional and modern techniques have remained to be more productive. For instance, the use of conventional padlock has remained to be one of the undisputable locking mechanisms that many firms still use today. The use of this method provides adequate security, especially where the only access is granted to a limited group of individuals. However, despite the effective use of this concept, security issues in terms of authenticity, are not observed.
The use of padlock grants accesses to anyone with the right key combination. As a result, the use of electronic locking integrated with the technology is providing a suitable locking mechanism, such as the use of biometrics for proper authenticity. Through this, the physical access and granting permission can be controlled by the administration, a concept that grants and revokes privileges of access at various levels of the building. Despite the integration of technology in using in security, there are several virtual threats associated with each form of protection, hence making it cumbersome for many organizations to fight back during an attack.
The use of CCTV system may permit the administrator to change the setting of the recording camera for changes in light intensity and better viewing. While this concept may only be available to the administration center, and the head of the security team, hackers have a chance of staging virtual attacks and initiating random lockdowns. The use of the HD CCTV is becoming a common trend form many organizations in adopting and using the concept that increases security (Safa et al., 2016). The benefits of using the HD CCTVs play a vital role in ensuring that explicit data is gathered, which may include accurate facial recognition and identification of plates in cars (Fischer et al., 2008). With the accuracy of these cameras, hackers have the opportunity to develop sophisticated hacking tools, which can be used to control, and secretly monitor the facility sending the data to the outside party. Through this, hackers have vital information, ranging from the physical layout of the facility to the level of security in the building.
Additionally, the use of biometrics such as the fingerprint scanners, which help to identify people, and granting access, may also be compromised, leaving the entire security network vulnerable. Through this, the physical security will not serve the main objective of securing the building from unauthorized access.
The virtually attack-proof security system
The development of a virtually attack-proof security system plays a vital role in ensuring that every level of physical security is not compromised by any means. As a result, the virtual attack-proof helps reduce the external threat, such as hacking, which may paralyze the infrastructure of the organization. Through ensuring multiple access authentications in the system before granting access may be used to limit the cases of a security breach. According to Mahfuth et al., (2017) analysis, virtual attacks are highly facilitated by poor network securities within the organization. While the majority of the focus may be directed to securing the entire security system, equal emphasis should be paid on network security.
Potential Problem
The use of a virtual attack-proof security system poses a lot of challenges, both financially and scalability, in the organization's infrastructure. The use of a firewall may be an ideal concept to help reduce security threats, especially those emanating from hacking. However, financial contains may be the leading challenge, especially for small businesses. Nevertheless, the use of a virtually attack-proof security system may not be compatible with the current organization's infrastructure, a concept that may lead to the organization incurring an extra cost from what they had budgeted previously.
References
Fischer, B., Green, G., & Halibozek, E. (2008). Introduction to security (8th ed., pp. 1-528). Elsevier, Butterworth-Heinemann.
Mahfuth, A., Yussof, S., Baker, A. A., & Ali, N. A. (2017, July). A systematic literature review: Information security culture. In 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) (pp. 1-6). IEEE. doi: 10.1109/ICRIIS.2017.8002442
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. computers & security, 56, 70-82.doi.10.1016/j.cose.2015.10.006
Cite this page
Essay Example on Secure Admin Block: Ensuring Access Control for Optimal Performance. (2023, Apr 24). Retrieved from https://proessays.net/essays/essay-example-on-secure-admin-block-ensuring-access-control-for-optimal-performance
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- How the Psychological Contract Can Be Integrated in Skyline International
- Approaches to Ethical Decision Making Essay
- Cloud-Based Electronic Health Records Smart Technology Essay
- Essay Example on Exploring Social, Political & Ethical Challenges in IT: How to Leverage Benefits Wisely
- Organizational Decision-Making: Overlooking Internal Factors Affecting Strategy - Essay Sample
- Essay Example on Agency Theory: Explaining the Relationships Between Parties
- Paper Example on Exploring Subway's Value Chain: SWOT Analysis