This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Security priority

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

Security priority

The primary purpose of perimeter security is to detect, prevent, and delay illegal access to the assets enclosed by it and thus preventing any act of theft, vandalism, and sabotage. It acts as a boundary of separation between the outside world and the enclosed assets (Polyakov, 2017, October). It can either impede unauthorized persons or confine captives within the surrounded area. Perimeter security can either be in the form of manmade barriers or natural barriers. A dependable perimeter wall should combine various aspects such as the CCTV and the perimeter intruder detection system. Perimeter security systems have been embedded in different security strategies and settings. The type of perimeter security largely determines how it will be installed and used. The effectiveness of the three different types of perimeter walls differs depending on where they are used.

Perimeter security can either be physical, psychological, and technological. The physical perimeter security encloses the intended area entirely and makes it very hard for intruders to access the computer rooms, operation centers, and telecommunications rooms. In this scenario, physical controls such as fencing, guards, and locks are used to deter, deny and detect the penetration of the protected area by unauthorized persons (Draper et al., 2017). The psychological barriers deal with taming the possible intruders from accessing the protected area, for example, the use of electric fences. The technological barrier has adopted the usage of modern methods such as surveillance cameras and sensors. As such, technological perimeter security is the best of the three. This is because it allows for the coverage of more extensive areas which the other two types can hardly cover. Nevertheless, perimeter security has proved to be one of the most efficient methods of protecting assets.

 

References

 

Polyakov, A. V. (2017, October). Fiber-optic perimeter security system based on WDM technology. In Electro-Optical and Infrared Systems: Technology and Applications XIV (Vol. 10433, p. 104330C). International Society for Optics and Photonics.

Draper, R., Ritchie, J., Wilson, E., & Prenzler, T. (2017). Best practice in physical security and people management. Understanding crime prevention: The Case study approach, 151.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask