Physical Security Assessment and Recommendations: Bendigo Bank

Verified

Added on  2021/04/16

|5
|966
|114
Report
AI Summary
This report provides a detailed analysis of a physical security breach at the Bendigo Bank in Melbourne, which occurred on December 27, 2017. The report examines the incident where armed robbers entered the bank due to lapses in security protocols. It identifies the lack of security guards, absence of metal detectors, and insufficient parking zone security as major contributing factors. The analysis includes a risk assessment, highlighting the importance of effective risk analysis and security management. Furthermore, the report recommends several improvements, such as implementing a risk management plan, increasing security personnel with shift management, installing metal detectors, and enhancing surveillance in the parking area. The study emphasizes the need for a layered security approach to prevent future incidents and protect the bank's assets and personnel.
Document Page
Running head: PHYSICAL SECUIRITY
Physical Security
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1PHYSICAL SECUIRITY
Physical security breach in the Bendigo bank in Melbourne:
On 27th December, 2017 a shocking bank raid had been reported at a Melbourne bank.
According to the report, two armed men entered the bank premises at the time around 10 am in
morning (Fennelly, 2016). The incident happened at the Bendigo Bank in Laverton. The bandits
robbed an amount of cash and then fled with the help of a nearby parked car. Fortunately, the
bank had CCTV camera for security purposes that recorded the whole incident. The investigation
is still going on, the only evidence being the CCTV footage. According to the CCTV footage,
those bandits were disguised with mask and hold pair of shotguns (Feng, Wang & Li, 2014). The
investigation has also discovered that there was no metal detector present in that bank at the time
of this incident. Along with that, the employed security guard not present there at time of
incident. Therefore, it can be stated that more than one factors allowed the robbers to enter into
the bank.
Identification of security lag
One of the major essential tasks that has to be conducted by any organization in order to
retain the physical security is an effective risk analysis. With the help of risk analysis process, an
organization can determine their potential security risk with the help of their past experiences. It
also allows the organization to build up firm and effective security management protocols within
the operational structure of the organization. After building the risk analysis matrix a priority
framework has to be made by which the organization can prioritize their essential security
management tools in current situation. It will also allow the authority to build a long term
security plan. After assembling the security protocols the organization has to test the operational
integrity and efficiency of these protocols.
Document Page
2PHYSICAL SECUIRITY
In the above case study some of the major absence of security protocols can be identified
that helps the robbers to enter the bank and raid. Although, the CCTV camera was attached, the
lack of security guards and visitor scanning protocol is highly observable. According to the
police report the bandits used the parking lot to park their car that clearly shows that there was no
security constrain in parking zone (Rausand, 2013). Apart from that, there was no security
checking system from both automatic and manual security filter arrangement. Moreover the
security camera was the only equipment the bank was dependent on.
Physical Security management techniques
Physical security is a set of security measures that should be taken to ensure that only
authorized personnel can have the accessibility on particular equipment. Physical security can be
articulated with various situational layers that allow the organization to build effective physical
security protocols. One of the most used security system is metal detector, where every entering
person are scanned to ensure there is no existence of gun metal with that person. Similarly
CCTV camera is another useful practice that allows the authority to keep tract the activities of
existing entities within premises. Advanced locking system allows the authority to make a strong
protection from unwelcomed visitors. On the other hand, organizing security guard shifting
allows the authority to have always at least one security guard for security purpose.
Recommendation for the organization
In order to make an effective security system Bendigo Bank should follow some essential
steps respectively. This recommended security framework has been described below:
Document Page
3PHYSICAL SECUIRITY
Identification of security issues is one of the major factors that would allow the bank to
focus on their current security problem and how they can resolve their demerits. Bendigo
Bank can make a risk management plan with the help of risk assessment matrix.
Prioritising the most essential security needs is very initial task that has to be done.
Bendigo Bank can allot more security guards with effective shift management system.
With the help of the shift management Bendigo Bank can have always at least one
security guard to ensure the security of the organisation.
Bendigo Bank can install the metal detecting system or scanner at the very front of their
entrance. It allows them to get alarmed if any visitor would come up with any fire arm. It
will add extra security filter to the overall security system of the organization that will
protect the organisation from any kind of unexpected violence or security brace
(Markham & Heimerdinger, 2012).
Bendigo Bank can additionally install an authentication checking system and a
surveillance system at the parking zone. With the help of these tools Bendigo Bank will
get alarmed in advance if there will any person come with criminal intention.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4PHYSICAL SECUIRITY
Reference
Feng, N., Wang, H. J., & Li, M. (2014). A security risk analysis model for information systems:
Causal relationships of risk factors and vulnerability propagation analysis. Information
sciences, 256, 57-73.
Fennelly, L. (2016). Effective physical security.Butterworth-Heinemann, 12-15
Markham, T. R., & Heimerdinger, W. (2012). U.S. Patent No. 8,272,053. Washington, DC: U.S.
Patent and Trademark Office.
Rausand, M. (2013). Risk assessment: theory, methods, and applications (Vol. 115). John Wiley
& Sons, 45-471
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]