Comprehensive Risk Assessment and Protection Plan for New Depot
VerifiedAdded on 2023/01/20
|17
|5351
|60
Report
AI Summary
This report presents a comprehensive protection plan for a new depot, focusing on security and risk management. It begins with an introduction discussing the importance of risk assessment and management, emphasizing the need for efficient coordination and analysis of engineering operations. The scope of the assessment includes evaluating risk factors and providing recommendations for mitigation. The report then delves into risk management principles, defining risk and its various classifications, including dynamic and pure risk. Asset identification, threat assessment, and loss event profiles are thoroughly examined, with a focus on the Mass Rapid Transit system in Singapore. The report also explores the probability of occurrence of threats and the impact of potential losses. The risk management process, encompassing security planning and the utilization of physical security obstacles, is outlined. The report provides recommendations for adjacent areas, perimeter security, zoning and protection of vital restricted areas, security systems, and manpower. The conclusion summarizes the key findings and emphasizes the importance of a proactive approach to security and risk management.

PROTECTION PLAN ON BUILDING A NEW DEPOT
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
Introduction-....................................................................................................................................2
Scope............................................................................................................................................3
Conduct a risk assessment...............................................................................................................3
Risk management and risk philosophy:.......................................................................................3
Identification of assets –..................................................................................................................4
Fig 1.................................................................................................................................................5
Identification of Threats –...............................................................................................................5
Loss event profile:........................................................................................................................5
Loss Impact –...................................................................................................................................7
The risk management process:.........................................................................................................7
Recommendation.............................................................................................................................8
Adjacent areas:.............................................................................................................................8
Perimeter of site.........................................................................................................................10
Zoning and protection of vital restricted areas:.........................................................................10
Security system and means........................................................................................................12
Security manpower, procedures and contingency plans:...........................................................13
Conclusion.....................................................................................................................................14
Reference list.................................................................................................................................15
1
Introduction-....................................................................................................................................2
Scope............................................................................................................................................3
Conduct a risk assessment...............................................................................................................3
Risk management and risk philosophy:.......................................................................................3
Identification of assets –..................................................................................................................4
Fig 1.................................................................................................................................................5
Identification of Threats –...............................................................................................................5
Loss event profile:........................................................................................................................5
Loss Impact –...................................................................................................................................7
The risk management process:.........................................................................................................7
Recommendation.............................................................................................................................8
Adjacent areas:.............................................................................................................................8
Perimeter of site.........................................................................................................................10
Zoning and protection of vital restricted areas:.........................................................................10
Security system and means........................................................................................................12
Security manpower, procedures and contingency plans:...........................................................13
Conclusion.....................................................................................................................................14
Reference list.................................................................................................................................15
1

Introduction-
The main issues that are involved in the assessment of various risks include assessing various
factors like keeping an eye over safe designs to ensure safety. It involves efficient
implementation of management. Maintenance issues are taken great care while dealing with
railway issues. Efficient coordination is required. Risk analysis involves carefully analyzing the
various engineering operations as well as the structures that are involved in the successful
making of a railway network. The railways tracks that play the role of being the cause of major
number of accidents are an important part of the risk analysis or assessment. Efficient
management to keep the tracks the order to ensure the safe movement of the railways is an
important part of the risk assessment. The condition of the ground needs to be checked regularly.
Risk assessment involves ensuring a check over the access way, the level crossings. The level
crossings need to have strong inspection facilities implemented over them. A great number of
accidents occur at the level crossings. The access pathways also need to be kept well under
control. The electricity issues that are faced over the operation of the railways are an important
factor. The stations need to be connected in a proper way. The stations should be in a position to
handle situations of emergency. Stations should be able to take rapid actions in case the situation
demands so. Management of time is extremely while dealing with railways and the various
operations associated with it. Time available is very little in most of the situations to waste.
Scope
The assessment will evaluate the factors that create risky situations. It also scopes to analyze the
factors that will support in making the railway track in the successful manner. The
recommendations are provided that has the scope of mitigating the issues relate to the risky
factors.
Conduct a risk assessment
As per the requirements of the present project, it is essential to know the meaning of risk
management and other terms related to it. Firstly, risk may be explained, as the chance of
something occurring that will pose an unfavorable outcome. The level of risk echoes:
1. The probability of undesirable incident
2. The possible aftermath of the undesirable incident
2
The main issues that are involved in the assessment of various risks include assessing various
factors like keeping an eye over safe designs to ensure safety. It involves efficient
implementation of management. Maintenance issues are taken great care while dealing with
railway issues. Efficient coordination is required. Risk analysis involves carefully analyzing the
various engineering operations as well as the structures that are involved in the successful
making of a railway network. The railways tracks that play the role of being the cause of major
number of accidents are an important part of the risk analysis or assessment. Efficient
management to keep the tracks the order to ensure the safe movement of the railways is an
important part of the risk assessment. The condition of the ground needs to be checked regularly.
Risk assessment involves ensuring a check over the access way, the level crossings. The level
crossings need to have strong inspection facilities implemented over them. A great number of
accidents occur at the level crossings. The access pathways also need to be kept well under
control. The electricity issues that are faced over the operation of the railways are an important
factor. The stations need to be connected in a proper way. The stations should be in a position to
handle situations of emergency. Stations should be able to take rapid actions in case the situation
demands so. Management of time is extremely while dealing with railways and the various
operations associated with it. Time available is very little in most of the situations to waste.
Scope
The assessment will evaluate the factors that create risky situations. It also scopes to analyze the
factors that will support in making the railway track in the successful manner. The
recommendations are provided that has the scope of mitigating the issues relate to the risky
factors.
Conduct a risk assessment
As per the requirements of the present project, it is essential to know the meaning of risk
management and other terms related to it. Firstly, risk may be explained, as the chance of
something occurring that will pose an unfavorable outcome. The level of risk echoes:
1. The probability of undesirable incident
2. The possible aftermath of the undesirable incident
2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

The present project deals with the security and risk management of Mass Rapid Transit system in
Singapore. This network of conveyance is a speedy transport structure
Which is considered to be a leading part of the railway system in Singapore(McNeil, 2015). This
project will provide an account of the overall risk assessment for the development. It will touch
on these topics: assets, threats, probability of occurrence, impact and consequences.
Risk management and risk philosophy:
Risk management is the technique of spotting out of probable risks, obstacles, hazards or
calamity before they occur (Bessis, 2015). This procedure permits trade owners to arrange
special measures to avert the risk reduce its effect or find out ways to deal with its shock. The
importance of managing risk lies in the fact that without it, no organization can firmly establish
its objectives for the future (Hopkin, 2018).
Risk philosophy is the set of common faiths and approaches that describe how risk is treated in
any system or institution. This involves how risk is managed along with the factors, types of
risks and ways in which they are handled. Therefore, in order to achieve a successful process of
managing risks, it is important to first identify, analyze and find out the risks. A risk assessment
includes diagnosing the possible perils of an institute and investigating the related susceptibility.
As per the present project, it is essential to identify the probable risks related to the transport
system in Singapore. The factors to identify the risks are discussed below:
Identification of assets –
An asset is a means of value that can be transformed into currency. An entity, person, firm
inherit assets or government owned assets. As per the present project, the Mass Rapid Transit
system of Singapore should launch primary actions in the field of asset management for the up
gradation of this transport system (Binti Sa’adin, et al, 2016). The assets must include addition of
more railway stations and terminals, crossing points, number of ramps and moving stairways. In
addition, enhance their transmission, warning system, train control & several technical and
electrical gadgets in terminals and depots. Although a lot of initiative has already been taken to
improve and manage these assets by the Government. Then also, certain loopholes are still
prevalent in this field. Therefore, the assets should be renewed or reconstructed. The warning
system, transmission and information qualities should be enhanced and developed properly. In
case of malfunctioning of any of these assets, might lead to a disruption of proper functioning of
3
Singapore. This network of conveyance is a speedy transport structure
Which is considered to be a leading part of the railway system in Singapore(McNeil, 2015). This
project will provide an account of the overall risk assessment for the development. It will touch
on these topics: assets, threats, probability of occurrence, impact and consequences.
Risk management and risk philosophy:
Risk management is the technique of spotting out of probable risks, obstacles, hazards or
calamity before they occur (Bessis, 2015). This procedure permits trade owners to arrange
special measures to avert the risk reduce its effect or find out ways to deal with its shock. The
importance of managing risk lies in the fact that without it, no organization can firmly establish
its objectives for the future (Hopkin, 2018).
Risk philosophy is the set of common faiths and approaches that describe how risk is treated in
any system or institution. This involves how risk is managed along with the factors, types of
risks and ways in which they are handled. Therefore, in order to achieve a successful process of
managing risks, it is important to first identify, analyze and find out the risks. A risk assessment
includes diagnosing the possible perils of an institute and investigating the related susceptibility.
As per the present project, it is essential to identify the probable risks related to the transport
system in Singapore. The factors to identify the risks are discussed below:
Identification of assets –
An asset is a means of value that can be transformed into currency. An entity, person, firm
inherit assets or government owned assets. As per the present project, the Mass Rapid Transit
system of Singapore should launch primary actions in the field of asset management for the up
gradation of this transport system (Binti Sa’adin, et al, 2016). The assets must include addition of
more railway stations and terminals, crossing points, number of ramps and moving stairways. In
addition, enhance their transmission, warning system, train control & several technical and
electrical gadgets in terminals and depots. Although a lot of initiative has already been taken to
improve and manage these assets by the Government. Then also, certain loopholes are still
prevalent in this field. Therefore, the assets should be renewed or reconstructed. The warning
system, transmission and information qualities should be enhanced and developed properly. In
case of malfunctioning of any of these assets, might lead to a disruption of proper functioning of
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

the transport system (Ong, et al, 2017). This would further cause great difficulty on part of the
daily passengers, who are majorly depended on the Mass Rapid Transit system. Therefore, it is
essential to develop measures of sound warning, communication and distribution of information
under this system.
Fig 1
(Source: Sc01.alicdn.com, 2019)
Identification of Threats –
Loss event profile:
Threat is a probable danger, which might escapade a vulnerability to rupture. With the ever-
growing technology, computerized disclosure and other factors created by worldwide trade has
resulted in some of the newest risks faced by the transport system. Identification of personal loss,
which may happen, is probably the next way of finding out the security breach. This includes a
proper notion about the types of loss incidents or risks, along with the situations & conditions,
substances, actions, links that can create the loss incidents. It is important to measure, lessen and
supervise all the exposures that a vigilant security control delivers its impact. As per this project,
a vigilant security strategy should be properly constructed. It should focus on: the incidents,
which can trigger any loss, one that can be counted in terms, related to fiscal, economical,
political or social background. Some probable risk loss incidents can be stated as: nuclear war,
4
daily passengers, who are majorly depended on the Mass Rapid Transit system. Therefore, it is
essential to develop measures of sound warning, communication and distribution of information
under this system.
Fig 1
(Source: Sc01.alicdn.com, 2019)
Identification of Threats –
Loss event profile:
Threat is a probable danger, which might escapade a vulnerability to rupture. With the ever-
growing technology, computerized disclosure and other factors created by worldwide trade has
resulted in some of the newest risks faced by the transport system. Identification of personal loss,
which may happen, is probably the next way of finding out the security breach. This includes a
proper notion about the types of loss incidents or risks, along with the situations & conditions,
substances, actions, links that can create the loss incidents. It is important to measure, lessen and
supervise all the exposures that a vigilant security control delivers its impact. As per this project,
a vigilant security strategy should be properly constructed. It should focus on: the incidents,
which can trigger any loss, one that can be counted in terms, related to fiscal, economical,
political or social background. Some probable risk loss incidents can be stated as: nuclear war,
4

natural calamities like earthquakes, volcanic eruptions, floods, tornadoes and others. Man-made
calamities like fire, accidents, explosions and others (Bilveer, 2018).
Work place related risks include sexual harassment, acts of revenge, bully.
Terrorist attacks, kidnapping, murdering and several other threats.
As per the present project, the Singapore transport authorities should take special measures to
enhance their security checking procedures. They should organize a stringent security
examination system in all of the major MRT depots (Hung, 2018). New security personnel
should be trained properly so that they can keep a strong vigilance over the passengers and the
borders. In addition, the officers should be trained in such a way so that they can easily track
doubtful attitude and keep an eye for commuters traveling with heavy luggage. The officers
should also be made to be prepared in case of occurrence of any emergency.
Fig 2
(Source: Fencingmaterials.co.uk, 2019)
Probability of occurrence of threats: It is known that probability can be measured as the possible
number of ways in which any specific incident can happen out of any specific action or actions.
In order to foresee security loss incidents, it is advised to come up with something appreciably
less than the precision of the classic equation (Fesselmeyer, 2018). Some other factors, which
5
calamities like fire, accidents, explosions and others (Bilveer, 2018).
Work place related risks include sexual harassment, acts of revenge, bully.
Terrorist attacks, kidnapping, murdering and several other threats.
As per the present project, the Singapore transport authorities should take special measures to
enhance their security checking procedures. They should organize a stringent security
examination system in all of the major MRT depots (Hung, 2018). New security personnel
should be trained properly so that they can keep a strong vigilance over the passengers and the
borders. In addition, the officers should be trained in such a way so that they can easily track
doubtful attitude and keep an eye for commuters traveling with heavy luggage. The officers
should also be made to be prepared in case of occurrence of any emergency.
Fig 2
(Source: Fencingmaterials.co.uk, 2019)
Probability of occurrence of threats: It is known that probability can be measured as the possible
number of ways in which any specific incident can happen out of any specific action or actions.
In order to foresee security loss incidents, it is advised to come up with something appreciably
less than the precision of the classic equation (Fesselmeyer, 2018). Some other factors, which
5
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

must be kept in consideration in case of any disruption of the assets that might lead to risks,
would be:
1. The physical & the social environment, which includes the area, region where the depots
are situated
2. The political, historical & the criminal state-of-art, which include the essential elements
for evaluating the risk linked with this system.
The physical and social environment deals with the location of the terminals near residents or
other institutions. There should be proper fencing around the railway tracks to avoid the risk of
loss of assets of the transport system. It is a common behavior noticed in the localities that they
trespass the restricted zones and create many problems in the smooth functioning of the railways.
Hence, the idea of a proper fencing system can help to avoid this risk (Aksehirli, 2018).
In case of the other factors, the most important one would be the criminal state-of-art this has to
be carefully renewed to achieve suitable results. The acts of terrorism, murders, kidnapping and
burglary are very common now a days. People travelling to distant places often face these
hazards and threats. As per the current project, Singapore had faced its maximum terror threats
since 2001.
Loss Impact –
This can be measured in several ways.
The consequence on the worker’s morale of the institution
The consequences of risks on the railway officials
The risk on the community relations
The consequences, which create massive effect on commuters
Any kind of threat poses a major impact on the people who face it. In case of the impact of the
losses, the fiscal matter is common to all fields. The transport system involves huge amount of
investment. In order to maintain a smooth functioning of the transport system up gradation of the
older gadgets is a vital step. All these steps are necessary to uphold the systematic execution of
the MRT in Singapore. Despite, the huge fiscal investment, threats and risks are common to
occur in any field. In addition, the consequences of these threats are deep. It will require proper
management of recovering from all threats. IN case of this project, The Transport department of
6
would be:
1. The physical & the social environment, which includes the area, region where the depots
are situated
2. The political, historical & the criminal state-of-art, which include the essential elements
for evaluating the risk linked with this system.
The physical and social environment deals with the location of the terminals near residents or
other institutions. There should be proper fencing around the railway tracks to avoid the risk of
loss of assets of the transport system. It is a common behavior noticed in the localities that they
trespass the restricted zones and create many problems in the smooth functioning of the railways.
Hence, the idea of a proper fencing system can help to avoid this risk (Aksehirli, 2018).
In case of the other factors, the most important one would be the criminal state-of-art this has to
be carefully renewed to achieve suitable results. The acts of terrorism, murders, kidnapping and
burglary are very common now a days. People travelling to distant places often face these
hazards and threats. As per the current project, Singapore had faced its maximum terror threats
since 2001.
Loss Impact –
This can be measured in several ways.
The consequence on the worker’s morale of the institution
The consequences of risks on the railway officials
The risk on the community relations
The consequences, which create massive effect on commuters
Any kind of threat poses a major impact on the people who face it. In case of the impact of the
losses, the fiscal matter is common to all fields. The transport system involves huge amount of
investment. In order to maintain a smooth functioning of the transport system up gradation of the
older gadgets is a vital step. All these steps are necessary to uphold the systematic execution of
the MRT in Singapore. Despite, the huge fiscal investment, threats and risks are common to
occur in any field. In addition, the consequences of these threats are deep. It will require proper
management of recovering from all threats. IN case of this project, The Transport department of
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Singapore should construct elaborate plans and programs to overcome such threats (Chapman,
2016).
The risk management process:
The purpose of risk management is to reduce attacks on probable points. A probable point or
target is an object, asset, process or policy that has real or relative worth. However, the degree to
which a point is crucial depends mostly on the level of its worth. In addition, this worth or value
is relatively depended on the extent of the impact that the loss will have on other activities.
The environment surrounding a target regulates the extent of risk.
Risk management takes place through extensive security planning which includes utilization of
physical security obstacles, process and feedback forces. In this case of MRT, careful handling
of security obstacles can do risk management. In addition,
Proper checking of the terminals,
Luggage section,
Warning department,
Installation of upgraded gadgets to ensure better risk avoidable chances
By providing high standard training in security department, to the officials
This will enable them to gain expertise in this field and will allow them to identify possible
threats from beforehand. In addition, be able to avert or manage risks.
In the case of this project, the risk management can be properly achieved by following these few
steps: Due to its closeness to residential area, a 12 mm sound obstacle around the track should be
installed. Massive sound and dust moderation should be maintained in order to make the
surrounding area less polluted. Innovative Technological gadgets should be installed. These
essential steps should be included in the project.
Recommendation
The project concerns about the discussion of Mass Rapid Transit (MRT). This scheme is
effective to transport passengers swiftly from the countryside into the city and took away them
back to the countryside in huge quantities (Hillson, 2017). The assets, threats, probability of
occurrence, impact and consequences have been discussed. Through all the discussion some
recommendations are needed to accelerate the effectiveness of it(Larson,2017).
7
2016).
The risk management process:
The purpose of risk management is to reduce attacks on probable points. A probable point or
target is an object, asset, process or policy that has real or relative worth. However, the degree to
which a point is crucial depends mostly on the level of its worth. In addition, this worth or value
is relatively depended on the extent of the impact that the loss will have on other activities.
The environment surrounding a target regulates the extent of risk.
Risk management takes place through extensive security planning which includes utilization of
physical security obstacles, process and feedback forces. In this case of MRT, careful handling
of security obstacles can do risk management. In addition,
Proper checking of the terminals,
Luggage section,
Warning department,
Installation of upgraded gadgets to ensure better risk avoidable chances
By providing high standard training in security department, to the officials
This will enable them to gain expertise in this field and will allow them to identify possible
threats from beforehand. In addition, be able to avert or manage risks.
In the case of this project, the risk management can be properly achieved by following these few
steps: Due to its closeness to residential area, a 12 mm sound obstacle around the track should be
installed. Massive sound and dust moderation should be maintained in order to make the
surrounding area less polluted. Innovative Technological gadgets should be installed. These
essential steps should be included in the project.
Recommendation
The project concerns about the discussion of Mass Rapid Transit (MRT). This scheme is
effective to transport passengers swiftly from the countryside into the city and took away them
back to the countryside in huge quantities (Hillson, 2017). The assets, threats, probability of
occurrence, impact and consequences have been discussed. Through all the discussion some
recommendations are needed to accelerate the effectiveness of it(Larson,2017).
7

The recommendations are also based on a few factors –
Adjacent areas:
The implementation of this project depends on the security system of adjacent areas (Kliem et al.
2019). To protect this authority from being harmed by any outskirt attack strong CCTV camera
should be imposed to enhance its outer security system.
The protection from adjacent areas comes under the sector of social environment. It deals
with the pleased attitude of the passengers. By this, the existence of any terror group or
any annoyed person can be easily detectable.
By retaining a positive effect on the neighbor people the exploited situations can be
prevented from being carried out (Falkner,2015).
A strong security check system can also exaggerate the prevention measures. The place
can be diminished by any outsider attack but the area security check will help to prevent
such kind of activity.
The positive behavior towards the adjacent area associations also will help to create
safety boundary around the place and in addition enriches the safety and security
concerns of the project.
An influencing reinforcement should be conveyed to the employees to rear up a cohesive
bond with them. It will help in the advancement of the project and it will lead the project
to be successful during the implementation of the project.
The MRT control centre should always maintain a strongly knit bond with the adjacent
areas. Any kind of further implementation of changes the effects on the areas should keep
in the priority list (Burtonshaw, 2017).
Perimeter of site :
Perimeter of site associates with the schematic fact of the site layout plan. The perimeter
of the site should be secured by strong fencing.
According to the plan, there will be three buildings. Each of the buildings will be
constructed for different purposes.
Therefore an inner fencing is also necessary to restrict the entry of the buildings (Fiksel,
2015).
A reception area should also be constructed to give the entry pass to the people according
to their necessities.
8
Adjacent areas:
The implementation of this project depends on the security system of adjacent areas (Kliem et al.
2019). To protect this authority from being harmed by any outskirt attack strong CCTV camera
should be imposed to enhance its outer security system.
The protection from adjacent areas comes under the sector of social environment. It deals
with the pleased attitude of the passengers. By this, the existence of any terror group or
any annoyed person can be easily detectable.
By retaining a positive effect on the neighbor people the exploited situations can be
prevented from being carried out (Falkner,2015).
A strong security check system can also exaggerate the prevention measures. The place
can be diminished by any outsider attack but the area security check will help to prevent
such kind of activity.
The positive behavior towards the adjacent area associations also will help to create
safety boundary around the place and in addition enriches the safety and security
concerns of the project.
An influencing reinforcement should be conveyed to the employees to rear up a cohesive
bond with them. It will help in the advancement of the project and it will lead the project
to be successful during the implementation of the project.
The MRT control centre should always maintain a strongly knit bond with the adjacent
areas. Any kind of further implementation of changes the effects on the areas should keep
in the priority list (Burtonshaw, 2017).
Perimeter of site :
Perimeter of site associates with the schematic fact of the site layout plan. The perimeter
of the site should be secured by strong fencing.
According to the plan, there will be three buildings. Each of the buildings will be
constructed for different purposes.
Therefore an inner fencing is also necessary to restrict the entry of the buildings (Fiksel,
2015).
A reception area should also be constructed to give the entry pass to the people according
to their necessities.
8
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Thus, the security system can be imposed to the outsiders and in addition, this process
can help to refine the entry of the outsiders.
The perimeter area should be provided with electric fence. It will enhance security alarm
at the time of any emergency.
Electric fence will create an obstacle for the entry of any unauthenticated person or
element.
The fence should be modified in such a way that it should be able to detect any
unidentified object at its prior position (Hyatt, 2018).
The buildings should be built by maintaining a certain gap from the fence area.
The capability of creating a detectable area should be there in the fence. For this, the
fence should be needed to technically update.
Reduction of the harmful issues is the main concern of the risk management strategies.
The updated fence system can eliminate the risk of hazards created by the outsider.
The most updated fencing system will be unique from others and it is necessary to imply
unique ways to assign the proper level of security.
A strong sensor based device should be set up in the perimeter area, which will guide the
authority to identify the risks and vulnerable assets.
The theft procedure also can be prevented which will provide protection to the project
(Hornstein, 2015).
Perimeter of site
Perimeter of site is important for the people working at the site as well as for the general public
that might get affected by the site. The perimeter of the site is important for keeping any
unauthorized person out of the area. This helps to avoid accidents of people that wander around
the site inadvertently without realizing it. Following are the recommendations -
For security of the employees and other people it is required that the material used for the
fencing is proper
As the fencing is preventive measure in regards to stopping the material for being stolen
or tampered it is necessary that the material used for the fencing are tested on the basis of
its strength and durability
The fencing also needs to be at a suitable distance that will helps in unrestricted as well
as easy movement of the machinery and the employees
9
can help to refine the entry of the outsiders.
The perimeter area should be provided with electric fence. It will enhance security alarm
at the time of any emergency.
Electric fence will create an obstacle for the entry of any unauthenticated person or
element.
The fence should be modified in such a way that it should be able to detect any
unidentified object at its prior position (Hyatt, 2018).
The buildings should be built by maintaining a certain gap from the fence area.
The capability of creating a detectable area should be there in the fence. For this, the
fence should be needed to technically update.
Reduction of the harmful issues is the main concern of the risk management strategies.
The updated fence system can eliminate the risk of hazards created by the outsider.
The most updated fencing system will be unique from others and it is necessary to imply
unique ways to assign the proper level of security.
A strong sensor based device should be set up in the perimeter area, which will guide the
authority to identify the risks and vulnerable assets.
The theft procedure also can be prevented which will provide protection to the project
(Hornstein, 2015).
Perimeter of site
Perimeter of site is important for the people working at the site as well as for the general public
that might get affected by the site. The perimeter of the site is important for keeping any
unauthorized person out of the area. This helps to avoid accidents of people that wander around
the site inadvertently without realizing it. Following are the recommendations -
For security of the employees and other people it is required that the material used for the
fencing is proper
As the fencing is preventive measure in regards to stopping the material for being stolen
or tampered it is necessary that the material used for the fencing are tested on the basis of
its strength and durability
The fencing also needs to be at a suitable distance that will helps in unrestricted as well
as easy movement of the machinery and the employees
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Zoning and protection of vital restricted areas:
The security system and risk management of any area implies on the policy of zoning. There a
comprehensive plan should be implemented to exaggerate of advancement of any area.
A section should be built up to look over the zoning ordinance which will deal with the
text and zoning map issues (Kerzner, 2017).
The land use regulations should be imposed which will help the authority to differentiate
the zones; it also can restrict the use of land and in addition with all these features can
impose advancement standards. It helps to detect the requirements during the procedure.
The residential, commercial, industrial and combination should be done to secure the
authentication of the place. Rather in future, the effectiveness of the work can be forced
to stop.
Thus, the protection of the zoning areas can be secured.
Beside this, the zoning areas should be governed under the strong technical device.
Rather the protection issue of the project will rise anytime and that can harm the
procedure of the project, which will certainly lead to a great damage.
The vital records, information and issues should be protected to maintain the privacy
policy of any project. The authority should prepare a backlog of vital records thus they
will be able to gain it if there will be any loss of these records.
A data security plan or policy should be mentioned to maintain the confidential concern
of the issues.
A strong password should be created by the project authority management to strengthen
the security and privacy of the vital reports (Grote, 2015)
The person should be reliable who will be assigned the responsibility of keeping those
data.
The data should be backed up in regular basis.
It will be better if the management authority or the project head takes the responsibility of
that confidential information.
Security system and means :
The security system and means should be updated according to the up gradation of the
technology. The heart of any project implies to the security system. The exposing facts of
10
The security system and risk management of any area implies on the policy of zoning. There a
comprehensive plan should be implemented to exaggerate of advancement of any area.
A section should be built up to look over the zoning ordinance which will deal with the
text and zoning map issues (Kerzner, 2017).
The land use regulations should be imposed which will help the authority to differentiate
the zones; it also can restrict the use of land and in addition with all these features can
impose advancement standards. It helps to detect the requirements during the procedure.
The residential, commercial, industrial and combination should be done to secure the
authentication of the place. Rather in future, the effectiveness of the work can be forced
to stop.
Thus, the protection of the zoning areas can be secured.
Beside this, the zoning areas should be governed under the strong technical device.
Rather the protection issue of the project will rise anytime and that can harm the
procedure of the project, which will certainly lead to a great damage.
The vital records, information and issues should be protected to maintain the privacy
policy of any project. The authority should prepare a backlog of vital records thus they
will be able to gain it if there will be any loss of these records.
A data security plan or policy should be mentioned to maintain the confidential concern
of the issues.
A strong password should be created by the project authority management to strengthen
the security and privacy of the vital reports (Grote, 2015)
The person should be reliable who will be assigned the responsibility of keeping those
data.
The data should be backed up in regular basis.
It will be better if the management authority or the project head takes the responsibility of
that confidential information.
Security system and means :
The security system and means should be updated according to the up gradation of the
technology. The heart of any project implies to the security system. The exposing facts of
10

any project can diminish the aims and objectives of the project. To strengthen the security
system the authority has to impose a strong biometric password. It is also the easiest way
to apply (Haddad et al. 2016).
A strong firewall should be introduced towards the employees. The employees should be
trained properly about the firewall issues.
In case of any cyber protection or data protection, a strong antivirus program should be
installed to protect the cyber theft procedure.
The programs should be updated regularly, thus the confidential information and the data
regarding the project can be secured and the employees can able to get the updated
version of the work. It will help the advancement of the project.
The laptops or the technical machines where the data and the information are kept should
be secured by strong password and the authority maintains the privacy policy of using
those data.
It is said previously that the backup of all the data and the evidence of work procedure
should be done in regular basis.
The important thing is the observance of the higher authority. The concerned authority to
keep the privacy policy safe and secure should monitor the data ardently.
The encryption and the fidelity of the database should be rechecked spontaneously.
Not all the employees should have the knowledge of the backdoor of the confidential
information.
The database should be segmented properly to manage the privacy policy.
A sudden audit plan from the authorities can also help to restrict the anti-organizational
activities (Diao et al. 2017).
Security system and means
Security system plays an important role for any organization. In this context it is essential to
provide the necessary means and resources to the security authorities of the organization.
Following recommendation are required to be implemented -
It is necessary to involve diversity of technologies to protect the assets
The secret video is required to be combined with the wireless communications and order
to provide off-site monitoring facility
11
system the authority has to impose a strong biometric password. It is also the easiest way
to apply (Haddad et al. 2016).
A strong firewall should be introduced towards the employees. The employees should be
trained properly about the firewall issues.
In case of any cyber protection or data protection, a strong antivirus program should be
installed to protect the cyber theft procedure.
The programs should be updated regularly, thus the confidential information and the data
regarding the project can be secured and the employees can able to get the updated
version of the work. It will help the advancement of the project.
The laptops or the technical machines where the data and the information are kept should
be secured by strong password and the authority maintains the privacy policy of using
those data.
It is said previously that the backup of all the data and the evidence of work procedure
should be done in regular basis.
The important thing is the observance of the higher authority. The concerned authority to
keep the privacy policy safe and secure should monitor the data ardently.
The encryption and the fidelity of the database should be rechecked spontaneously.
Not all the employees should have the knowledge of the backdoor of the confidential
information.
The database should be segmented properly to manage the privacy policy.
A sudden audit plan from the authorities can also help to restrict the anti-organizational
activities (Diao et al. 2017).
Security system and means
Security system plays an important role for any organization. In this context it is essential to
provide the necessary means and resources to the security authorities of the organization.
Following recommendation are required to be implemented -
It is necessary to involve diversity of technologies to protect the assets
The secret video is required to be combined with the wireless communications and order
to provide off-site monitoring facility
11
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 17
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





