Physical Security Report: Testing and Analyzing Security Systems

Verified

Added on  2021/04/17

|5
|547
|50
Report
AI Summary
This report provides a detailed analysis of the testing procedures for physical security systems. It covers various aspects of testing intrusion detection systems, including the examination of motion detectors, lighting systems, and electronic locks. The report also discusses the testing of CCTV systems, biometric systems, and electric fencing. Furthermore, it explores the importance of testing alarm systems, walkie-talkies, and the security of residential properties. The report also covers the testing of key locks, electronic gates, metal detectors, fire alarms, smoke detectors, sprinklers, and server room security. The report concludes by highlighting the importance of testing all security measures to ensure their effectiveness and reliability.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: PHYSICAL SECURITY
PHYSICAL SECURITY
Name of Student
Name of University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1PHYSICAL SECURITY
Executive Summary
The purpose of this report is to analyse the various components of testing an intrusion
detection system. The checking of the system can be done in various ways which has been
stated and explained. Conclusively the report states the every security measurements should
be tested before implementation.
Document Page
2PHYSICAL SECURITY
Table of Contents
Discussion..................................................................................................................................3
Reference....................................................................................................................................4
Document Page
3PHYSICAL SECURITY
Discussion
The components required to execute inspection of the intrusive alarms are physically
walking through every motion detector sensor installed. To check the lighting systems
automated system of switching lights can be tested. Electromagnetic locks can be tested using
dummy cards(Fennelly, 2016). The CCTV system can be checked by checking the video in a
computer from the control room(Rumelili, 2015). The biometric system can be also tested
using few samples of fingerprint of the persons entering through the security system. Electric
fencing can be tested by sending test signals from the fence to the control server(Siaterlis,
Genge & Hohenadel, 2013). Alarm keys should be tested by conducting mock drills. Walkie-
talkies can be tested manually to ensure two way communication between the security
personnel and control room. Security in case of residence can be tested by trying to break the
glass of the window at basement and check if the safety system works or not. The key locks
of doors and windows can be tested using other keys(Mukherjee et al., 2014). The Electronic
gates which open with codes can be tested using various random codes to gain access. The
metal detectors can be tested manually by tested on the persons entering with metallic
objects. Fire alarms and smoke detectors should be tested by producing fake smoke after
installation. The sprinklers can also be tested along with fire alarm and smoke detectors. The
server room security locks should be tested with entering duplicate key cards into the card
swiping system. Tumbler mechanisms can be checked by using various combination of the
pin code. Bolt bodies can be applied pressure to break down the system. Physical key locks
should be tested by picking the lock which is most common way to intrude any physical key
lock system.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4PHYSICAL SECURITY
Reference
Fennelly, L. (2016). Effective physical security. Butterworth-Heinemann.
Mukherjee, A., Fakoorian, S. A. A., Huang, J., & Swindlehurst, A. L. (2014). Principles of
physical layer security in multiuser wireless networks: A survey. IEEE
Communications Surveys & Tutorials, 16(3), 1550-1573.
Rumelili, B. (2015). Identity and desecuritisation: the pitfalls of conflating ontological and
physical security. Journal of International Relations and Development, 18(1), 52-74.
Siaterlis, C., Genge, B., & Hohenadel, M. (2013). EPIC: a testbed for scientifically rigorous
cyber-physical security experimentation. IEEE Transactions on Emerging Topics in
Computing, 1(2), 319-330.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]