Physical Security Clients Assessment: Comprehensive Analysis Report
VerifiedAdded on 2022/08/17
|8
|1523
|125
Report
AI Summary
This report provides a comprehensive physical security assessment of the Chrysler Building site. It examines various aspects of security, including building security, ground security, access control systems, perimeter security, and information system and technology security. The assessment highlights the importance of multi-layered security measures and discusses the specific implementations at the Chrysler Building. The report covers fire protection systems, energy management, the presence of uniformed guards, the use of access control panels, and cloud-based systems. Furthermore, it addresses perimeter security with concealed sensors and protection against electromagnetic interference, as well as the importance of video surveillance, fire alarm systems, and intrusion detection systems for overall security. References from various sources are included to support the analysis.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: PHYSICAL SECURITY CLIENTS ASSESMENT
Physical Security Clients Assessment
Name of the Student
Name of the University
Author’s Note
Physical Security Clients Assessment
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
PHYSICAL SECURITY CLIENTS ASSESMENT
Table of Contents
1. Physical security in Chrysler building site............................................................................2
1.1 Building security..................................................................................................................2
1.2 Ground security....................................................................................................................3
1.3 Access control system..........................................................................................................3
1.4 Perimeter security.................................................................................................................4
1.5 Information system and technology security.......................................................................4
References..................................................................................................................................6
PHYSICAL SECURITY CLIENTS ASSESMENT
Table of Contents
1. Physical security in Chrysler building site............................................................................2
1.1 Building security..................................................................................................................2
1.2 Ground security....................................................................................................................3
1.3 Access control system..........................................................................................................3
1.4 Perimeter security.................................................................................................................4
1.5 Information system and technology security.......................................................................4
References..................................................................................................................................6

2
PHYSICAL SECURITY CLIENTS ASSESMENT
1. Physical security in Chrysler building site
Physical security is considered as one of the asset that is mainly achieved by properly
multi-layering the various types of measures. It is found that Chrysler building which is one
of the Deco style skyscraper is mainly located in the Turtle bay USA is mainly considered in
order to discuss how physical security is important for this specific building site. It is found
that proper physical security is very much important and if proper security is not properly
maintained, then all the security measures will be useless once the attacker will be able to get
the physical access of the building (Rumelili 2015). The physical security that is provided in
the Chrysler building site against various types of theft including access control, special
locks, surveillance cameras as well as security guards. Physical security generally helps in
restricting access, assists in tracking security breaches, assists in determining unauthorized
access and generally ensures very much faster response time (Kobara 2016). In addition to
this, other types of security including building security, perimeter security, and ground
security as well as information security which are provided in Chrysler building are properly
elaborated.
1.1 Building security
According to Puthal et al. (2017), building security as well as control system has
generally become necessary with the increasing complexity of the buildings. In Chrysler
Building site, the entire building security as well as control system is properly designed for
monitoring and controlling the electrical and mechanical installations, burglary, emergency
communication as well as fire protection. It is found that for the structural precaution of the
fire protection special systems are used which are helpful in fire detection, suppression,
movement of people as well as smoke control including pressurization, emergency
PHYSICAL SECURITY CLIENTS ASSESMENT
1. Physical security in Chrysler building site
Physical security is considered as one of the asset that is mainly achieved by properly
multi-layering the various types of measures. It is found that Chrysler building which is one
of the Deco style skyscraper is mainly located in the Turtle bay USA is mainly considered in
order to discuss how physical security is important for this specific building site. It is found
that proper physical security is very much important and if proper security is not properly
maintained, then all the security measures will be useless once the attacker will be able to get
the physical access of the building (Rumelili 2015). The physical security that is provided in
the Chrysler building site against various types of theft including access control, special
locks, surveillance cameras as well as security guards. Physical security generally helps in
restricting access, assists in tracking security breaches, assists in determining unauthorized
access and generally ensures very much faster response time (Kobara 2016). In addition to
this, other types of security including building security, perimeter security, and ground
security as well as information security which are provided in Chrysler building are properly
elaborated.
1.1 Building security
According to Puthal et al. (2017), building security as well as control system has
generally become necessary with the increasing complexity of the buildings. In Chrysler
Building site, the entire building security as well as control system is properly designed for
monitoring and controlling the electrical and mechanical installations, burglary, emergency
communication as well as fire protection. It is found that for the structural precaution of the
fire protection special systems are used which are helpful in fire detection, suppression,
movement of people as well as smoke control including pressurization, emergency

3
PHYSICAL SECURITY CLIENTS ASSESMENT
arrangements as well as communication. All these arrangements are generally integrated with
other facilities including heating, ventilation as well as air conditioning system. In addition to
this, energy management systems are also present in Chrysler Building site for controlling the
environmental functions (Dwan and Pavliuk 2015).
1.2 Ground security
Within the Chrysler building site, ground security is necessary and therefore local
uniformed guards are present for protection in order to provide security. It is found that for
entering certain places of the site, proper warrant needs to be taken for using security escorts
or bodyguards. In such circumstances, the site generally turns out to be an international
system whose main aim is to make sure that the clients are generally shielded from the
various types of physical harm (Zhu et al. 2016). The physical presence of the guards on the
duty further helps in redirecting the criminals and further helps in providing proper on-
demand protection as someone is generally overseeing different types of facilities as well as
equipment’s. In addition to this, proper cameras are set in appropriate places in order to keep
eye on the activities of the people which further add much more value to the ground security
that is mainly provided in Chrysler building site.
1.3 Access control system
According to Sahani et al. (2015), access control systems are generally utilized for
controlling the entry into the exterior doors of the buildings effectively. It is found within the
Chrysler building site, three types of access control are mainly used which are user facing,
admin facing as well as infrastructure based access control panels. The main purpose of the
access control is to provide access only to the people who are generally authorized. In
addition to this, the site also utilizes cloud based access control systems, mobile based access
PHYSICAL SECURITY CLIENTS ASSESMENT
arrangements as well as communication. All these arrangements are generally integrated with
other facilities including heating, ventilation as well as air conditioning system. In addition to
this, energy management systems are also present in Chrysler Building site for controlling the
environmental functions (Dwan and Pavliuk 2015).
1.2 Ground security
Within the Chrysler building site, ground security is necessary and therefore local
uniformed guards are present for protection in order to provide security. It is found that for
entering certain places of the site, proper warrant needs to be taken for using security escorts
or bodyguards. In such circumstances, the site generally turns out to be an international
system whose main aim is to make sure that the clients are generally shielded from the
various types of physical harm (Zhu et al. 2016). The physical presence of the guards on the
duty further helps in redirecting the criminals and further helps in providing proper on-
demand protection as someone is generally overseeing different types of facilities as well as
equipment’s. In addition to this, proper cameras are set in appropriate places in order to keep
eye on the activities of the people which further add much more value to the ground security
that is mainly provided in Chrysler building site.
1.3 Access control system
According to Sahani et al. (2015), access control systems are generally utilized for
controlling the entry into the exterior doors of the buildings effectively. It is found within the
Chrysler building site, three types of access control are mainly used which are user facing,
admin facing as well as infrastructure based access control panels. The main purpose of the
access control is to provide access only to the people who are generally authorized. In
addition to this, the site also utilizes cloud based access control systems, mobile based access
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
PHYSICAL SECURITY CLIENTS ASSESMENT
control systems as well as IoT based access control system. These access controls generally
determine the entity of an individual by property verifying the person and set proper actions
as per the associated username or the IP addresses.
1.4 Perimeter security
Perimeter security generally refers to the natural barriers or different types of
fortifications for keeping the intruder out or in order to keep the captive contained within the
area of boundary. The perimeter security that is utilized within the Chrysler building site
helps in protecting not only the inside of the building but also on the various objects which
are located within the building for protecting them against burglary or vandalism. In addition
to this, the perimeter security that is utilized is generally concealed with the sensors in order
to provide proper security (Topak et al. 2015). Moreover proper stability against the
electromagnetic interference is provided including the storm discharges as well as different
sources of the strong electromagnetic emission. In addition to this, the most important
common points are generally equipped with sensing of the devices for premise protection of
the doors, vents as well as windows.
1.5 Information system and technology security
It is found that in Chrysler building site, proper information system as well as
technology security are present. Proper electronic access system is present for keeping access
that is entering or leaving the building. One of the most important as well as effective ways to
protect the building is to effectively integrate video surveillance into the security system by
successfully providing a watchful eye for successfully determining crime and for keeping
oneself informed (Safa, Von Solms and Furnell 2016). In addition to this, fire alarm system is
mainly installed within each and every sections of the building and whenever a fire alert
PHYSICAL SECURITY CLIENTS ASSESMENT
control systems as well as IoT based access control system. These access controls generally
determine the entity of an individual by property verifying the person and set proper actions
as per the associated username or the IP addresses.
1.4 Perimeter security
Perimeter security generally refers to the natural barriers or different types of
fortifications for keeping the intruder out or in order to keep the captive contained within the
area of boundary. The perimeter security that is utilized within the Chrysler building site
helps in protecting not only the inside of the building but also on the various objects which
are located within the building for protecting them against burglary or vandalism. In addition
to this, the perimeter security that is utilized is generally concealed with the sensors in order
to provide proper security (Topak et al. 2015). Moreover proper stability against the
electromagnetic interference is provided including the storm discharges as well as different
sources of the strong electromagnetic emission. In addition to this, the most important
common points are generally equipped with sensing of the devices for premise protection of
the doors, vents as well as windows.
1.5 Information system and technology security
It is found that in Chrysler building site, proper information system as well as
technology security are present. Proper electronic access system is present for keeping access
that is entering or leaving the building. One of the most important as well as effective ways to
protect the building is to effectively integrate video surveillance into the security system by
successfully providing a watchful eye for successfully determining crime and for keeping
oneself informed (Safa, Von Solms and Furnell 2016). In addition to this, fire alarm system is
mainly installed within each and every sections of the building and whenever a fire alert

5
PHYSICAL SECURITY CLIENTS ASSESMENT
occurs then the system gets connected with the remote monitoring station quite effectively.
Moreover, early warning fire systems are considered quite critical for the life safety of the
people. In addition to this, it is necessary to utilize proper intrusion system for successfully
monitoring the building security 24x7. The security of the employees as well as facilities
generally depends on the ability of the system for detecting as well as communicating an
intrusion at any time. With proper intrusion monitoring system, the motion sensors as well as
window contacts automatically sends alarm in order to command central when an intrusion
event generally occurs within the proper secured zone. Due to this, the security personnel will
be able to respond quite effectively. Furthermore, real time as well as actionable alerts
generally means very much faster as well as greater protection to the employees.
PHYSICAL SECURITY CLIENTS ASSESMENT
occurs then the system gets connected with the remote monitoring station quite effectively.
Moreover, early warning fire systems are considered quite critical for the life safety of the
people. In addition to this, it is necessary to utilize proper intrusion system for successfully
monitoring the building security 24x7. The security of the employees as well as facilities
generally depends on the ability of the system for detecting as well as communicating an
intrusion at any time. With proper intrusion monitoring system, the motion sensors as well as
window contacts automatically sends alarm in order to command central when an intrusion
event generally occurs within the proper secured zone. Due to this, the security personnel will
be able to respond quite effectively. Furthermore, real time as well as actionable alerts
generally means very much faster as well as greater protection to the employees.

6
PHYSICAL SECURITY CLIENTS ASSESMENT
References
Dwan, R. and Pavliuk, O., 2015. Building Security in the New States of Eurasia: Subregional
Cooperation in the Former Soviet Space: Subregional Cooperation in the Former Soviet
Space. Routledge.
Kobara, K., 2016. Cyber physical security for industrial control systems and IoT. IEICE
TRANSACTIONS on Information and Systems, 99(4), pp.787-795.
Puthal, D., Mohanty, S.P., Nanda, P. and Choppali, U., 2017. Building security perimeters to
protect network systems against cyber threats [future directions]. IEEE Consumer Electronics
Magazine, 6(4), pp.24-27.
Rumelili, B., 2015. Identity and desecuritisation: the pitfalls of conflating ontological and
physical security. Journal of international relations and development, 18(1), pp.52-74.
Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance
model in organizations. computers & security, 56, pp.70-82.
Sahani, M., Nanda, C., Sahu, A.K. and Pattnaik, B., 2015, March. Web-based online
embedded door access control and home security system based on face recognition. In 2015
International Conference on Circuits, Power and Computing Technologies [ICCPCT-
2015] (pp. 1-6). IEEE.
Topak, Ö.E., Bracken-Roche, C., Saulnier, A. and Lyon, D., 2015. From smart borders to
perimeter security: the expansion of digital surveillance at the Canadian
borders. Geopolitics, 20(4), pp.880-899.
PHYSICAL SECURITY CLIENTS ASSESMENT
References
Dwan, R. and Pavliuk, O., 2015. Building Security in the New States of Eurasia: Subregional
Cooperation in the Former Soviet Space: Subregional Cooperation in the Former Soviet
Space. Routledge.
Kobara, K., 2016. Cyber physical security for industrial control systems and IoT. IEICE
TRANSACTIONS on Information and Systems, 99(4), pp.787-795.
Puthal, D., Mohanty, S.P., Nanda, P. and Choppali, U., 2017. Building security perimeters to
protect network systems against cyber threats [future directions]. IEEE Consumer Electronics
Magazine, 6(4), pp.24-27.
Rumelili, B., 2015. Identity and desecuritisation: the pitfalls of conflating ontological and
physical security. Journal of international relations and development, 18(1), pp.52-74.
Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance
model in organizations. computers & security, 56, pp.70-82.
Sahani, M., Nanda, C., Sahu, A.K. and Pattnaik, B., 2015, March. Web-based online
embedded door access control and home security system based on face recognition. In 2015
International Conference on Circuits, Power and Computing Technologies [ICCPCT-
2015] (pp. 1-6). IEEE.
Topak, Ö.E., Bracken-Roche, C., Saulnier, A. and Lyon, D., 2015. From smart borders to
perimeter security: the expansion of digital surveillance at the Canadian
borders. Geopolitics, 20(4), pp.880-899.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
PHYSICAL SECURITY CLIENTS ASSESMENT
Zhu, L., Yu, F.R., Tang, T. and Ning, B., 2016. An integrated train–ground communication
system using wireless network virtualization: Security and quality of service
provisioning. IEEE Transactions on Vehicular Technology, 65(12), pp.9607-9616.
PHYSICAL SECURITY CLIENTS ASSESMENT
Zhu, L., Yu, F.R., Tang, T. and Ning, B., 2016. An integrated train–ground communication
system using wireless network virtualization: Security and quality of service
provisioning. IEEE Transactions on Vehicular Technology, 65(12), pp.9607-9616.
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.