Security Systems Report: Risk and Security Analysis
VerifiedAdded on 2022/08/13
|4
|570
|17
Report
AI Summary
This report analyzes the security risks faced by a corporate campus located near a river. The report identifies potential threats such as flooding, protests, and the dangers associated with loading docks and narrow roads. It emphasizes the need for security measures to ensure employee safety and s...

Running head: SECURITY SYSTEMS
SECURITY SYSTEMS
Name of the Student
Name of the university
Author note
SECURITY SYSTEMS
Name of the Student
Name of the university
Author note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1SECURITY SYSTEMS
Construction of different buildings depends on the area chosen for the same and other
factors as well. In this paper, the risks that a corporate campus can face due to the location it
is in will be analyzed.
The company is located near to a river and thus is vulnerable to many risks from the same.
For instance during floods the lower floors can be flooded making it difficult for the
employees to enter and exit from the premises. It is said that there has been protests around
the campus of the building and it is well known how violent these protests can be. Thus the
company should consider this as a major risk as well. The few arrests prove that the
hooligans succeed in escaping from the place after creating nuisance around. During storms
and heavy rainfall the situation can become worse as being at the side of the river the
employees have to face problems. Another major thing is that the loading docks are accessed
by the parking space which can be dangerous at times. Though there are side roads it can
happen that a person gets hit by a car while walking down that narrow road. The chances of
accidents are high in this case (Hong & Kim, 2016). The employees can face many problems
due to certain factors that are the location of the campus by the side of the river and lack of
proper security measures to address the protests.
In order to ensure safety and security to the employees, the building can bring in some
security systems that are as follows:
1. The main gates that are the entrances should be guarded with security personnel and may
be access control measures can be taken. Other than employing security guards, the corporate
building can also use different modern technologies such as smart cards and biometric
systems can be made use of.
Construction of different buildings depends on the area chosen for the same and other
factors as well. In this paper, the risks that a corporate campus can face due to the location it
is in will be analyzed.
The company is located near to a river and thus is vulnerable to many risks from the same.
For instance during floods the lower floors can be flooded making it difficult for the
employees to enter and exit from the premises. It is said that there has been protests around
the campus of the building and it is well known how violent these protests can be. Thus the
company should consider this as a major risk as well. The few arrests prove that the
hooligans succeed in escaping from the place after creating nuisance around. During storms
and heavy rainfall the situation can become worse as being at the side of the river the
employees have to face problems. Another major thing is that the loading docks are accessed
by the parking space which can be dangerous at times. Though there are side roads it can
happen that a person gets hit by a car while walking down that narrow road. The chances of
accidents are high in this case (Hong & Kim, 2016). The employees can face many problems
due to certain factors that are the location of the campus by the side of the river and lack of
proper security measures to address the protests.
In order to ensure safety and security to the employees, the building can bring in some
security systems that are as follows:
1. The main gates that are the entrances should be guarded with security personnel and may
be access control measures can be taken. Other than employing security guards, the corporate
building can also use different modern technologies such as smart cards and biometric
systems can be made use of.

2SECURITY SYSTEMS
2. CCTV cameras should be installed around the premises so that during protests and other
anti-social activities everything gets recorded (Esiner & Datta, 2016). This recording will
help in identifying the anti-socials.
3. Whenever there are warnings for floods or storms, there should be proper measures taken
and arrangements made so that in case of emergency these can be used.
Thus it can be understood from the discussion that while constructing buildings different
aspects need to be checked and one of the major issues is safety and security. There are many
laws that need to be referred to while constructing buildings near rivers and thus the building
authorities should check whether they comply with all these existing laws.
2. CCTV cameras should be installed around the premises so that during protests and other
anti-social activities everything gets recorded (Esiner & Datta, 2016). This recording will
help in identifying the anti-socials.
3. Whenever there are warnings for floods or storms, there should be proper measures taken
and arrangements made so that in case of emergency these can be used.
Thus it can be understood from the discussion that while constructing buildings different
aspects need to be checked and one of the major issues is safety and security. There are many
laws that need to be referred to while constructing buildings near rivers and thus the building
authorities should check whether they comply with all these existing laws.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3SECURITY SYSTEMS
References
Hong, J. B., & Kim, D. S. (2016). Towards scalable security analysis using multi-layered
security models. Journal of Network and Computer Applications, 75, 156-168.
Esiner, E., & Datta, A. (2016, January). Layered security for storage at the edge: On
decentralized multi-factor access control. In Proceedings of the 17th International
Conference on Distributed Computing and Networking (pp. 1-10).
References
Hong, J. B., & Kim, D. S. (2016). Towards scalable security analysis using multi-layered
security models. Journal of Network and Computer Applications, 75, 156-168.
Esiner, E., & Datta, A. (2016, January). Layered security for storage at the edge: On
decentralized multi-factor access control. In Proceedings of the 17th International
Conference on Distributed Computing and Networking (pp. 1-10).
1 out of 4

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.