The Levels of Physical Security | Oatridge Security Group

Page 1

LEVELS OF PHYSICAL SECURITY PRESENTED BY OATRIDGE SECURITY GROUP


When it comes to physical security, there are three parts included in the process: deterrence, detection, and response. While the visible presence of both guards and electronic security equipment help to deter and detect, it’s primarily up to human security guards to respond to breaches. For this reason, it’s important to distinguish between three levels of physical security, so the response to each can be measured accordingly.

01


L O W PRIORITY

02

Under this category, crimes usually involve little or no planning and are typically restricted to acts of vandalism and theft. People who normally commit these crimes do so in the heat of the moment and only use minimal tools, which they may be carrying with them.


The best method of physical security for deterring this type of criminal behavior is to maintain guards’ presence. Physical barriers, such as fences and electronic surveillance equipment, are also helpful tools.

03


MEDIUM PRIORITY A medium-level security threat involves the sabotage of property and acts of espionage. Typically, this consists of the exhibition of art and cultural artifacts that are highly valued and, as such, any building exhibiting these items must maintain adequate insurance as a means of security.

04


05 In addition to guards and electronic security equipment, the use of threat detection procedures should also be initiated. This can involve checkin points, metal detectors, and similar systems designed to identify threats in advance.


H I G H PRIORITY

06

The top level of physical security is reserved for acts of terrorism, which can target commercial or governmental buildings. These acts usually target structures that house organizations that are critical to the national infrastructure. Deterring and delaying acts of terror is the goal, so security measures that are employed in the low and medium priority measures are also used here.


07

Additionally, human agents will have strategies to delay the act of terror and evacuate people to a safe location. There will also be a means to close off the structure and use advanced weapons and defensive systems to identify and capture the terrorists.


THANK YOU FOR READING FOR M O R E O N S E C URITY PRACTIC ES VISIT

OATRIDGESECURITYGROUP.NET


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.