Perimeter Security

The Plan

The first step to determining if your perimeter security plan fulfills your needs is to conduct a risk assessment and take a long, hard look at the mission of your facility and the security measures you already have in place. According to Terry Wood, PE, CPP, director of Engineering and Security Applications for Wackenhut Corp; a risk assessment is a tool for measuring the compliance of a facility with security requirements. The assessment is used to analyze a system or facility to identify vulnerabilities that could potentially result in losses of life, products or technology. The methodology behind the risk assessment is based on the interrelationships of four key factors:

  • Assets. Any useful or valuable resource.
  • Vulnerability. Weakness or susceptibility of an asset or a collection of assets to losses of various kinds.
  • Threat. An event, process or act which, when realized, has an adverse effect on one or more assets.
  • Safeguard. A countermeasure, control or action taken to decrease the existing level of vulnerability of an asset to one or more threats.

According to Wood, "A risk equals a threat plus your vulnerability to that threat."

"If you operate a corrections facility, then your plan is to keep individuals from crossing the perimeter. If your facility is an automotive manufacturing plant, then you want to protect the product and monitor who is entering and leaving the facility," says Wood. The threat at a chemical facility, petrochemical plant or nuclear power station might be sabotage or terrorism, which means limiting access to the facility and the surrounding area.

An effective security plan will include:

  • The operational aspects of a security program,
  • Establishment of a proactive process to prevent security and safety issues,
  • An assessment of threat and vulnerability,
  • The utilization of and need to balance manpower and electronic solutions.

Source: ehstoday

050516 Government Security

Government Security.

Perimeter Security, Video Intrusion Detection, Fiber Optic Security System, Marine Security, Marine Net, Under Water Marine Net Detection, Under Water Marine Detection, Under Water Security, Security Under Water, Perimeter Security, Fiber Optic Sensor, Fence Detection, Fiber Optic Net, Airport Security, Nuclear Facilities Security, Nuclear Security, Government Security, Perimeter Security for Federal Government, Fiber Optic for Perimeter Security, Perimeter Security for Oil and Gas, Perimeter Security for Water Utilities, Perimeter Security for Treatment Plants, Perimeter Security for Storage Tanks, Perimeter Security for Dams, Perimeter Security for Reservoirs, Perimeter Security for Electric Utilities, Perimeter Security for Generation Plants, Perimeter Security for Sub-Stations, Perimeter Security for Switchyards, Perimeter Security for Chemical Facilities, Perimeter Security for Chemical Plants, Perimeter Security for Refineries, Perimeter Security for LNG Plants,Perimeter Security for Storage Facilities, Perimeter Security for Transportation Industry, Perimeter Security for Airports, Perimeter Security for Seaports, Perimeter Security for Roads and Railroads, Perimeter Security for High Security Sites, Perimeter Security for Government Facilities, Perimeter Security for Nuclear Plants, Perimeter Security for Military Bases, Perimeter Security for Prisons, Perimeter Security for Oil and Gas, Perimeter Security for Oil Fields, Perimeter Security for Storage Facilities, Perimeter Security for Refineries.