PHYSICAL SECURITY MODELS 4
Atleast three famous models have been applied to assist securityprofessionals discover physical security requirements in the targetenvironment they include dynamic Ds, lines of defense, as well asexternal/internal threat identification. Although these approaches tothe physical security planning are practicable, it is crucial toconsider environment’s weaknesses and strengths within each model.
Severalpractitioners have established three, four, and five Ds to roughdraft physical security objectives. Three Ds model include deterring,detect, and access denial, or deter, access denial, and detectdepending on priorities of the security professional. In case thebreach occurs, purpose of physical security plan, therefore, becomesmaking sure that access to targeted area is denied. Four Ds ofprotection include Deter intruder, Detect intruder, Delay intruder,and Deny intruder access. Sometimes the use of physical security canbe based on five Ds they include deterring, detect, delay, deny, anddestroy (Roper, 1997).
Afterapplying the dynamic Ds to identify purposes of the physical securityplan, lines of defense idea could be used in the assessment as wellas implementation of physical security strategy. The concept of lineof defense invites security professional to start with outer edges ofproperty/building/targeted area, after that move inward to assetsthat require protection. By starting from the outside, securityprofessional may assess sectors of the entire environment one afteranother (Roper, 1997).
Internaland external threats
Thistraditional approach permits security professional to focus on issuesthat come from outside of target environment or certain aspects ofthe environment where threats come from within. Internal lossprotection focuses on threats that come from within the organization.External loss protection focuses on threats that come from theoutside organization. The internal threats include employee problems,alcoholism, theft control strategies, and drug use, while externalthreats include burglary, robbery, bad checks, telecommunicationsfraud, shoplifting, crisis management, credit card fraud, andsabotage. The most effective model for planning security of certainenvironment is dynamic Ds because the intruder is guard in all stages(Roper, 1997).
Roper,C. A. (1997). PhysicalSecurity and the Inspection Process.Newton, MA: Butterworth-Heinemann.