Explore chapters and articles related to this topic
Physical and Waterside Security in the Port Facility
Published in Kenneth Christopher, Port Security Management, 2014
Perimeter security refers to detecting, assessing, and tracking intruders and/or threats related to the facility’s perimeter. The perimeter is the area contiguous to and surrounding a target security environment. Physical security devices along the perimeter can include one or more of a combination of intrusion detectors, alarms, barriers, lighting, structural materials, procedural controls, and human resources. There are many ways to facilitate effective perimeter security; in fact, the port FSO will likely discover that there is a wide assortment of both traditional hardware and technological devices and systems available to him or her. Port FSOs must consider the various port facility operations, configurations, and layouts, as well as the port’s proximate locations to adjacent waterways and metropolitan areas, in planning its perimeter security. For example, PortMiami, Florida, is an island port connected by a primary roadway bridge to the central downtown area. While it may appear to be a simple process to secure the perimeter of an island, it can become complex when a port adjoins a highly developed roadway infrastructure, high-end residential and commercial development, world-class tourist destinations, a major city sports arena, and busy recreational and commercial inland waterways. Thus, perimeter security must be assessed by considering each port’s unique business and operating features and within the context of its geographic features and relative place in the larger environment.
Security
Published in R. Glenn Wright, Unmanned and Autonomous Ships, 2020
The purpose of physical security is to protect the safety of personnel, physical assets and facilities of a company or organization. For MASS this includes to the vessel itself and extends to the RCC, to the routes and ports within which MASS operate. Since the physical security of land-based personnel and facilities are adequately covered in other texts, this paragraph focuses on the vessels themselves represented as the object of the VSP. Topics addressed include the features and systems that may help in preventing the entry into MASS spaces by unauthorized personnel, taking over of vessels through acts of piracy and reducing the exposure of MASS as a viable target for attack.
Security Awareness: The First Step in Information Security Compliance Behavior
Published in Journal of Computer Information Systems, 2021
Inho Hwang, Robin Wakefield, Sanghyun Kim, Taeha Kim
A physical security system may be composed of numerous elements including physical entry or access controls to data centers and computer rooms, isolated delivery and loading areas, cable security, equipment maintenance, security of equipment off premises, and the secure disposal of equipment.30 An enterprise security system enhances the security knowledge of managers34 and is an important element to establish a security environment and minimize information abuse.35 An effective information security system minimizes security incidents caused by insiders and sustains a stable information security level within an organization.36