Security Site Survey Essay

The security survey at National Defense Solutions was conducted on May 14, 2009 by Tarquin Shipman who was retained by Devry University for this purpose. Information set forth in this report was obtained Michelle Castro, Executive Vice President & Chief Financial Officer, and from Terrence Graham, Facility Manager, and from personal observations from Tarquin Shipman during the inspection of this facility. This report is intended as a detailed audit of all the phases of the National Defense Solutions operations as well as a review and evaluation of those areas and activities most vulnerable to theft or safety risk.

Neither the National Defense Solutions organization nor the writer of this report is in a position to evaluate the integrity of the employees of the Devry Center and this report does not attempt to do so. Summary National Defense Solutions is in the business of taking what is given and coming up with the best solution to enhance the features and protect its assets. National Defense Solution also specializes in crisis situations in helping to incorporate planning and preparing individuals for the worst scenario.

From contingency to crisis management to physical security systems, National Defense stands in the top ten for its effectiveness in helping organizations decrease the risk of crime, bounce back from natural disasters, and choosing the best security system. In today’s society, most of the crime is either committed from within or by individuals not being fully aware. National Defense Solutions offers updated scenarios based on security risk and why we should be aware at its website which can be located at www. nationaldefensesolutions. com and clicking on awareness.

There are scenarios for CEO’s, managers, small business owners, and home owners looking to get information on the best affordable and effective ways of protecting assets. Details General Information The Devry Center is located on a four acre plot of land in downtown New York City. It is a 30-story corporate tower high-rise, which includes 1,250 underground parking garage spaces and a rooftop garden. Construction of the building was completed in December of 2008, and 27 of the 30 floors are occupied by tenants. Currently, there are 1,800 tenants in the building, which has a maximum capacity of 2,000.

The center is surrounded by small business and local shops that accommodate the tenants that live in the area. With all the business in the area, it is starting to become more of a risk because the more business the more a crime is likely to happen. When the building was under construction, there were questions about whether or not fencing was appropriate, but it was never included due to the risk of decreasing natural surveillance. As the numbers start to increase, it is good to make sure that building policy is available to all the tenants and that they are aware of the rules and regulations.

The doors to the building remain unlocked allowing anyone to enter into the main lobby. Tenants are constantly in and out because of the local stores and shops in the area. The first three floors of the building is used by the staff that works in the building to include janitors, receptionist, and security guards on duty. There is a break room and additional lobby or dayroom for the staff to utilize during breaks or lunches to avoid the risks of leaving the area for long periods of time.

Physical Security Security Guards are there 24/7 completing roving and patrols every hour and sometimes every forty-five minutes. They change up their roving patrols to keep from being too routine because criminals can predict when they want to anticipate a crime if the same routine is being given. Security guards have their own office on the second floor where they can monitor CCTV’s and complete reports. During the day between 9am and 6pm, receptionists are available Monday through Saturday. The receptionists are off on Sunday so the security guards are present at the front desk.

There are six guards contracted to this facility, so there is no overstrained of duties handed down to one person. Two guards are always on duty at the same time so that whenever one is at the front desk, the other is in the control room/office monitoring the CCTV cameras. As the security manager, I can say that the physical security role is taking its rightful place. This is very important to have because with a building like this there will be computers with important information that is very dangerous in the wrong hands.

The physical security is not only monitoring for strange activity, but making sure that the assets belonging in the building remain in its place. Also in the event of a natural disaster, the center is equipped with backup power to keep computers systems, and alarms systems active. During natural disaster is when most crimes are committed because looters are always prowling looking for something of value to take for them. When the building was constructed the CPTED, crime prevention through environmental design method was taken into consideration and that is plus.

Good lighting is one of the most effective crime deterrents. When used properly, light discourages criminal activity, enhances natural surveillance opportunities, and reduces fear. The type and quantity of light required will vary from application to application, but the goal remains the same in all cases. To the degree possible, a constant level of light providing reasonably good visibility should be maintained at night. The absolute level of light, provided it meets minimum standards, is less critical than the evenness of the light.

Bright spots and shadows should be avoided. Highly vulnerable areas and those that could conceal a potential attacker should be illuminated more brightly than areas designed for normal activity. The object is to light up the criminal without spotlighting the victim. (Gardner, 1981) Alarm System There is an alarm systems installed and the security guards only activate after midnight because the only entrance that is allowed after midnight is the front. The doors on each side are locked and individual alarms that are attached to each side are armed and every effective.

After midnight the two side doors are only used as emergency exits and during the day it is still only used by tenants of the building because there is a four digit pin required to gain access that is only given to tenants in an active lease. Emergency exit signs are present and can be clearly seen by anyone in the building. Closed Circuit Television (CCTV) The building has sixty closed circuit televisions and the files are stored on the second where the security guard’s office is located. There are two monitors located on each floor allowing a clear view of each side along the halls on each floor.

Read also  Government Enforced Cyber Security, a Public Good_

Now on the outside there four monitors to keep a visual in the outside additional parking lot. The underground parking garage has ten monitors because of the amount of the space that it has to cover. As the security manager, I would always suggest making sure that monitors will always be effective because they see what we as humans failed to recognize. The reason for this statement is because displacement when CCTV’s are available does not decrease the crime rate. A common criticism of crime prevention measures, including CCTV, surrounds the potential ‘displacement’ effect.

Crimes apparently ‘prevented’ may in fact have simply shifted to another place (geographical displacement) or time (temporal displacement). Alternatively, the criminal may choose different methods of committing the same crime (tactical displacement), select a different target (target displacement), or commit a different type of crime (functional displacement). The most commonly identified type of displacement is, however, geographical displacement, where the ‘prevented’ crime, is committed elsewhere.

The main problem in measuring this form of displacement lies in identifying the area to which the ‘prevented’ crime might have been displaced. (Does Closed Circuit Televsion Prevent Crime, 1998) Visitors-Visitor Log In my observation of visitors coming to see a tenant and needed information, there is a log to keep track of who is visiting. Normally the procedures where to page the tenant and ask which is more effective because it saves the visitor walking or just hanging around if the tenant was not at home.

There is a call button for each residence in the building behind the front desk, which gives easy access for whoever is on duty. Vault/Inventory Controls Only limited personnel are authorized to go into the vault. The manager that is on duty during the day is the only authorized. With the lobby, there are some accessories that can be removed, but with the monitors facing the lobby, it is very unlikely for someone to take a recliner, microwave, or a sofa. The front desk clerk is allowed to handle the inventory checklist to ensure everything is present by the end of each shift.

As I may have not mention it earlier, but there are two front desk personnel available just one had to complete an inventory checklist or check the lobby Shipping/Receiving The shipping/receiving area is located on the first floor in a room that is always locked. This area is just for storing extra accessories needed for the building to accommodate the tenants. Other shipping items include vendors coming to refill the snack machines and soda machines on a weekly basis. Tenants receive their personal packages at the local post offices because large packages are not allowed to be left outside the doors.

Packages may be left at the front desk with the clerk but it is highly recommended that tenants advised the deliverer if they are expected over-sized packages to leave at the post-offices for pick-up later or the next day. Recommendations The security controls of National Defense Solutions are extremely thorough and here the recommendations that require immediate attention. As the security manager I am suggesting that a room strictly for tenant’s packages and parcel that has been delivered and needs signing for is used for this matter.

Packages that are left at the front desk should not be recommended at all. These are sensitive items and it is considered good physical security safeguarding these assets. Also I am suggesting that in the near future that more signs are placed to remind individuals of the restricted areas. Whether it is a business, residents, or shopping store, it should be in the best interest to take the necessary precautions to protect assets to make sure that you have every tool to remain safe.The security survey at the DeVry Corporate Center was conducted on June 10, 2013, by Christian Moreno who was retained by the DeVry University for this purpose. Information set forth in this report was obtained from Gregory Smith, Executive Vice President & Chief Financial Officer, and from David Davis, Facilities Manager, and from personal observations of Thomas Brown during the inspection of this facility.

This report is intended as a detailed audit of all phases of the DeVry Corporate Center security operations and a review and evaluation of those areas and activities most vulnerable to the theft or safety risks.

Neither the DeVry Corporate Center nor the writer of this report is in a position to evaluate the integrity of the employees of DeVry University and this report does not attempt to do so.

Summary The DeVry Center is located on a four-acre plot of land in downtown New York City. It is a 30-story corporate tower high-rise, which includes 1,250 underground parking garage spaces and a rooftop garden. Construction of the building was completed in December of 2008, and 27 of the 30 floors are occupied by tenants. Currently, there are 1,800 tenants in the building, which has a maximum capacity of 2,000.

THE CAMPUS DeVry occupies five floors in the 24-story building at 180 Madison Avenue. The campus’s 48,750 square feet of space provide an outstanding, professionally attractive, high-tech learning environment for students. DeVry has 12 classrooms and seven state-of-the art laboratories. The classrooms have an average seating capacity of 20 students. The campus is equipped with a wireless network to accomodate laptop computers. There are three labs supporting the Electronics programs: averaging 21 seats. There is one Network Lab designed to support individual networks with a capacity of 18 positions.

The remaining labs support the Computer Information Systems programs as well as those business and other programs requiring the use of personal computers. Science and Biomed classes are taught in the Physics Lab. The Physics Lab is equipped with networked PC’s and scientific testing equipment. The library has over 18,000 paper and electronic titles, 60 paper periodicals, 9 databases and 25 computer workstations for student use. The Academic Support Center provides students with free tutoring, computer-assisted instruction, and workshops on various instructional topics. Physical Security

The receptionist desk is staffed from 8 AM until 7 PM even though the company operates 24 hours a day. During other hours the security guard is stationed at the receptionist’s desk. Electronic identification cards are used by employees to gain access to the exterior doors as well as interior doors on a restricted basis. A six-hour emergency backup system is a component of the door control system to ensure security in the event of a power failure. Additionally, there is a lockbox for keys to be used in an emergency and it is located in the Facilities Manager’s office. A security guard patrols the exterior of the building and the parking lot during times when the receptionist is on duty.

Read also  Human Security

The security guard escorts the cleaning crew when working in the premises. Campus security personnel patrol the building on a regular basis (Monday through Friday from 7:00 a.m. to 11:00 p.m. and Saturdays from 7:30 a.m. to 7:00 p.m.) and are alert to any suspicious activity. Security personnel report any possible criminal activity to local law enforcement personnel, and any possible code of conduct violation to the Dean of Students. The Dean of Student Services also acts as the New York City Community Affairs Officer to aid in the monitoring of all crimes that occur on or around campus grounds. Campus safety and security is the shared responsibility of both students and staff. To enhance student and staff awareness of their responsibilities for their own safety the following will be provided throughout the year. * Pamphlets on personal safety are posted on bulletin boards and available in Student Services. * Campus security has a copy of the evacuation plan.

* The Student Handbook includes emergency phone numbers for students, faculty and staff. * Displays of safety/security information are set up in the Lobby, Student Services Office and/or the Student Commons. * School publications are used as a forum for topics on the necessity of taking control of personal safety. * Procedures for informing appropriate personnel of any emergencies and emergency evacuation procedures are available in each department.

Alarm System There is an alarm system installed but since the company operates around the clock there has never been the need to activate it. There are two emergency exits which are alarmed and clearly labeled.

Closed Circuit Television [CCTV] There are sixteen closed circuit digital color cameras and the file is maintained for a period of thirty days. The monitors are located in the Facilities Manger’s office and at the receptionist’s desk. Another monitor is located in the vault area to allow employees there to view the lobby outside the shipping/receiving area.

Visitors – Visitor Log Visitors are required to sign in a log at the receptionist’s desk and wear a visitor badge while on the premises. Recommendation The implementation of Universal Access Cards would allow an observer to track a person’s movement on site. In the matter of such cards, it is believe that some degree of track ability is acceptable. Naturally, certain sensitive non-facility areas must be treated with care. For example, payroll and human resources some other areas of administration must be accessible to students without requiring them to use their unique access card. Other tracking may possible with the introduction of networked swipe-card locks, even if the actual transmission of data from the lock to the data center is encrypted (as the company requires from its future contractor).

More Essays

  • Proprietary Versus Contract Security

    As an organization grows so must the security, and it has to be on the top of the list. When considering what type of security to choose, either proprietary or contact, they need to look at the value of the organization? This value within the organization will need some sort of protection to deter theft,...

  • Security Survey

    A security survey at Reedy Recovery Company was conducted on September 15, 2011 by Amy Reedy who was invited and retained by DeVry University for a security assessment. Information in the report was obtained from James Write, Executive Vice President and Chief Financial officer, and Rhonda Forbes,...

  • The Role of Security Management

    ABSTRACT Personal information security is usually considered a technical discipline with much attention being focused on topics such as encryption, hacking, break-ins, and credit card theft. Security products such as anti-virus programs and personal firewall software, are now available for end-users to...

  • Vulnerable Areas of Industrial Security

    In the transportation industry such as airport, train, or ships there are many vulnerabilities that can be faced if security measures are not foreseen. These industries can be victims of sabotage, espionage, or lack of security process which would result in the industry loss of product. Sabotage such as...

  • Security Requirements & Possible Risks

    Huffman Trucking, an established trucking company since 1936, has recently requested the implementation of a new Benefits Elections System to assist management in tracking and reporting the benefits of both union and non-union employees. A database system will be utilized to store critical data such as...

  • Organizational Security Plan

    For every organization and business, physical security is a necessary aspect of protecting its facility, properties and employees against unwanted criminal activities. To choose the best organizational security plan possible, the organization must first conduct a thorough risk and threat assessment to...

  • Vulnerability in Cloud Computing

    Abstract— Cloud computing has been developed to reduce IT expenses and to provide agile IT services to individual users as well as organizations. It moves computing and data away from desktop and portable PCs into large data centers. This technology gives the opportunity for more innovation in lightweight...

  • Security Assessment and Recommendation

    I have been charged with the task of identifying potential security weaknesses and recommending solutions for Quality Web Design (QWD). The project was completed in two phases. The first phase of the project specifically identified and defined two potential security weaknesses: software and policy. The...

  • How to Fix Social Security Number

    The social security numbers (SSN) are used to identify participants in the federal government's social security program, which uses public funds to provide retirement and disability benefits for those who those who are currently eligible, same benefits goes to the worker himself and his family. It is the...

  • Management of Security

    Sever security is instrumental in enhancing authentication, authorization, and control of access to the network from a localized point. Therefore, implementation and management of security on windows server 2003 administration is important first because it enables easy and coherent configuring and...