("The rise of physical security information management", 2007) The traditional physical security systems such as human surveillance and locks and boundaries are being integrated with the modern IT systems. The modern IT physical security measures such as video surveillance/ closed circuit TV, token based access control systems are becoming much more popular and even small businesses are using these systems.
The present research paper deals with some of the traditional physical security system such as building and ground security, access control system and perimeter security. The principles behind these security systems have also been discussed. Some of the possible future physical securities systems have also been covered up.
The principle of the building and ground security is to stop the intruder from entering the ground or building area where the intruder can take away or damage the valuables. By the available means, we have to stop the intruder outside the ground or building and at the same time the authorized person or employee should not be de-motivated by the procedure.
The traditional method of protecting a building and ground varies and mainly depends on the location of property, its construction and contents inside it, and the crime risk in that particular area and the best physical protection method should be addressed during its construction. ("Business Crime - Building security", 2007) The intruders can gain access of the contents of the building through various areas and a well-designed and foolproof construction is best protection method.
Further in addition to the strong building walls, doors and windows, we must also ensure that we use the best quality of locks. Digital and electronics locks are more appropriate, but door codes should be frequently changed so that these are not easily available to the intruders. The intrusion alarm system is one of the best solutions that many of the educational institutes now have to protect the building and grounds. ("Neola-Tools for schools", 2007)
Access control systems:
The access controls are now becoming very popular and many commercial organizations are adopting this advance physical security technique. Its principle is simple. An identification of an employee such as fingerprint is registered within a network and after confirming the identity from the electronic network the employee is allowed otherwise denied. So, the terminal or gate will open only when the identity of the person is confirmed by network.
In actual these access control systems are similar to automated capture and access systems that have been used for meetings (Moran, Palen, Harrison, Chiu, Kimber, Minneman, van Melle and Zellweger, 1997). The access control systems were also been used for personal memory aid tools since long time (Hayes, Patel, Truong, Iachello, Kientz, Farmer and Abowd, 2004). The advantage of these access control system is that a trespasser cannot enter inside the premises, however the main disadvantage being that even a minor change in the physical feature such as fingerprint will deny the entry of the genuine employee or the visitor.
The basic principle behind a perimeter security is that any trespassers