Identify key points of security.
9 key points of security minimum of 1 Page.
Resources: Read Text book,
From Textbook:
Nine Points of Security Concern
1. General purpose of the building (i.e., residence, classroom, office). Consider the hours of use,
people who use the building, people who have
access, key control, and maintenance schedule.
Who is responsible for maintenance? Is the building
used for public events? If so, what type and
how often? Is the building normally opened to the
public? Identify the significant factors and make
recommendations.
2. Hazards involving the building or its occupants.
List and prioritize (e.g., theft of office equipment,
wallet theft, theft from stockrooms). Identify
potential hazards that might exist in the future.
3. Police or guard security applications. What can
these guards do to improve the response to the
building and occupants from a patrol, investigation,
or crime prevention standpoint? Would the
application of guards be operationally effective or
cost-effective?
4. Physical recommendations. Inspect doors,
windows, lighting, and access points. Recommend
physical changes that would make the building
more secure, such as pinning hinges on doors and
fences.
5. Locks, equipment to be bolted down, potential
application of card control and key control. Make
specific recommendations.
6. Alarms.Would an alarm system be cost effective?
Would the use of the building preclude the use of
an alarm? Are the potential benefits of an alarm
such that the building use should be changed to
facilitate it? Consider all types of alarms, buildingwide
or in specific offices. Consider closedcircuit television and portable or temporary alarm
devices.
7. Storage. Does the building have specific storage
problems, such as expensive items that should
be given special attention, petty cash, stamps,
calculators, microscopes? Make specific
recommendations.
8. Trespassing. Are there adequate “No Trespassing”
signs posted? Are other signs needed?
9. Custodians. Can custodians be used in a manner
that would be better from a security standpoint?