MAY 2015 SEMESTER
SUBJECT CODE : COP612
SUBJECT TITLE : OPERATIONS & PHYSICAL SECURITY
LEVEL : MASTER DEGREE
STUDENT’S NAME : UTHAYAKUMAR KRISHNAN
MATRIC NO. : C60405140003
PROGRAMME
: MICTM
ACADEMIC FACILITATOR : DR SUNDRESAN PERUMAL
LEARNING CENTRE : KUALA LUMPUR
INSTRUCTIONS TO STUDENTS
1) This assignment consists of THREE (3) questions. Answer ALL questions.
2) Plagiarism in all forms is forbidden. Students who submit plagiarised assignment will be penalised.
3) Your assignment will be examined based on the followings criteria:
a) a complete working solution.
b) ability of using methods available in the learning materials.
4) Plagiarism in all forms is forbidden. Students who submit plagiarised assignment …show more content…
By having external security cameras, any suspicious movement can be easily detected by a guard from security room via monitoring screen.
High exterior fence (in some cases with barbed wire or broken bottle pieces) could scares away most of the intruders whom looking for an easy access rather than the hardest way. And the intruder definitely not able to bypass the guard controlled alarmed door without a proper key (access card or set of password combination)
If an intruder manage to bypass all above, he or she, still face other difficulties to access AOR as the outside areas are equipped with motion sensor devices to monitor unauthorized movement as well as fitted with cameras to monitor. Unobstructed low cut area will give a clear vision of any movement.
The exterior wall again protected with the guard controlled alarmed door and the specific AOR area again protected by another guard controlled alarmed door. Besides, additional cameras and security guards could be posted just outside of the AOR room to prevent a final intrusion or monitor individual who gain access to the AOR …show more content…
Thus, any system with minimal maintenance could warrant less cost to maintain the system and must be easy to bring up the system back to operation in such any downtime due to hardware or system to minimize the impact.
4) Ability to work with other / complementary technologies
The intrusion detecting system must be able to work with other systems such as alarm trigger system, PA system, system to send a SMS notification to mobile devices, connect with a law enforcement system to notify any intrusion, CCTV system and so on.
c) Assuming you would use biometric authentication as a mean of physical access control to data center, suggest a proper biometrics that is widely accepted and convince your manager by stating THREE (3) main advantages of biometrics.
[20 marks]
Answer
Finger Print is widely acceptable and suitable for building entrance. The advantages in using finger print as a biometric authentication are as follows:
1) Very High Accuracy
It is a known factor that every individual has a unique finger print even in twins. In such the accuracy is very high and others can’t manipulate finger prints easily to gain