Identify key points of security.
Identify key points of security. 9 key points of security minimum of 1 Page.Resources: Read Text book, From Textbook:Nine Points of Security Concern1. General purpose of the building (i.e., residence, classroom, office). Consider the hours of use,people who use the building, people who haveaccess, key control, and maintenance schedule.Who is responsible for maintenance? Is the buildingused for public events? If so, what type andhow often? Is the building normally opened to thepublic? Identify the significant factors and makerecommendations.2. Hazards involving the building or its occupants.List and prioritize (e.g., theft of office equipment,wallet theft, theft from stockrooms). Identifypotential hazards that might exist in the future.3. Police or guard security applications. What canthese guards do to improve the response to thebuilding and occupants from a patrol, investigation,or crime prevention standpoint? Would theapplication of guards be operationally effective orcost-effective?4. Physical recommendations. Inspect doors,windows, lighting, and access points. Recommendphysical changes that would make the buildingmore secure, such as pinning hinges on doors andfences.5. Locks, equipment to be bolted down, potentialapplication of card control and key control. Makespecific recommendations.6. Alarms.Would an alarm system be cost effective?Would the use of the building preclude the use ofan alarm? Are the potential benefits of an alarmsuch that the building use should be changed tofacilitate it? Consider all types of alarms, buildingwideor in specific offices. Consider closedcircuit television and portable or temporary alarmdevices.7. Storage. Does the building have specific storageproblems, such as expensive items that shouldbe given special attention, petty cash, stamps,calculators, microscopes? Make specificrecommendations.8. Trespassing. Are there adequate No Trespassingsigns posted? Are other signs needed?9. Custodians. Can custodians be used in a mannerthat would be better from a security standpoint?