Defensible Space and Layered Defense (Research Paper Sample)
Instructions
Choose a topic of your choice that relates to the materials covered during the first four weeks of the course, examine it in detail though the eyes of a physical security analyst / manager, and write a short research paper on it. This is your opportunity to explore in-depth a topic that you have a greater interest in than what we covered during the course.
Technical Requirements:
Your paper must be at a minimum of 5-7 pages (Title and Reference pages do not count towards the minimum limit).
Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content. Scholarly sources include peer reviewed articles, government publications, and academic texts.
Type in Times New Roman, 12 point and double space.
Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework.
Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
All submissions will be graded using the assignment rubric.
Defensible Space and Layered Defense
Student’s Name
Institutional Affiliation
Course
Professor’s Name
Due Date
Defensible Space with Layered Defense
Abstract
The research is about defensible space and layered defense. Besides, many individuals prefer to use layered defense and defensible space for physical security purposes. All secure structures and layered structures have a common goal of protecting residents or organizations. The systems help individuals be safe and keep intruders from their properties. Defensible spaces depend on self-help and resident participation to decrease crime. Therefore, secure space structures do not rely on government support.
On the other hand, layered security defends systems from broad attacks. The system tries to deal with diverse cyber-attacks, hacking, viruses, and further indirect or passive system invasions. The layered security aimed at protecting also involves security rules at the structure where security personnel can focus on data online and offline. Besides, different security methods are required to be used to provide security. However, layered defense and defensible space play an important role in defending properties and defensible space, and layered defense aids in identifying and preventing crimes from happening.
Introduction
In physical security, both layered defense and defensible space approaches ensure that everything is well-protected. For physical security, one can use these defense techniques to protect properties. Most structures use both secure and layered methods to keep away intruders. Moreover, all people need physical security in all areas to feel safe and happy. A layered defense ensures that an organization is safe, whether offline or online. In addition to that, layered defense is a technique that aims to protect networks from invaders or imposters. In physical security, both secure and layered defense methods ensure everyone is well protected. Living in an area without complete safety can produce many exciting situations since security is vital in today's life. On the other hand, a defensible space makes sure that an area is safe and free from crime. This research aims to explain more about secure space and layered defense.
Defensible Space
Defensible spaces are places such as a park, neighborhood, or office with structures that show possession and afford easier and regular inspection. People place the designs of secure spaces to prevent crime (Ackley, 2020). Nevertheless, the defensible space structures permit dwellers to create control over their community and private property and also avoid any criminal actions. Defensible spaces depend on self-help and resident participation to decrease crime. Therefore, secure space structures do not rely on government support.
Purpose of Defensible Spaces
Creating defensible spaces offers a roof to those individuals traveling and staying in small places with no safety and a government foundation (Bahrani et al., 2018). The other reason is to offer security to all those individuals staying in the spaces. The borders allow kids to play freely without any disturbance from outsiders. Furthermore, living in an area without complete security can create many challenging situations because security is vital in life. Besides, the spaces are not social class-based or religion-based, and any person is free to live in such areas.
Importance of Defensible Spaces
The defensible spaces promote better relations among communities. These spaces also offer complete time security for those living in the area and cannot be harmed by intruders. Besides, the owners design the sites securely to bring some small groups of people overall into one place. Also, the people in these areas typically carry out traditional activities that create good friendships between the individuals staying in the area (Hess & Mandhan, 2022). Therefore enables the operation of the security system effectively as everyone understands other individuals' complex and supports the adjustment. The area is safe and pure guarantees the security of the kids and grownups living there.
Key Features of Defensible Spaces
Defensible spaces consist of critical features. These features include surveillance, symbolic barriers, and territoriality (Crippen, 2021).
Territoriality Features
It is the act of establishing a noticeably definite space of possession. Besides, some of the territorial structures are gates and community markers that encourage a community to recognize and spot the communal area of its inhabitants (Sundoko et al., 2018). According to Goyal and Jha, noticeable boundaries such as fences, hedges, and walls make private plots and privatization of community amenities so that inhabitants can take greater individual accountability and possession. Therefore, these territorial features allocate the safeguarding obligation of an area to inhabitants and converse to strangers that the site is owned and secured.
Surveillance Features
It is the act of checking and monitoring surroundings during ordinary daily doings. Some of the used surveillance structures are mailboxes situated in open, well-trafficked places, windows and doors, casual surveillance, playgrounds, good courtyards, and walkways which raise pedestrian activities (Lee, Ma & Li, 2022). These structures make it hard for individuals to indulge in unseen activities.
Symbolic Barriers Features
These are objects positioned in the setting to observe that an individual's area is taken care of and worthy of protection. Some of the symbolic barriers are swings, flowers, picnic tables, and yard furniture. Nevertheless, these barriers are any symbol that communicates that the assets' possessor is dynamically involved in using and preserving the assets. One can use the symbolic obstacles to show the activity done in the area and its usage. When designing offices, residences, business facilities, and communities, one needs to use defensible space structures to prevent crimes (Lees & Warwick, 2022). Furthermore, the territories are marked to show possession and accountability, upsurge opportunities for surveillance, decrease ecological components that permit concealment, and decrease unassigned open spaces and amenities.
Layered Defense
Layered defense is a model that aims to protect networks from invaders or imposters. Besides, when using a layered approach, one can mitigate all attacks as they happen at all levels. However, the model's design is good so that if one technique fails to protect, the other is ready to replace it (Lehr, 2019). Besides, the use of the layered defense depends on the company's wants in terms of cost and security levels. Also, the design of all the security network approaches is in good shape to bestow the company's security guidelines.
The Layers of Layered Defense
The definition of the layered defense method relies upon its layers. The layers are as follows: The first layer is the perimeter defense, which comprises conventional techniques like firewalls and network checking software (Polyantseva, 2019). A firewall is the security protector that controls the network's access points by inspecting all entering and outgoing packages. However, different guidelines need to be defined by the institute to assist in designing the firewall appropriately.
The second layer is the network defense. It uses network checking, attendant endpoint defense, and repairing. More importantly, these systems can sense likely threats by collecting information from diverse network sources. For instance, most information runs to the cooperated gadget when the invader makes a port redirection threat. The third layer is the host defense or endpoint defense. The host defense consists of mobile phones, laptops, and desktops (Price et al., 2021). The system protects customer data by regulating security conformations. Moreover, other measures such as shutting down unused or complicated disk encoding ports can also be helpful. These layers guard hosts from external threats, and the anti-viruses shareware shields the gadget from malevolent shareware.
The fourth layer is the application defense. Numerous threats aim at the applications, particularly those that pass on the server. Besides, these threats can be password predicting threats and poorly aligned network applications that show information to unsanctioned consumers. The model uses various tools and way out to guard applications from intruders.
On the other hand, the fifth layer is the data defense that targets the security system. The system monitors access to records and files by using access regulator lists and some encoding techniques to protect data. Data backup or restoring can hinder data loss by using an external hard disk. Nonetheless, to protect data from being stolen, external hard disks can also be used to preserve data instead of using a laptop or desktop.
It is vital to have robust security guidelines to create a protected network. The essential step in security guidelines is to notify the network handlers of guarding data and technology properties (Valachovic, Quarles & Swain, 2021). Similarly, separating workers among network managers and operators can aid in defending the network through the description of restricted access. Moreover, putting passwords for definite devices, data or applications can successfully safeguard the information from authorized access.
However, a layered defense has to give enough and god security at all levels. These levels are network, system, communication, and application-level guarantees. The use of layered defense preven...
Other Topics:
- Things I Learned from 'Seven Skills Human Services Students Need to Know'Description: The seven skills elaborate on the critical learning skills students need to succeed. The competencies range from typing to proofreading research papers. My level of mastery for each of them is excellent as I have mastered most of these skills over the years. For instance, my typing speed is 45 words per minute...1 page/≈550 words| 2 Sources | APA | Social Sciences | Research Paper |
- Stalin and the Great Purge (Great Terror) ThesisDescription: The Great Purge, also referred to as the Great Terror, was a political campaign that was mostly regarded as cold-blooded and led by Joseph Stalin, whom many historians considered a dictator. Stalin's main objective was to eradicate those opposing the communist Party and everyone who seemed a threat to him. ...1 page/≈275 words| 10 Sources | APA | Social Sciences | Research Paper |
- The Impact of Social Media and Music on Our SocietyDescription: Purposes and Rationale of the Proposed Group The influence of social media in adolescents has significant involvement in their relationships, behaviors, and even health. The group's purpose will enable young teenagers to learn how to embrace social media ardently because it portrays their space as more ...3 pages/≈825 words| 3 Sources | APA | Social Sciences | Research Paper |