Physical Security is the protection of personnel,
materials, hardware/software/network from adverse
physical actions and events that could cause serious
loss or damage to an enterprise, agency, facility or
institution.
Physical Security planning needs to address how teams
will respond to different threats and emergencies and
how to handle visitors, Partners, vendors and contractors so as
to ensure that physical security policies are not
violated.
Safe keeping of cash, sensitive documents, plans,
maps/drawings explosives, highly inflammable gases,
petroleum products, radioactive materials, arms and
ammunitions (if any) etc is to be ensured.
Security of high valued personnel in the management
like CEOs, Heads of HR, Security and R & D is to be
considered.
Physical Security of Power and Water Supply,
Transportation and Sewage Systems and Residential
Colonies is to be given due importance.
IT and Cyber Security.
IT and Cyber Security is the protection of personnel,
hardware, software, networks and data from
physical actions and events that could cause serious
loss or damage to an enterprise, agency or
institution. Both fields have specialised roles and
responsibilities. The personnel working in IT or cyber
security will be responsible for the protection of
people and information from electronic/cyber-
attacks.
Physical and Cyber Security are not to be seen in
isolation of each other. Both are intertwined and
need to be comprehensively dealt with in view of
dynamic nature of threats, including the insider
threats from employees, ex-employees, vendors,
valued partners, visitors etc which is often not given
due importance in India.
CCTV Security
CCTV is designed to help protect and detect crime. It
can reassure the management and the public about
security and safety besides providing evidence to
relevant enforcement agencies. Smart CCTV senhances the security but its
Wi-Fi facilitation and
remote control can lead to its vulnerability and
threat to its security system.
Banks and ATM Security
The physical security of the banks and ATMs is
gaining rapid importance as criminals have become
more brazen in their attempts to steal or in
some cases the entire machine itself. The increasing
deployment of off-site ATMs in less secured locations
has facilitated an increase in thefts and vandalism.
The stories of ATMs being dragged out of ATM
rooms are not uncommon and cash vans are often looted.
Security Control Room (SCR) and Visitors
Management System (VMS), Mock Drills, up-
gradation of Security Architecture etc.
SCR plays an important part in the implementation of
Standard Operating Procedures (SOPs) laid down in
the Security Architecture. SCR helps in collection,
collation, analysis, prevention and mitigation of
security related issues, post-incident and in analysis and
also investigation of Security Agencies and Police.
Mock Drills, which are seldom held, are necessary to
enhance the performance of security personnel,
assess the Response Mechanism/QRT and Crisis
Management System.
Security Architecture needs periodic up-gradation with changing threats.
Security of multi storey Complexes,
Warehouses, Hotels, Hospitals, Malls and
Multiplexes.
Increasingly offices, institutes, hospitals, hotels,
warehouses and malls are being housed in multiplexes
which require a special security and safety system of
the entrance and exit, floors, lobbies, parking places
etc unlike traditional facilities. If the facility has more
than one owner or user its security becomes more
complex, challenging and difficult for implementation
and access control becomes very vital.
New Technologies: Artificial Intelligence (AI)
and Biometric Recognition.
Technology is double edged and hence is exploited
by the vested and inimical forces to disrupt the
operations. AI, Biometric Recognition, Unmanned
Aerial Vehicles (UAVs), Drones etc can be misused
thereby adding to security challenges. Coordinated
efforts of the sovereign forces/agencies with the
public and private entities will be required to
neutralise the threats engineered by adversarial
state and non-state actors exploiting such
technology.