Assignment

User Generated

Rzvylcebsrffbe

Writing

Description

1. Describe how the "concentric ring" theory of physical security, also known as defense-in-depth, is applied at your facility or a facility you are familiar with. (750 words)

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

attached

Surname 1
Name
Institution
Instructor
Date
“Concentric Ring” theory of Physical Security
The concentric theory of physical security involves the use of multiple layers of security that will
see the intruder delaying before accessing the area. There are many techniques that companies
have been using to implement the concentric ring theory as long as it serves their purpose. The
theory mostly concentrates on avoiding placing the full reliance on one layer but spreading it to
several of them. The layers will, therefore, require an intruder to penetrate a series of layers
before reaching his goal (Zeng, n.p). The more layers that the company will employ the more the
security they will get. The theory of an intruder is to get faster access to his goal within the
shortest time possible. The concentric layer uses the same theory but this time to increase the
time and the rate at which the intruder will reach the target. The different layers will have
different authorization to the people who can access them. For e...


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Related Tags