Description
Using the school library, other credible sources and proper APA formatting write 4-6 pages on the following as they relate to physical security.
- Describe the two basic methods of attacking locks.
- Describe the four general categories of manipulation.
- What do you think should dictate the physical nature of a vault?
- Name some advantages and disadvantages of using numbers with significance (such as birthdays, anniversaries, etc.) for lock combination access?
Explanation & Answer
Attached.
Running Head: Physical Security
1
Physical Security
Student Name
Institutional Affiliation
Course Name
Lecturer Name
Due Date
Physical Security
2
1. Question 1 methods of attacking locks.
There are two basic categories that burglars use to attack locks. The first one is attacked
by manipulation which is basically opening the lock through means that do not damage the lock
physically. In the past when locks had been introduced, this form of attack was rare but it has
become one of the most preferred methods by burglars in the recent time. Therefore, many lock
manufacturing companies are doing a lot of research to try and curb lock manipulation as written
by Lemley, R., & Keating, J. (2016).
The other category of attacking lock is forced attack which used brute force and damages
the lock itself. In most cases, it leaves the lock unusable in the future. This is the oldest method
of attacking locks and has persisted to date though most manufacturers of locks are developing
locks that are hard to attack physically every day, the burglars are also finding new ways of
bridging this current locks. Forced lock attackers can use a number of ways to bridge the locks
such as drilling the lock itself to open it which then renders the lock unusable. Others could snap
the lock which commonly affects the cylinder locks it is a method that exploits the weak points
of the cylinders locks.
Question 2 categories of manipulation
(a) Lock Picking
The lock picker manipulates the lock by trying to replicate the key for a particular lock
itself. It could be through the use of master keys for some locks or the use of a tool like wire to
manipulate the...
Review
Review
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Similar Content
Related Tags
50 Shades of Grey
by E. L. James
The Awakening
by Kate Chopin
100 Side Hustles
by Chris Guillebeau
Sounds Like Titanic
by Jessica Chiccehito Hindman
The Color Purple
by Alice Walker
As I Lay Dying
by William Faulkner
Into the Wild
by Jon Krakauer
The Trial
by Franz Kafka
Don Quixote
by Miguel de Cervantes