University of the CumberlandsISOL634-25 Physical Security
Week 7 Assignments
The physical security incident happened in the Chinese Zoo (Qixing Park Zoo) where a 20-year-old student jumped inside a 2-meter barrier ignoring the warning signs. Inside the barrier was a big size Panda. The person when asked why he jumped inside the barrier, he mentioned that he wanted to cuddle the Panda. The student sustained many bites from the Panda and was saved by the worked at the park.
When it comes to security you must always consider the risks (Goodman, 2018). This incident happened in Qixing Park Zoo. The Zoo has considered various threats including the scenario where the Panda might come out and attack the people. The security team never considered the risk of someone either going inside the barrier between the man and the animals. It shows that they have ignored this course of action. It can be considered that this course of action is not really something that can happen often but then I would disagree with this since we never know what can happen. Hence, it is important to consider all the scenarios.
A company needs administrative, technical, and physical control to run their organization smoothly (Shaikh, 2019). Hence considering all the security aspects is a very important element in tightening physical security and not letting any action result in these kinds of situations. There was a great amount of security from the inside It is very important to understand what the desired outcome is required. The purpose that the fence was there is to protect the human from any kind of endanger. Why is the panda locked away? It was locked because to protect both the human and the Panda.
The issue here was that the fence was placed as just a boundary for the animal rather than a protective measure for the safety against the intruder. The fence that they had was brittle one and was just 6.5 feet. Any man or woman who is more than 5 feet can try and jump inside. Hence it is important that they place at least a 10 feet fence which would keep the human from trying to get inside the barrier. I would increase the Inner Perimeter security and the Outer Perimeter security if I was the in charge for security and also make sure the barriers are more than 10 feet of height. Barbed wire is one of the types of fences that involves the use of a steel fencing wire with sharp edges at different intervals (Rogers, 2019). This would be best fence to use in these scenarios because human will not take the risk of jumping or crossing this kind of sharp fence.
Barclays Bank branch was robbed of 1.3 million dollars. 8 people were arrested later for performing this action. It was reported that a days before the incident, a man visited the branch describing that he is an IT guy and he is there to fix computer. He gets access to the Swiss Cottage branch computer and then access the whole network from the branch. He used a KVM switch which will be useful to control all other computers in the network.
It is not common for a bank to usually let unknown people inside without the check of their identity. This shows that the happening of this event was the results of physical security breach. The bank had the bank end computers which was connected to the banks network. The access to the network can be acquired if the intruder gets hold of any computer in the network. Care should be taken when determining individual security needs to integrate physical security standards, but only if the conditions require or permit them (Fennelly and Tyska, 1983). It is important that the computers in the bank branch have enough physical and technical security.
A computer in a network can be an access point and this access point has been controlled in this specific incident. Access operations in cyber-physical system result in diverse impacts on human beings and are perceived with different importance (Lee, Lim and Kim, 2017). The security personnel have been very irresponsible in performing the check of the identity of the intruder. The believed that the guy who came in was to repair the computer and they just let him in. It is a well-planned operation. The intruder was certain that the bank physical security was not strong and can easily be broken.
KVM chips are 20 $ and these are used to get quick access of a network with getting access to a computer in that network. These chips can be accessible to anyone as it is extremely cheap. Hence it is very important for the big companies to know that there may be many threats and that they should have a very strict physical and technical security. Social engineering and physical pen-testing are topics that large organizations, especially in the financial sector, consider when evaluating risk (Rangan, 2019). The Robbery that happened in the bank was the result of poor physical security and not having properly checking the person who was given access inside the bank. If I will be the in charge of the security, I would increase the Interior security, access controls, and the outer perimeter security. There is a necessity to also increase the protocols that the employees follow and also the guest invitation methods. The secured areas must have enough security that it should be very difficult to access. There should be enough knowledge about the security protocols for every employee in the bank. This can be improved with proper training to the security personals and having very strict protocols to follow them.
Goodman, R. (2018, June 04). 7 Biggest Security Fails of All Time. Retrieved June 23, 2019, from
Rogers, R. L. (2019). U.S. Patent Application No. 15/956,948.
Shaikh, H. (2019, March 12). The Importance of Physical Security in the Workplace. Retrieved June 23, 2019, from L. J., & Tyska, L. A. (1983). Physical Security Standards. Museum, Archive, and Library Security, 495-504. doi:10.1016/b978-0-409-95058-8.50023-2
Lee, E., Lim, J., & Kim, J. (2017). Prioritized access control enabling weighted, fine-grained protection in cyber-physical systems. International Journal of Distributed Sensor Networks,13(12), 155014771774890. doi:10.1177/1550147717748908
Ragan, S. (2019, June 24). Gang exploits both physical and system security during bank robbery. Retrieved June 23, 2019, from