You are on page 1of 3

INTRODUCTION

After an exhaustive physical survey of the ZAWADI APARTMENTS residential area by a team of our
security experts several vulnerabilities were identified in the security systems, measures and
equipment put in place to secure and protect the area. This report will list all vulnerabilities and risks
identified and recommend mitigations and remedial measures to be put in place for a better and
safer working and living environment

The recommendations are made putting the safety of the residents and their properties first
But also considering the entire property/establishment/facilities BUT also considering the cost of
implementation.
ZAWADI APARTMENTS
CURRENT SECURITY FEATURES, VULNERABILITIES, MITIGATION AND RECOMMENDATIONS
ITEM VULNERABILITIES RISK MITIGATION MEASURES RECOMMENDATIONS

PERIMETER 1.no razor wire 1. Criminals 1. Increasing the height Deployment of two
WALL 2.no barbed wire access to the of the wall. additional guards to
3.No electric site. patrol the perimeter
fencing 2.topping the wall with wall and inner
4.not the 2. Wall easily razor wire and electric compound.
recommended scalable hence fencing
height of minimum not functional
height of 9 feet as deterrence.
GUARDS 1. Day shift 2 1. Offenders 1.Deployment of 1. Increasing the
guards. gaining access additional guards in the number of security
2.Night shift 4 to the site day shift to secure the guards for access
guards through the perimeter wall and control, patrolling and
3.canine units 2 unsecured back patrol the compound surveillance in the ratio
4.No back up unit areas. of 4:4 and 2 canine
or means of 2.installation and units.
summoning RFU 2. intruders deployment of
gaining entry surveillance measures 2. An established
under the guise to aid in detection and security service provide
of visitors deterrence with the capacity to
3.Thefts monitor the sight
remotely and send in
4.Burglary the RFU when needed.
SURVEILLANCE 1. No CCTV 1. No detection 1. Installation and 1. A robust cctv
coverage of the of ingress or deployment of Cctv systematic coverage of
establishment. egress through cameras in key areas the entire premises with
2. No visitor unauthorised within the a state of the art control
tracking systems. portals. establishment. room to monitor all
2. Deployment of a activities in the entire
2.Difficulties in robust visitor tracking facility is recommended.
detecting system and software to DITAN SECURITY
crimes before deter intruders and SERVICES 4G network
they occur undesirable visitors. based control room is
ideal for this kind of
3. Difficulties in work.
investigating
incidents once 2. A custom made
they occur due visitor tracking system
to lack of and software for entry
records. and exit is
4. No close recommended.
monitoring of
all activities 3.A security services
routine or non- provider with a team of
routine in the well-trained cctv
establishment. operators/investigators
GATES 1. Single point gate 1. Bottle necks 1. A second point of 1. We recommend the
for ingress and during rush ingress and egress building of a second
egress of the hour. should be built. gate to be used during
facility. emergencies and rush
2.stampede 2.strengthenig/fortifying hours when the two
2. Gate not strong and possible the gates to harden the guards could be
enough to injuries in case facility against hostile overwhelmed by both
withstand a hostile of an attacks vehicle and human
vehicle assault. emergency traffic.
3.not enough evacuation
personnel at the 2. The recommended
gate 3.Facility open gates to be made of
to a hostile hardened heavy gauge
vehicle attack steel and designed for
hostile vehicle
4. Guards at mitigation.
the gate
overwhelmed 3. Deployment of a
by the volume further two more
of work and guards to man the gates
getting sloppy efficiently and
and negligent. effectively.
Access control 1. Vehicle pass 1.Duplication 1. Introduction of a 1. We recommend the
does not have and vehicle pass with built in rolling out of the DITAN
security features. counterfeiting security features to SECURITY SERVICES
2. No gate passes Of the existing grant access to security featured access
for contractors. pass system to residents and identify control passes for all
3.No visitor gate aid in criminal non-resident vehicles. resident cars,
passes entry. contractors and support
4. No proper 2. Criminals 2. Introduction of a Personnel.
vehicle/personnel posing as contractor pass with 3. We recommend
searches at the contractors built in security features DITAN SECURITY
gate. accessing the to keep out intruders SERVICES expert trained
5.Poor facility. posing as contractors. and network monitored
documentation 3. Intruders guarding systems,
6.No visitor posing as 3. Well trained search techniques and
escort/monitoring visitors. guards/guardettes to do documentation systems
4. Risk of searches at the gates to cover this vital aspect
unauthorised and utilising search of the facility’s security.
items being tools like bell scope
smuggled in mirrors and metal
and out of the detectors.
facility.
Based on the above data DITAN SECURITY SERVICES experts developed a threat assessment matrix
that can be used to determine the type of security required at ZAWADI APARTMENTS.
THREAT/HAZARD SEVERITY PROBABILITY RISK
10=most serious 10=most likely Severity X
1=least serious 1=least likely probability
INTRUSION 5 8 40
PROPERTY THEFT 8 8 64
VANDALISM 6 7 42
BURGLARY 7 7 49
TRESPASS 5 9 45
ATTACKS 9 2 18

PROBALITY of an event is derived from available security data from the facility, police records and
locale history.

SEVERITY is derived from the impact a particular event would have on an individual or the facility.

RISK is determined by multiplying the ratio of severity by that of probability.

CONCLUSION

The vulnerabilities identified in the perimeter wall, Guarding systems, surveillance systems, gates
and access control systems make the ratios for the probability of intrusion, property theft,
vandalism, burglary and trespass very high and urgent remedial measures are called for to mitigate
these vulnerabilities. DITAN SECURITY SERVICES have the right personnel and tech support to
undertake and put in places all recommended systems and hardware.

Compiled by:

For: DITAN SECURITY SERVICES

You might also like