scholarly journals Enhancing building security for embassies along the Maritime Silk Road against terrorist attacks

2019 ◽  
Vol 3 (1) ◽  
pp. 115
Author(s):  
Chun-Lin Liu1 ◽  
Jeslin Quek2

Embassies are important buildings, involving the diplomatic image of a country’s government in another foreign country. Given the rising tensions between countries, either political, economic, religion or war, attacks on embassies have been increasing in recent years. Thus, it is evident that appropriate measures are to be taken to reduce the potential impact of an attack. The paper discusses the measures in enhancing building security of embassies. The principles for Security Planning and Design are discussed, followed by an introduction to a systematic security risk assessment framework. The framework is evaluated regarding the potential security risk posed by an attack against elements of the mega infrastructure using explosives. Further options to increase the security of embassies are also explored to reduce the risk of a potential attack. A security-enhanced building, planned and constructed well to specifications, can provide benefits to the client, including greater cost advantage and increase of value for the structure.

2018 ◽  
Vol 24 (1) ◽  
pp. 739-743 ◽  
Author(s):  
Ganthan Narayana Samy ◽  
Bharanidharan Shanmugam ◽  
Nurazean Maarop ◽  
Pritheega Magalingam ◽  
Sundresan Perumal ◽  
...  

2014 ◽  
Vol 7 (11) ◽  
pp. 2114-2124 ◽  
Author(s):  
Sameer Hasan Albakri ◽  
Bharanidharan Shanmugam ◽  
Ganthan Narayana Samy ◽  
Norbik Bashah Idris ◽  
Azuan Ahmed

2013 ◽  
Vol 756-759 ◽  
pp. 1469-1473
Author(s):  
Hong Chen

Cloud computing has recently gained tremendous momentum because of the potential for significant cost reduction and the increased operating efficiency in computing. However along with these benefits come added security challenges. In this paper, we recommend enterprises assess the security risk of the cloud computing, discuss the standard information security risk assessment method and process and propose an information security risk assessment framework for cloud computing environments.


Sign in / Sign up

Export Citation Format

Share Document