Introduction to Security

Download Report

Transcript Introduction to Security

Introduction to Security
Chapter 6
Enhancing Security through Physical
Controls
1
Crime Prevention Through
Environmental Design (CPTED)


Began in the early 1960s
A fundamental concept in security
design that is based on the premise
that effective use and manipulation
of the physical environment can
reduce criminal behavior
2
Crime Prevention Through
Environmental Design (CPTED)
4 Key Strategies:
1. Territoriality
2. Natural Surveillance
3. Activity Support
4. Access Control
3
Crime Prevention Through
Environmental Design (CPTED)
1. Territoriality:
Most people tend to protect area
that they feel is their own, and
have a certain amount of respect
for other’s. Fences, pavement
treatments, signs and landscaping
all help to express ownership.
4
Crime Prevention Through
Environmental Design (CPTED)
2. Natural Surveillance
-This is almost entirely based off of
the fact that criminals do not want
to be seen.
- place physical activities, features
and people in a way that they can
be observed
- remove trees, sheds, bushes and
other sight obstructions
5
Crime Prevention Through
Environmental Design (CPTED)
3. Activity Support
- encourage legitimate activity in
public spaces
- any activity that gets people out
and interacting helps to discourage
crime
- basketball courts in parks,
neighborhood parties, etc.
6
Crime Prevention Through
Environmental Design (CPTED)
4. Access Control
- properly located entrances/exits
- fencing
- lighting
- receptionist at a front desk
- a neighbor sitting on their front
porch
7
An Overview of Physical Controls
Concentric Zone Theory – based on
the premise that the more valuable
an asset is, the more protection it
needs
8
Concentric Zone Theory
9
An Overview of Physical Controls
3 Basic Lines of Physical Defense:
1. The perimeter of the facility
2. The building exterior
3. The interior
10
Basic Security Equipment
A. Locks
- key, key card or smart card
operated
– first used in Egypt over 4,000
years ago
- remains one of the oldest, most
commonly used methods of access
control
11
Basic Security Equipment
B. Biometrics
- the science of using individual
physiological features or behavioral
characteristics to positively identify
a person
Examples: fingerprint, iris/retinal
scans, hand geometry, voice, et al.
12
Basic Security Equipment
C. Lighting
- intruders want darkness to cover
their actions
- 3 out of 4 commercial burglaries
are committed within buildings with
little or no light
13
Basic Security Equipment
C. Lighting
4 types:
1. Continuous
2. Standby
3. Moveable
4. Emergency
14
Basic Security Equipment
D. Alarms
- date back to 390 BC when geese
were used
- many federally insured institutions
are required to use them
- some insurance companies offer
discounts for alarm installation/use
15
Basic Security Equipment
D. Alarm uses:






Burglar
Fire
Temperature
Humidity
Water flow
Electrical power
16
Basic Security Equipment
D. Alarm system types:




Local – sound on the premises only
Proprietary – a constantly-manned
alarm panel operated by the owner
Central Station – similar to proprietary,
except usually operated off premises by
an alarm company
Police Connected – the alarm is
directed via phone lines to the nearest
police dept.
17
Basic Security Equipment
D. Alarms – False Alarms


More than 90% of all intrusion alarms
are false alarms, resulting in needless
expense and risks on the part of
responders.
Because of the high number of false
alarms, many cities prohibit alarms
connected directly to the police
department.
18
Basic Security Equipment
E. Closed Circuit Television (CCTV)


A generic term, generally meaning a
system in which a number of video
cameras are connected in a closed
circuit or loop, where the images are
sent to a central television monitor or
recorded.
CCTV systems range from basic system
to very complicated networks.
19
Basic Security Equipment
E. Closed Circuit Television (CCTV)

Cameras may be overt or covert, or
semi-covert.
Overt – out in the open
 Covert – hidden
 Semi- Covert – cameras are in public view
but behind a one-way transparent
covering.

20
Basic Security Equipment
E. CCTV other technology:
Internet Protocol Video (IP)


Video can be sent across a company’s
data network so that it can be viewed
wherever the company chooses.
These can cause bandwidth and digital
storage issues for a company’s
network.
21
Basic Security Equipment
E. CCTV other technology:
Night Cameras – most popular kind
use image intensification that
amplifies available visible and nearinfrared light to achieve better vision
Thermal Imaging – operates on the
principle that all objects emit infrared
energy that can be seen using a
thermal imager
22
Privacy concerns…


There is concern over the amount
of, or rather lack of, privacy by
private, non-criminal citizens
through the extensive use of
surveillance methods.
Some cities are passing legislation
to govern these types of devices
and their use.
23
Facility Physical
Defense Guidelines
24
The Perimeter

The perimeter can be controlled
by a variety of ways:
A. Fences – 2 basic types
Ornamental
Chain Link – effectiveness can be
increased by adding razor wire,
barbed wire, etc.
25
The Perimeter

The perimeter can be controlled
by a variety of ways:
B. Alarms
C. Perimeter Lighting




Floodlights
Street lights
Fresnal units
Searchlights
26
The Perimeter

The perimeter can be controlled
by a variety of ways:
D. Surveillance Cameras
E. Vehicle Barriers


Active – require some action by a person
or equipment to be raised into place
Passive – a fixed device with no moving
parts, such as guard rails, concrete poles,
etc.
27
The Perimeter

The perimeter can be controlled
by a variety of ways:
F. Patrols


Security Officers
Patrol or Guard Dog units – roam alone
inside a perimeter or building to deter
intruders
28
The Perimeter

The perimeter can be controlled
by a variety of ways:
G. Signs
H. Physical Layout – When
possible, we should always try to
maintain a clear zone of 20 feet on
either side of the perimeter
29
The Building Exterior


For some facilities, the exterior is
the first line of defense.
Keys for effective security:






Strong, locked doors
Limited number of entrances
Secured openings (>96 sq. inches)
Alarms
Surveillance
Lighting
30
The Building Interior


Internal physical controls are
usually required along with external
controls.
Secure areas should be separated
from non-secure areas if possible.
31
The Building Interior
Safeguards:








Locks
Alarms
Mirrors
Document shredders
Vaults/ safes
Bolt down large, moveable equipment
Lock down devices on office equipment
Surveillance systems
32
The Building Interior
The Command Center




Should be linked to the security control
center
Should be in a tightly controlled area
Can also monitor access
Increasingly, staff members of the
command center can also handle
computer network issues if need be.
33
The Physical Security System


The goal is to provide the amount of
security needed - neither too much
nor too little.
This is a balancing act between
aesthetic, operational, safety and
security needs.
34
The Physical Security System

Physical security footprint – the
mark left during or after a security
action that the public sees and lets
them know security is present.
35