Introduction to Security

35
Introduction to Security Chapter 6 Enhancing Security through Physical Controls

description

Introduction to Security. Chapter 6 Enhancing Security through Physical Controls. Crime Prevention Through Environmental Design (CPTED). Began in the early 1960s - PowerPoint PPT Presentation

Transcript of Introduction to Security

Introduction to Security

1Introduction to SecurityChapter 6Enhancing Security through Physical Controls

2Crime Prevention Through Environmental Design (CPTED)Began in the early 1960sA fundamental concept in security design that is based on the premise that effective use and manipulation of the physical environment can reduce criminal behavior

3Crime Prevention Through Environmental Design (CPTED)4 Key Strategies:1. Territoriality2. Natural Surveillance3. Activity Support4. Access Control

4Crime Prevention Through Environmental Design (CPTED)1. Territoriality:Most people tend to protect area that they feel is their own, and have a certain amount of respect for others. Fences, pavement treatments, signs and landscaping all help to express ownership.

5Crime Prevention Through Environmental Design (CPTED)2. Natural Surveillance-This is almost entirely based off of the fact that criminals do not want to be seen.- place physical activities, features and people in a way that they can be observed- remove trees, sheds, bushes and other sight obstructions

6Crime Prevention Through Environmental Design (CPTED)3. Activity Support- encourage legitimate activity in public spaces- any activity that gets people out and interacting helps to discourage crime- basketball courts in parks, neighborhood parties, etc.

7Crime Prevention Through Environmental Design (CPTED)4. Access Control- properly located entrances/exits- fencing- lighting- receptionist at a front desk- a neighbor sitting on their front porch

8An Overview of Physical ControlsConcentric Zone Theory based on the premise that the more valuable an asset is, the more protection it needs

9

Concentric Zone Theory

10An Overview of Physical Controls3 Basic Lines of Physical Defense:1. The perimeter of the facility2. The building exterior3. The interior

11Basic Security EquipmentA. Locks - key, key card or smart card operated first used in Egypt over 4,000 years ago- remains one of the oldest, most commonly used methods of access control

12Basic Security EquipmentB. Biometrics- the science of using individual physiological features or behavioral characteristics to positively identify a person

Examples: fingerprint, iris/retinal scans, hand geometry, voice, et al.

13Basic Security EquipmentC. Lighting- intruders want darkness to cover their actions- 3 out of 4 commercial burglaries are committed within buildings with little or no light

14Basic Security EquipmentC. Lighting4 types:1. Continuous2. Standby3. Moveable4. Emergency

15Basic Security EquipmentD. Alarms- date back to 390 BC when geese were used - many federally insured institutions are required to use them- some insurance companies offer discounts for alarm installation/use

16Basic Security EquipmentD. Alarm uses:BurglarFireTemperatureHumidityWater flowElectrical power

17Basic Security EquipmentD. Alarm system types:Local sound on the premises onlyProprietary a constantly-manned alarm panel operated by the ownerCentral Station similar to proprietary, except usually operated off premises by an alarm companyPolice Connected the alarm is directed via phone lines to the nearest police dept.

18Basic Security EquipmentD. Alarms False AlarmsMore than 90% of all intrusion alarms are false alarms, resulting in needless expense and risks on the part of responders.Because of the high number of false alarms, many cities prohibit alarms connected directly to the police department.

19Basic Security EquipmentE. Closed Circuit Television (CCTV)A generic term, generally meaning a system in which a number of video cameras are connected in a closed circuit or loop, where the images are sent to a central television monitor or recorded.CCTV systems range from basic system to very complicated networks.

20Basic Security EquipmentE. Closed Circuit Television (CCTV)Cameras may be overt or covert, or semi-covert.Overt out in the openCovert hiddenSemi- Covert cameras are in public view but behind a one-way transparent covering.

21Basic Security EquipmentE. CCTV other technology: Internet Protocol Video (IP)Video can be sent across a companys data network so that it can be viewed wherever the company chooses.These can cause bandwidth and digital storage issues for a companys network.

22Basic Security EquipmentE. CCTV other technology: Night Cameras most popular kind use image intensification that amplifies available visible and near-infrared light to achieve better visionThermal Imaging operates on the principle that all objects emit infrared energy that can be seen using a thermal imager

23Privacy concernsThere is concern over the amount of, or rather lack of, privacy by private, non-criminal citizens through the extensive use of surveillance methods.Some cities are passing legislation to govern these types of devices and their use.

24Facility Physical Defense Guidelines

25The PerimeterThe perimeter can be controlled by a variety of ways:A. Fences 2 basic typesOrnamentalChain Link effectiveness can be increased by adding razor wire, barbed wire, etc.

26The PerimeterThe perimeter can be controlled by a variety of ways:B. AlarmsC. Perimeter LightingFloodlightsStreet lightsFresnal unitsSearchlights

27The PerimeterThe perimeter can be controlled by a variety of ways:D. Surveillance CamerasE. Vehicle BarriersActive require some action by a person or equipment to be raised into placePassive a fixed device with no moving parts, such as guard rails, concrete poles, etc.

28The PerimeterThe perimeter can be controlled by a variety of ways:F. PatrolsSecurity OfficersPatrol or Guard Dog units roam alone inside a perimeter or building to deter intruders

29The PerimeterThe perimeter can be controlled by a variety of ways:G. SignsH. Physical Layout When possible, we should always try to maintain a clear zone of 20 feet on either side of the perimeter

30The Building ExteriorFor some facilities, the exterior is the first line of defense.Keys for effective security:Strong, locked doorsLimited number of entrancesSecured openings (>96 sq. inches)AlarmsSurveillanceLighting

31The Building InteriorInternal physical controls are usually required along with external controls.Secure areas should be separated from non-secure areas if possible.

32The Building InteriorSafeguards:LocksAlarmsMirrorsDocument shreddersVaults/ safesBolt down large, moveable equipmentLock down devices on office equipmentSurveillance systems

33The Building InteriorThe Command CenterShould be linked to the security control centerShould be in a tightly controlled areaCan also monitor accessIncreasingly, staff members of the command center can also handle computer network issues if need be.

34The Physical Security SystemThe goal is to provide the amount of security needed - neither too much nor too little.This is a balancing act between aesthetic, operational, safety and security needs.

35The Physical Security SystemPhysical security footprint the mark left during or after a security action that the public sees and lets them know security is present.