Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security...
-
Upload
milo-moody -
Category
Documents
-
view
218 -
download
0
Transcript of Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security...
![Page 1: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/1.jpg)
Security of Magazines
SU03 Slide 1
![Page 2: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/2.jpg)
Why Security?
Risk Assessment process Physical security systems built in Perimeter security Access controlled at all times Authorised personnel only Trusted, security cleared staff Accompany temporary staff
SU03 Slide 2
![Page 3: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/3.jpg)
Security Risk Assessment
Financial value of the contents in a facility Active hazards and frequency
• (eg leakages through espionage, theft or diversion)
Passive hazards and frequency • (eg floods, earthquakes, fires, etc)
Attractiveness indicators for active hazards Vulnerability to espionage, theft or diversion Vulnerability to sabotage or terrorist attack
SU03 Slide 3
![Page 4: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/4.jpg)
Attractive to Criminal and Terrorist Organisations (ACTO)
ACTO Item Potential Terrorist Use
MANPADS - Attacks on civil aviation
Detonators - Initiation of Improvised Explosive Devices (IEDs) - Usually strictly controlled on civilian explosives market
Bulk Explosive - Used as main charge for IEDs - More powerful than home-made or commercial explosives
Man-Portable Anti-Tank Missiles - Attacks on VIP vehicles
Hand Grenades - Concealable weapon that can be used in confined spaces
Small Arms Ammunition - Close quarter assassinations
SU03 Slide 4
![Page 5: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/5.jpg)
Security Plan
SU03 Slide 5
![Page 6: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/6.jpg)
Access Control
Keys
Combination Locks
Entry into storage areas
SU03 Slide 6
![Page 7: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/7.jpg)
Keys
SU03 Slide 7
![Page 8: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/8.jpg)
Combination Locks
SU03 Slide 8
![Page 9: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/9.jpg)
Entry
SU03 Slide 9
![Page 10: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/10.jpg)
Locks, Doors, Windows and Grills
SU03 Slide 10
![Page 11: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/11.jpg)
Locks, Doors, Windows and Grills
SU03 Slide 11
![Page 12: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/12.jpg)
Locks, Doors, Windows and Grills
SU03 Slide 12
![Page 13: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/13.jpg)
Staff Vetting
Attributes of Staff:
• Not have criminal convictions and be unlikely to possess criminal tendencies
• Be trained effectively
• Be likely to remain loyal, well motivated and appropriately rewarded
SU03 Slide 13
![Page 14: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/14.jpg)
Staff Vetting
Elements of Vetting:
• Confirming an individual’s identity
• Looking at associations that may cause a conflict of interest
• Determining vulnerabilities in an individual’s life through which improper pressure could be applied
SU03 Slide 14
![Page 15: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/15.jpg)
Diversion Risk
SU03 Slide 15
![Page 16: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/16.jpg)
Worked Example
Remember – we are trying to reduce risk
to tolerable and ALARP
StartStart
Definition of intended use and reasonably
foreseen misuse
Definition of intended use and reasonably
foreseen misuse
Hazard IdentificationHazard Identification
Risk EstimationRisk Estimation
Risk EvaluationRisk Evaluation
Is tolerable risk
achieved?
Is tolerable risk
achieved?
StopStop
Risk Reduction
Risk Reduction
Ris
k A
naly
sis
Ris
k A
sses
smen
t
YESNO
SU03 Slide 16
![Page 17: Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled.](https://reader035.fdocuments.in/reader035/viewer/2022062315/56649f265503460f94c3d1b7/html5/thumbnails/17.jpg)
Questions?
SU03 Slide 17