1 / 29

Contemporary Security Management Chapter 11 Managing Physical Security

Contemporary Security Management Chapter 11 Managing Physical Security. Factors in Selecting Safeguards. 159. Environment : Where am I? i.e., being aware of your surroundings Forces of Nature: climate and weather Crime: city, urban and nature and intensity

kasen
Download Presentation

Contemporary Security Management Chapter 11 Managing Physical Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Contemporary Security Management Chapter 11 Managing Physical Security Chapter 11 - Managing Physical Security

  2. Factors in Selecting Safeguards 159 • Environment: Where am I? i.e., being aware of your surroundings • Forces of Nature: climate and weather • Crime: city, urban and nature and intensity • Terrorism: can happen anytime, anywhere Chapter 11 - Managing Physical Security

  3. Site Characteristics 159 • Safeguards correspond both the nature of the threat and the nature of the site. • Size, layout, utilities, and compositional materials • Internal activities • Assets in or forming a part of the site • History of threat occurrences at the site • Security experience of the CSO • Philosophy of the site’s ownership or management • Culture of the workforce • The surrounding community • Social and political constraints Chapter 11 - Managing Physical Security

  4. Concentric Protection 161 Chapter 11 - Managing Physical Security

  5. Concentric Protection • An underlying principal for providing good security involves a concept called “Concentric Circles of Protection”, sometimes also called "Security in Depth". • This concept involves the use of multiple “rings” or “layers” of security. • The first layer is located at the boundary of the site, and additional layers are provided as you move inward through the building toward the high-value assets. Chapter 11 - Managing Physical Security

  6. Concentric Protection • Rather than placing full reliance on a single layer of defense, these layers require an intruder to penetrate a series of layers to reach his goal. • The more layers that exist between the outside world and a high-value asset, the better the security. • The Concentric Circles of Protection concept is similar to the “multiple lines of defense” strategy employed by many military planners. Chapter 11 - Managing Physical Security

  7. Concentric Protection • Note that at the boundaries of each layer, those people who belong within the next layer can be separated from those who don’t belong. • Also, at each boundary, there is an opportunity to deter, detect, and delay an intruder. • This allows intruders attempting to penetrate the layer to be detected and intercepted with an appropriate security response. • The logic behind having multiple layers of security is simple: having multiple layers eliminates total reliance on any single layer and provides redundancy. Chapter 11 - Managing Physical Security

  8. Concentric Protection • An absolute minimum of three layers should exist between the outside world and any type of high-value asset; with five or more layers being desirable. • Basic Principals of Security Layers • Having multiple layers decreases the probability that the intruder will be able to gain access. • You can decrease the intruder’s chance of success by adding layers, or by increasing the effectiveness of each layer, or by doing both. • Relying on a single layer to provide security is almost never effective because it requires a level of perfection that is unattainable. • Simple procedures, such as the locking of file cabinets and offices, can provide additional security “layers” at little or no cost. • Employee security awareness can create an invisible, yet very effective, security “layer”. Chapter 11 - Managing Physical Security

  9. Security Lighting 163 • Protective lighting is often categorized by type or purpose: • Flood lighting: continuous illumination • Glare lighting: directed outward from the protected area • Controlled lighting: illumination that does not impede nearby operations • Moveable lighting: manually operated portable lamps • Emergency lighting: standby lamps that come on when primary lighting goes out. Chapter 11 - Managing Physical Security

  10. Security Lighting 163 • Protective lighting is often categorized by type or purpose: • Fluorescent lamp: efficient and economical but casts illumination over a relatively short distance. • Gaseous discharge lamp: mercury (blue-white color); sodium (golden-yellow). Long life spans, but are slow to come to full illumination • Quartz lamp: produces a bright white light. Can be intensely glaring. Reaches full illumination similar to an incandescent lamp. Chapter 11 - Managing Physical Security

  11. Types of Sensors 163 • Breaking of a circuit • Interruption of a light beam • Movement • Sound • Vibration • Change in an energy field • Two types of sensors: exterior or interior (some can be both) Chapter 11 - Managing Physical Security

  12. Direction of Reliability 170 • Amount and pattern of energy emitted by the intruder. • Size of the intruder • Distance between the sensor and the intruder • Speed at which the intruder is moving • Direction of intruder movement • Characteristics of the energy waves of the intruder and of the environment in which the sensor operates Chapter 11 - Managing Physical Security

  13. When Selecting An Alarm 171 What to consider: • Reliability:sensitivity, environment, behavior of intruder. • Frequency of false alarms • Ability of the sensors to detect attempts to thwart or circumvent detection. Chapter 11 - Managing Physical Security

  14. Lock and Key Systems • Types of Locks • Key • Combination • Electronic Chapter 11 - Managing Physical Security

  15. Lock and Key Systems • Key lock: • Warded lock: has obstructions in the keyway or lock • Combination lock: used in safes, vaults, and doors • Electronic lock: digital locks that open when the correct code is entered by pushing buttons. • Electromechanical locks: that open when an electronic signal is received Chapter 11 - Managing Physical Security

  16. Locks • Lock Strengths: • Grade 1 (commercial and industrial use) • Grade 2 (heavy duty residential/light duty commercial) • Grade 3 (residential and consumer expendable) • Cylinder Categories • Low Security (no pick or drill resistance) • Medium Security (some pick resistance) • High Security (pick resistance through many different mechanisms—used only in Grade 1 & 2 locks) Chapter 11 - Managing Physical Security

  17. Key Control • Key control is an organized and formal security system which addresses control of master keys within a building or facility. • Key control prevents unauthorized access using documentation management and status reporting of critical elements in the master key system. Chapter 11 - Managing Physical Security

  18. Key Control • The critical elements of facilities security are: • Physical keys (either issued keys or stored keys) • Key holders • Physical locations • Information on the products used in a location Chapter 11 - Managing Physical Security

  19. Key Control • Important key control questions you should know the answers to: • What is your keying systems? • What keys do you have? • What keys have you issued? • What keys are not accounted for? • Where are the keys? • Who has them? • Where did they go? • Can I account for all my keys? Chapter 11 - Managing Physical Security

  20. Two-Person Rule 175 • Whenever an area is so sensitive that unaccompanied entry cannot be permitted it is wise to use the two-person rule. • Two people must sign out for the key or • Two people must simultaneously turn two separate locks with their corresponding keys Chapter 11 - Managing Physical Security

  21. Dual Systems of Key Control 176 • One system for nonsensitive situations. • One system for sensitive situations. Chapter 11 - Managing Physical Security

  22. Perimeter Security • Locks are inexpensive access control mechanisms that are widely accepted and used. • Locks are considered delaying devices. • Know your locks! Chapter 7 - Internal Threats & Countermeasures

  23. Perimeter Security • Types of Locks • Mechanical Locks • Warded & Tumbler • Combination Locks • Cipher Locks (aka programmable locks) • Smart locks • Device Locks • Cable locks, switch controls, slot locks, port controls, peripheral switch controls, cable traps Chapter 7 - Internal Threats & Countermeasures

  24. Perimeter Security • Lock Strengths: • Grade 1 (commercial and industrial use) • Grade 2 (heavy duty residential/light duty commercial) • Grade 3 (residential and consumer expendable) • Cylinder Categories • Low Security (no pick or drill resistance) • Medium Security (some pick resistance) • High Security (pick resistance through many different mechanisms—used only in Grade 1 & 2 locks) Chapter 7 - Internal Threats & Countermeasures

  25. Double-hung windows can be locked with wedge locks, key-operated latches, or locking pins that go through one sash and into the next. See also: Security for French Doors. Window latch Sliding Window Lock Sliding Window Latch Keyed sash lock Keyed Patio Door Lock Deadbolt Patio Door Bar Patio door pin Chapter 6

  26. BIOLOCK Biometric Fingerprint Access System Chapter 6

  27. Keypad Lock Chapter 6

  28. Chapter 7 - Internal Threats & Countermeasures

  29. Chapter 7 - Internal Threats & Countermeasures

More Related