Download ebooks file Physical security principles all chapters

Page 1


https://ebookmass.com/product/physical-security-

Download more ebook from https://ebookmass.com

More products digital (pdf, epub, mobi) instant download maybe you interests ...

Principles of Information Security 6th Edition Whitman

https://ebookmass.com/product/principles-of-informationsecurity-6th-edition-whitman/

Principles of Computer Security: CompTIA Security+ and Beyond 2nd edition Edition Conklin

https://ebookmass.com/product/principles-of-computer-securitycomptia-security-and-beyond-2nd-edition-edition-conklin/

eTextbook 978-1133599692 Principles and Labs for Physical Fitness

https://ebookmass.com/product/etextbook-978-1133599692principles-and-labs-for-physical-fitness/

Principles of Information Security 7th Edition Michael E. Whitman

https://ebookmass.com/product/principles-of-informationsecurity-7th-edition-michael-e-whitman/

Security Analysis : Principles and Techniques (7th Edition) Benjamin Graham

https://ebookmass.com/product/security-analysis-principles-andtechniques-7th-edition-benjamin-graham/

Computer Security Principles and Practice 5th Edition

William Stallings

https://ebookmass.com/product/computer-security-principles-andpractice-5th-edition-william-stallings/

Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-601), 6th Edition Greg White

https://ebookmass.com/product/principles-of-computer-securitycomptia-security-and-beyond-exam-sy0-601-6th-edition-greg-white/

Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) Jonathan S. Weissman

https://ebookmass.com/product/principles-of-computer-securitycomptia-security-and-beyond-lab-manual-exam-sy0-601-jonathan-sweissman/

Cryptography and Network Security: Principles and Practice, Global Edition William Stallings

https://ebookmass.com/product/cryptography-and-network-securityprinciples-and-practice-global-edition-william-stallings/

CONTRIBUTORS

Thesuccessofthispublicationisdirectlyrelatedtothepeer review processrecognized bymostprofessions.Securityprofessionals,membersofacademia,andother subject matter expertscontributedcurrentinformation,conductedresearch,reviewed submissions,andprovidedconstructivecomments.

ItiswithsincereappreciationthatIwishtothankthefollowingindividualswho contributedto Physical Security Principles:

KevinE.Peterson,CPP Co-Editor

EvaGiercuszkiewicz ASISProjectManager

DanaW.Adams,CPP

JamesE.Beadel,PSP

JohnBekisz,Jr.,PSP

HowardJ.Belfor,CPP

DennisR.Blass,CPP,PSP

GeoffreyT.Craighead,CPP

EricDavidson,PSP

AnthonyV.DiSalvatore,CPP,PCI,PSP

LisaDolan,CPP

ColinDoniger,CPP,PSP

SeanT.Doyle,PSP

RichardL.Edmond,PSP

PeterE.Ohlhausen Technical Editor

Evangeline Pappas ASISProductionManager

HeinrichF.Eisenberg,CPP

JamesW.Ellis,CPP,PSP

ChrisFreeman,CPP,PSP

Michael A.Franke,CPP,PSP

JeffreyR.Geiger,PSP

LeoP.Gonnering,PSP

DawnV.Gregory,CPP

DonaldR.Green,CPP

RichardA.Hawkins,CPP,PSP

EdwardC.Heisler,CPP,PSP

ScottJ.Hogan,PSP

Jennifer L.Holcomb,PE,PSP

GregoryL.Hurd,CPP

JeffreyC.Insdahl,PSP

RichardW.Jackson,PSP

GregoryW.Jarpey,PSP

KeithL.Kambic,CPP

StevenT.Kerley,CPP

MyrahL.Kirkwood,CPP

GlenW.Kitteringham,CPP

PatrickW.Klaassen,PSP

Daniel H.Kropp,CPP

RobertF.Leahy,CPP,PSP

Karl F.Langhorst,CPP

JeffreyS.Leonard,CPP,PSP

Jennifer McLamb,CPP,PCI,PSP

DanteI.Moriconi,CPP,PSP

RichardA.Michau,CPP

BonnieS.Michelman,CPP

MonsieC.Mintz,CPP

OwenJ.Monaghan,CPP

WilliamJ.Moore,PSP

LuisH.Morales,CPP

ThomasL.Norman,CPP,PSP

JaimeP.Owens,CPP

KevinE.Peterson,CPP

DougPowell,CPP,PSP

RobertRowe,CPP,PSP

LarryW.Simmons,CPP

RodneyJ.Taylor,CPP

FranciscoTranchesi,CPP,PSP

AnnTrinca,JD,CPP,PCI,PSP

MikeA.vanDrongelen,CPP,PCI,PSP

INTRODUCTION

Physical Security Principles ismeanttoservethreepurposes.First,theauthors, reviewers,andother contributorshopethatsecurityprofessionalsworldwidewill find ittobeavaluabledeskreferenceonaspectsofthepracticeofphysical security. Second,thebookmaybeanappropriatetextfor collegeandCTE(career andtechnical education) coursesrelatedtophysical security.Third,itisagreatreferenceasit containsthebreadthanddepthnecessaryfor everyoneinterestedinobtaininga certificationinphysical security.

Our intentthroughoutistopresent,discuss,andcontrastprinciplesandpracticesina complementaryfashionanddemonstratetheir interrelatednessineveryorganizationand everysettingonaglobal scale.Theobjectivefor thesecurityprofessional istoleverage longstanding,widelyacceptedconceptsandtailor themtotheparticular situationat handtobestmeettheidentifiedprotectionobjectives.All thismustbedonewithinthe constraintsofcost,time,space,culture,regulation,andoperational needs.Itisa challengeindeed,andthisbookismeantasaresourcetohelplaythegroundworkfor successful physical securityprojectsineverysituation.

Althoughphysical securityisonlyoneelementofacomprehensiveprotectionstrategy,it isgenerallythefirstthingthatcomestomindfor mostpeople.Itisadisciplinethathas alwaysexistedandmostprobablyalwayswill.AsBobMcCrie,CPP,writesin The Handbook of Security byProfessor MartinGill:1

From the earliest known evidence, security became necessary for human existence A fundamental strategy was to use physical implementation wherever possible to protect from external incursions Often,geographic locationcouldbe significantfor protection While geographyeasedthe vulnerability for some communities, others required additional means of protection An encompassing wall or physicalbarriers for protection [were often employed] Posts,thick enclosures,heavy doors with stout closures, animals and traps all served to protect [communities] Thus, a variety of physical and animate securityresources emerged

Today,withtheconfluenceofphysical threats,humanthreats,andcyber threats in additiontotheever presentnatural andinadvertentthreat weliveinanasymmetric worldwithrespecttotherisksweface.Still,physical securityremainsakeydriver in assetprotectionprogramsinabsolutelyeverysetting,everywhereintheworld.Physical andanimatesecurityresourcescontinuetoemerge.Thetechniquesandtoolsofthis disciplineareappliedinour homesandvehiclesaswell asinmultinational corporationsandgovernmentagencies.Fromthelocal conveniencestoretomilitary installations,andfromwarehousestodatacenters physical securityplaysanessential role.

Eachofthisbook’sfour sectionshelpstodefinethatroleandofferspractical,realworldtoolsfor planningandimplementingphysical securityincontemporarysociety. PartIdealswiththeunderlyingconceptsofsecurityriskmanagementandhow they translateintoeffectiveandefficientsecuritypractices.Anoverview ofdesign principlesandpracticesispresentedinPartIIofthebook.PartIIIaddressesthe specifictoolsandtechniqueswithintheframeworkofstructural,electronic,andhuman meanscollaboratingtosatisfyprotectionobjectives.Finally,PartIVaddressesthe projectmanagementaspectsofsecurityinbothprincipleandpractice.Appendices definekeysecuritytermsandaddressspecial considerationsfor high-risebuildings.

Overall,wehopethatthisbookwill finduseamongpractitionersaswell asanyone involvedor interestedintheprinciplesandpracticesofcontemporaryphysical security. Incraftingthisbook,bothintermsofcontentandformat,weattemptedtoproducea pertinentandvaluableresourcefor membersofall threeofthoseaudiences.We sincerelyhopewehaveachievedthatobjective.

CONTENTS

Preface

Contributors

Introduction

PART I

RISKMANAGEMENT: THEBASISFORPHYSICALSECURITY

Chapter 1.CONCEPTSINSECURITYRISKMANAGEMENT

1.1 TakingaStrategicRiskManagementApproach

1.2 TheSecurityRiskManagementProcess

1.2.1 ConsideringAssets

1.2.2 AComprehensiveView oftheThreat

1.2.3 LookingatVulnerabilities

1.2.4 AnalyzingtheRisk

1.2.5 ProtectiveMeasures

1.3 RiskMitigation

1.3.1 TheFour Ds

1.3.2 TheFiveAvenuestoAddressRisk

1.3.3 LayeredSecurity

1.4 MitigationMeasures

References

Chapter 2.FUNCTIONSOFPHYSICALSECURITY

2.1 DefinitionandPurposeofPhysical Security

2.2 FunctionsVersusComponentsofPhysical Security

2.2.1 Structural Components

2.2.2 ElectronicComponents

2.2.3 HumanComponents

2.3 Peripheral SystemsandInterfaces

References

Chapter 3.PLANNING ANDCONDUCTING PHYSICALSECURITY ASSESSMENTS

3.1 General RiskAssessmentModelsandConsiderations

3.2 QualitativeandQuantitativeMethods

3.2.1 Assets

3.2.2 EvaluatingThreats

3.2.3 Vulnerabilities

3.2.4 RiskAnalysis

3.2.5 RiskMitigation

3.2.6 LeveragingOutsideExpertise

3.3 Physical SecurityAssessments

3.3.1 FramingtheSecuritySurveyandPuttingItinContext

3.3.2 ApproachestoPhysical SecurityAssessments

3.4 General Guidelines AreastoAssess

3.4.1 Typical AreasandItemstoAssess

3.4.2 Tests

3.5 ApplyingAssessmentResults

3.6 AutomatedAssessmentTools

References

Chapter 4.MEASURING EFFECTIVENESS: CONCEPTSINPHYSICAL SECURITYMETRICS

4.1 UnderstandingMetrics

4.1.1 BenefitsofaSecurityMetricsProgram

4.1.2 DesigningaMetricsProgram

4.2 Physical SecurityMetrics

4.2.1 Physical SecuritySystemsMetrics

4.2.2 Physical SecurityPersonnel Metrics

4.2.3 Physical SecurityComplianceMetricsinthePublicSector

4.2.4 PresentingAggregateStatusfor Physical SecurityMetrics

4.3 Additional RecommendedMetrics

4.4 ApplicationofMetricsThroughoutThisBook

References

DESIGNPRINCIPLESANDPRACTICES

Chapter 5.BASICDESIGNCONCEPTS

5.1 DesignPrinciples

5.1.1 PointVersusAreaSecurity

5.1.2 ConflictAvoidance

5.1.3 Balance

5.1.4 Additional DesignElements

5.2 ExamplesofDesignPractices: GoodandNotSoGood

References

Chapter 6.INFLUENCING FACTORSINPHYSICALSECURITYDESIGN

6.1 CharacteristicsoftheAssetsunder Protection

6.2 CharacteristicsoftheBuildingor Facility

6.2.1 OwnershipandOccupancy

6.2.2 PurposeoftheFacility

6.2.3 Access

6.3 CharacteristicsoftheSurroundings

6.4 CharacteristicsoftheLocation

6.5 Additional InfluencingFactors

6.5.1 SelectingMitigationOptionsBasedonInfluencingFactors

References

Chapter 7.SECURITYARCHITECTUREANDENGINEERING

7.1 DesignOverview

7.2 CodesandRegulations

7.3 ProjectRequirements

7.4 TypeofConstruction

7.5 SiteLayout

7.5.1 Perimeter

7.5.2 Lighting

7.5.3 BuildingDesignAgainstBlast

7.5.4 BuildingAccess

7.6 Material Selection

7.6.1 BuildingStructure

7.6.2 Facades

7.6.3 Interior Layout

7.6.4 Glazing

7.7 SiteUtilities

7.7.1 HVAC

7.7.2 EmergencyPower

7.7.3 Other Utilities

7.8 LifeSafetySystems

7.8.1 Evacuation

7.8.2 Shelter-in-Place

7.9 PublicationsRelevanttoSecurityArchitectureandEngineering

References

Chapter 8.INTEGRATEDSECURITYANDPROTECTIONSTRATEGIES

8.1 IntegratedElectronicSecuritySystems

8.2 IntegratedPhysical SecurityElements

8.3 IntegratedSecurityPrograms

8.4 IntegrationinEnterpriseRiskManagement

References

PHYSICALSECURITYANDPROTECTIONSTRATEGIES

Chapter 9.STRUCTURALSECURITYMEASURES

9.1 Barriers

9.1.1 Walls

9.1.2 Doors

9.1.3 WindowsandOther Openings

9.1.4 RoofsandFloors

9.1.5 FencingandPerimeter Walls

9.1.6 BlockingBarriers

9.1.7 SymbolicandNatural Barriers

9.2 ContainersandVaults

9.2.1 Safes

9.2.2 Vaults

9.3 LocksandLockingMechanisms

9.3.1 Mechanical Locks

9.3.2 ElectrifiedLockingMechanisms

9.3.3 DesigningSecurityLockingSystems

9.4 LightingandSecurityApplications

9.4.1 TypesofLightingEquipmentandLamps

9.4.2 LightingChallenges

9.4.3 CharacteristicsofLightandLighting

9.4.4 Overview ofLightingSystems

9.4.5 EconomicConsiderations

9.4.6 StartingandRestrike

9.4.7 SecurityLightingfor SelectedApplications

9.4.8 LightingConsiderationsfor ElectronicSurveillanceSystems

9.4.9 Standardsfor SecurityLightingLevels References

Chapter 10.CRIMEPREVENTIONTHROUGHENVIROMENTALDESIGN

10.1 PrinciplesofCPTED

10.1.1 Criminal BehaviorsandPatterns

10.1.2 Later DevelopmentsinCPTED

10.2 ToolsofCPTED

10.2.1 ToolsThatAddresstheThreeElementsofCPTED

10.2.2 ReducingCrimeThroughArchitectural Design

10.2.3 AccessControl,Surveillance,andTerritorial Reinforcement

10.3 CPTEDApplicationsinVariousSettings

10.3.1 Commercial OfficeBuildings

10.3.2 Industrial BuildingsandFacilities

10.3.3 ParkingFacilities

10.3.4 Schools

10.3.5 AutomatedTeller Machines(ATMS)

10.3.6 U.S.Federal Buildings

10.4 IntegrationofCPTEDandTraditional Security

10.5 OneExampleofaCPTEDSurveyTemplate

References

Chapter 11.ELECTRONICSECURITYSYSTEMS

11.1 AccessControl Systems

11.1.1 Personnel AccessControl

11.1.2 Locks

11.2 ContrabandDetection

11.2.1 Metal Detectors

11.2.2 PackageSearch

11.2.3 ExplosivesDetection

11.2.4 Chemical andBiological AgentDetection

11.3 Physical IntrusionDetectionSystems

11.3.1 PerformanceCharacteristics

11.3.2 Standards

11.3.3 Exterior Sensors

11.3.4 Interior Sensors

11.4 VideoSurveillance

11.4.1 Functional Requirements

11.4.2 TheoryofVisual Security

11.4.3 UsesofVideoSubsystemsinSecurity

11.4.4 AnalogSystemComponents

11.4.5 Digital SystemComponents

11.4.6 SystemDesign

11.4.7 EquipmentSelection

11.4.8 Additional DesignConsiderationsfor VideoAssessment

11.4.9 EvaluationofVideoAssessmentSystems

11.4.10 Maintenance

11.4.11 FutureofVideoSurveillanceSystems

11.5 CommunicationsandAnnunciationSystems

11.5.1 AC&DAttributes

11.5.2 AlarmCommunicationSubsystem

11.5.3 SecurityCommunications

11.5.4 AlarmControl andDisplay

11.6 TrendsandIssuesinElectronicSystemsIntegration

References

Chapter 12.SECURITYOFFICERSANDTHEHUMANELEMENT

12.1 SecurityOfficer UtilizationGrowth

12.2 ContemporaryChallenges

12.3 DeterminingtheNeedfor aSecurityForce

12.4 SecurityForceModels

12.5 BasicSecurityOfficer Functions

12.5.1 AccessControl

12.5.2 Patrol

12.5.3 Inspection

12.5.4 Monitoring

12.5.5 EmergencyResponse

12.5.6 TrafficControl

12.5.7 DealingwithDisturbedPeople

12.5.8 Escort

12.5.9 Special Assignments

12.5.10 RecordKeeping

12.6 SecurityOfficer Roles

12.6.1 PublicRelations/ManagementRepresentative

12.6.2 IntelligenceAgent

12.6.3 Enforcement/ComplianceAgent

12.6.4 Legal Consultant

12.6.5 Physical SecuritySpecialist

12.7 UniformsandEquipment

12.7.1 Weapons

12.8 SecurityOfficer Selection

12.8.1 ASISGuidelinePSO-2010

12.8.2 CanadianGeneral StandardsBoardCAN/CGSB-133.1-99

12.8.3 Personal Attributes

12.9 SecurityOfficer Training

12.9.1 KeyTrainingConcepts

12.9.2 BenefitsofTraining

12.9.3 IdentifyingTrainingRequirements

12.9.4 MethodsofTraining

12.9.5 TheTrainingProcess

12.9.6 ObstaclestoProvidingTraining

12.9.7 TrainingStrategies

12.10 ManagingtheSecurityOfficer Force

12.10.1 Personnel Requirements

12.10.2 General,Post,andSpecial Orders

12.10.3 Scheduling

12.10.4 Supervision

12.10.5 QualityAssuranceandQualityControl

12.10.6 QualityControl Inspections

12.10.7 ManagementUseofData

12.10.8 EnhancingJobPerformance

12.11 LeveragingtheHumanElement

References

14.1 SystemDesignPrinciples

14.2 Initial Phases

14.3 DesignPhases

14.3.1 DevelopmentofDesignCriteria

14.3.2 BasisofDesign

14.3.3 Conceptual Design

14.3.4 DesignandDocumentation

14.3.5 Specifications

14.3.6 Drawings

14.3.7 DesignCoordination

14.4 Contracting

14.4.1 Initial Budget

14.4.2 EstimationConsiderations

14.4.3 TypesofCostEstimates

14.4.4 Life-CycleCost

14.4.5 SampleEstimate

14.5 TheRoleofConsultants

14.6 VideoSystems

14.6.1 TheFirstEvolution: AnalogtoDigital

14.6.2 TheSecondEvolution: StandardResolutiontoMegapixel

14.6.3 ProcessedVideo,VideoAnalytics,andIntelligentVideo

14.6.4 VideoSystemsIntegration

14.7 MergingLegacySystems

14.7.1 AccessControl Systems

14.7.2 LegacyVideoSystems

14.7.3 LegacyIntercomSystems

14.7.4 SecurityNetworksandLegacyIntegration

14.8 Procurement

14.8.1 ProcurementForms

14.8.2 ProcurementProcess

Chapter 15.PROJECTIMPLEMENTATION

15.1 SitePreparation

15.2 Contractor Coordination

Another random document with no related content on Scribd:

INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied warranties or the exclusion or limitation of certain types of damages. If any disclaimer or limitation set forth in this agreement violates the law of the state applicable to this agreement, the agreement shall be interpreted to make the maximum disclaimer or limitation permitted by the applicable state law. The invalidity or unenforceability of any provision of this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation, the trademark owner, any agent or employee of the Foundation, anyone providing copies of Project Gutenberg™ electronic works in accordance with this agreement, and any volunteers associated with the production, promotion and distribution of Project Gutenberg™ electronic works, harmless from all liability, costs and expenses, including legal fees, that arise directly or indirectly from any of the following which you do or cause to occur: (a) distribution of this or any Project Gutenberg™ work, (b) alteration, modification, or additions or deletions to any Project Gutenberg™ work, and (c) any Defect you cause.

Section 2. Information about the Mission of Project Gutenberg™

Project Gutenberg™ is synonymous with the free distribution of electronic works in formats readable by the widest variety of computers including obsolete, old, middle-aged and new computers. It exists because of the efforts of hundreds of volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the assistance they need are critical to reaching Project Gutenberg™’s goals and ensuring that the Project Gutenberg™ collection will

remain freely available for generations to come. In 2001, the Project Gutenberg Literary Archive Foundation was created to provide a secure and permanent future for Project Gutenberg™ and future generations. To learn more about the Project Gutenberg Literary Archive Foundation and how your efforts and donations can help, see Sections 3 and 4 and the Foundation information page at www.gutenberg.org.

Section 3. Information about the Project Gutenberg Literary Archive Foundation

The Project Gutenberg Literary Archive Foundation is a non-profit 501(c)(3) educational corporation organized under the laws of the state of Mississippi and granted tax exempt status by the Internal Revenue Service. The Foundation’s EIN or federal tax identification number is 64-6221541. Contributions to the Project Gutenberg Literary Archive Foundation are tax deductible to the full extent permitted by U.S. federal laws and your state’s laws.

The Foundation’s business office is located at 809 North 1500 West, Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up to date contact information can be found at the Foundation’s website and official page at www.gutenberg.org/contact

Section 4. Information about Donations to the Project Gutenberg Literary Archive Foundation

Project Gutenberg™ depends upon and cannot survive without widespread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine-readable form accessible by the widest array of equipment including outdated equipment. Many

small donations ($1 to $5,000) are particularly important to maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States. Compliance requirements are not uniform and it takes a considerable effort, much paperwork and many fees to meet and keep up with these requirements. We do not solicit donations in locations where we have not received written confirmation of compliance. To SEND DONATIONS or determine the status of compliance for any particular state visit www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states where we have not met the solicitation requirements, we know of no prohibition against accepting unsolicited donations from donors in such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot make any statements concerning tax treatment of donations received from outside the United States. U.S. laws alone swamp our small staff.

Please check the Project Gutenberg web pages for current donation methods and addresses. Donations are accepted in a number of other ways including checks, online payments and credit card donations. To donate, please visit: www.gutenberg.org/donate.

Section 5. General Information About Project Gutenberg™ electronic works

Professor Michael S. Hart was the originator of the Project Gutenberg™ concept of a library of electronic works that could be freely shared with anyone. For forty years, he produced and distributed Project Gutenberg™ eBooks with only a loose network of volunteer support.

Project Gutenberg™ eBooks are often created from several printed editions, all of which are confirmed as not protected by copyright in the U.S. unless a copyright notice is included. Thus, we do not necessarily keep eBooks in compliance with any particular paper edition.

Most people start at our website which has the main PG search facility: www.gutenberg.org.

This website includes information about Project Gutenberg™, including how to make donations to the Project Gutenberg Literary Archive Foundation, how to help produce our new eBooks, and how to subscribe to our email newsletter to hear about new eBooks.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Download ebooks file Physical security principles all chapters by Education Libraries - Issuu