350 likes | 620 Views
Introduction to Security. Chapter 6 Enhancing Security through Physical Controls. Crime Prevention Through Environmental Design (CPTED). Began in the early 1960s
E N D
Introduction to Security Chapter 6 Enhancing Security through Physical Controls
Crime Prevention Through Environmental Design (CPTED) • Began in the early 1960s • A fundamental concept in security design that is based on the premise that effective use and manipulation of the physical environment can reduce criminal behavior
Crime Prevention Through Environmental Design (CPTED) 4 Key Strategies: 1. Territoriality 2. Natural Surveillance 3. Activity Support 4. Access Control
Crime Prevention Through Environmental Design (CPTED) 1. Territoriality: Most people tend to protect area that they feel is their own, and have a certain amount of respect for other’s. Fences, pavement treatments, signs and landscaping all help to express ownership.
Crime Prevention Through Environmental Design (CPTED) 2. Natural Surveillance -This is almost entirely based off of the fact that criminals do not want to be seen. - place physical activities, features and people in a way that they can be observed - remove trees, sheds, bushes and other sight obstructions
Crime Prevention Through Environmental Design (CPTED) 3. Activity Support - encourage legitimate activity in public spaces - any activity that gets people out and interacting helps to discourage crime - basketball courts in parks, neighborhood parties, etc.
Crime Prevention Through Environmental Design (CPTED) 4. Access Control - properly located entrances/exits - fencing - lighting - receptionist at a front desk - a neighbor sitting on their front porch
An Overview of Physical Controls Concentric Zone Theory – based on the premise that the more valuable an asset is, the more protection it needs
An Overview of Physical Controls 3 Basic Lines of Physical Defense: 1. The perimeter of the facility 2. The building exterior 3. The interior
Basic Security Equipment A. Locks - key, key card or smart card operated – first used in Egypt over 4,000 years ago - remains one of the oldest, most commonly used methods of access control
Basic Security Equipment B. Biometrics - the science of using individual physiological features or behavioral characteristics to positively identify a person Examples: fingerprint, iris/retinal scans, hand geometry, voice, et al.
Basic Security Equipment C. Lighting - intruders want darkness to cover their actions - 3 out of 4 commercial burglaries are committed within buildings with little or no light
Basic Security Equipment C. Lighting 4 types: 1. Continuous 2. Standby 3. Moveable 4. Emergency
Basic Security Equipment D. Alarms - date back to 390 BC when geese were used - many federally insured institutions are required to use them - some insurance companies offer discounts for alarm installation/use
Basic Security Equipment D. Alarm uses: • Burglar • Fire • Temperature • Humidity • Water flow • Electrical power
Basic Security Equipment D. Alarm system types: • Local – sound on the premises only • Proprietary – a constantly-manned alarm panel operated by the owner • Central Station – similar to proprietary, except usually operated off premises by an alarm company • Police Connected – the alarm is directed via phone lines to the nearest police dept.
Basic Security Equipment D. Alarms – False Alarms • More than 90% of all intrusion alarms are false alarms, resulting in needless expense and risks on the part of responders. • Because of the high number of false alarms, many cities prohibit alarms connected directly to the police department.
Basic Security Equipment E. Closed Circuit Television (CCTV) • A generic term, generally meaning a system in which a number of video cameras are connected in a closed circuit or loop, where the images are sent to a central television monitor or recorded. • CCTV systems range from basic system to very complicated networks.
Basic Security Equipment E. Closed Circuit Television (CCTV) • Cameras may be overt or covert, or semi-covert. • Overt – out in the open • Covert – hidden • Semi- Covert – cameras are in public view but behind a one-way transparent covering.
Basic Security Equipment E. CCTV other technology: Internet Protocol Video (IP) • Video can be sent across a company’s data network so that it can be viewed wherever the company chooses. • These can cause bandwidth and digital storage issues for a company’s network.
Basic Security Equipment E. CCTV other technology: Night Cameras – most popular kind use image intensification that amplifies available visible and near-infrared light to achieve better vision Thermal Imaging – operates on the principle that all objects emit infrared energy that can be seen using a thermal imager
Privacy concerns… • There is concern over the amount of, or rather lack of, privacy by private, non-criminal citizens through the extensive use of surveillance methods. • Some cities are passing legislation to govern these types of devices and their use.
The Perimeter • The perimeter can be controlled by a variety of ways: A. Fences – 2 basic types • Ornamental • Chain Link – effectiveness can be increased by adding razor wire, barbed wire, etc.
The Perimeter • The perimeter can be controlled by a variety of ways: B. Alarms C. Perimeter Lighting • Floodlights • Street lights • Fresnal units • Searchlights
The Perimeter • The perimeter can be controlled by a variety of ways: D. Surveillance Cameras E. Vehicle Barriers • Active – require some action by a person or equipment to be raised into place • Passive – a fixed device with no moving parts, such as guard rails, concrete poles, etc.
The Perimeter • The perimeter can be controlled by a variety of ways: F. Patrols • Security Officers • Patrol or Guard Dog units – roam alone inside a perimeter or building to deter intruders
The Perimeter • The perimeter can be controlled by a variety of ways: G. Signs H. Physical Layout – When possible, we should always try to maintain a clear zone of 20 feet on either side of the perimeter
The Building Exterior • For some facilities, the exterior is the first line of defense. • Keys for effective security: • Strong, locked doors • Limited number of entrances • Secured openings (>96 sq. inches) • Alarms • Surveillance • Lighting
The Building Interior • Internal physical controls are usually required along with external controls. • Secure areas should be separated from non-secure areas if possible.
The Building Interior Safeguards: • Locks • Alarms • Mirrors • Document shredders • Vaults/ safes • Bolt down large, moveable equipment • Lock down devices on office equipment • Surveillance systems
The Building Interior The Command Center • Should be linked to the security control center • Should be in a tightly controlled area • Can also monitor access • Increasingly, staff members of the command center can also handle computer network issues if need be.
The Physical Security System • The goal is to provide the amount of security needed - neither too much nor too little. • This is a balancing act between aesthetic, operational, safety and security needs.
The Physical Security System • Physical security footprint – the mark left during or after a security action that the public sees and lets them know security is present.