300 likes | 611 Views
Contemporary Security Management Chapter 11 Managing Physical Security. Factors in Selecting Safeguards. 159. Environment : Where am I? i.e., being aware of your surroundings Forces of Nature: climate and weather Crime: city, urban and nature and intensity
E N D
Contemporary Security Management Chapter 11 Managing Physical Security Chapter 11 - Managing Physical Security
Factors in Selecting Safeguards 159 • Environment: Where am I? i.e., being aware of your surroundings • Forces of Nature: climate and weather • Crime: city, urban and nature and intensity • Terrorism: can happen anytime, anywhere Chapter 11 - Managing Physical Security
Site Characteristics 159 • Safeguards correspond both the nature of the threat and the nature of the site. • Size, layout, utilities, and compositional materials • Internal activities • Assets in or forming a part of the site • History of threat occurrences at the site • Security experience of the CSO • Philosophy of the site’s ownership or management • Culture of the workforce • The surrounding community • Social and political constraints Chapter 11 - Managing Physical Security
Concentric Protection 161 Chapter 11 - Managing Physical Security
Concentric Protection • An underlying principal for providing good security involves a concept called “Concentric Circles of Protection”, sometimes also called "Security in Depth". • This concept involves the use of multiple “rings” or “layers” of security. • The first layer is located at the boundary of the site, and additional layers are provided as you move inward through the building toward the high-value assets. Chapter 11 - Managing Physical Security
Concentric Protection • Rather than placing full reliance on a single layer of defense, these layers require an intruder to penetrate a series of layers to reach his goal. • The more layers that exist between the outside world and a high-value asset, the better the security. • The Concentric Circles of Protection concept is similar to the “multiple lines of defense” strategy employed by many military planners. Chapter 11 - Managing Physical Security
Concentric Protection • Note that at the boundaries of each layer, those people who belong within the next layer can be separated from those who don’t belong. • Also, at each boundary, there is an opportunity to deter, detect, and delay an intruder. • This allows intruders attempting to penetrate the layer to be detected and intercepted with an appropriate security response. • The logic behind having multiple layers of security is simple: having multiple layers eliminates total reliance on any single layer and provides redundancy. Chapter 11 - Managing Physical Security
Concentric Protection • An absolute minimum of three layers should exist between the outside world and any type of high-value asset; with five or more layers being desirable. • Basic Principals of Security Layers • Having multiple layers decreases the probability that the intruder will be able to gain access. • You can decrease the intruder’s chance of success by adding layers, or by increasing the effectiveness of each layer, or by doing both. • Relying on a single layer to provide security is almost never effective because it requires a level of perfection that is unattainable. • Simple procedures, such as the locking of file cabinets and offices, can provide additional security “layers” at little or no cost. • Employee security awareness can create an invisible, yet very effective, security “layer”. Chapter 11 - Managing Physical Security
Security Lighting 163 • Protective lighting is often categorized by type or purpose: • Flood lighting: continuous illumination • Glare lighting: directed outward from the protected area • Controlled lighting: illumination that does not impede nearby operations • Moveable lighting: manually operated portable lamps • Emergency lighting: standby lamps that come on when primary lighting goes out. Chapter 11 - Managing Physical Security
Security Lighting 163 • Protective lighting is often categorized by type or purpose: • Fluorescent lamp: efficient and economical but casts illumination over a relatively short distance. • Gaseous discharge lamp: mercury (blue-white color); sodium (golden-yellow). Long life spans, but are slow to come to full illumination • Quartz lamp: produces a bright white light. Can be intensely glaring. Reaches full illumination similar to an incandescent lamp. Chapter 11 - Managing Physical Security
Types of Sensors 163 • Breaking of a circuit • Interruption of a light beam • Movement • Sound • Vibration • Change in an energy field • Two types of sensors: exterior or interior (some can be both) Chapter 11 - Managing Physical Security
Direction of Reliability 170 • Amount and pattern of energy emitted by the intruder. • Size of the intruder • Distance between the sensor and the intruder • Speed at which the intruder is moving • Direction of intruder movement • Characteristics of the energy waves of the intruder and of the environment in which the sensor operates Chapter 11 - Managing Physical Security
When Selecting An Alarm 171 What to consider: • Reliability:sensitivity, environment, behavior of intruder. • Frequency of false alarms • Ability of the sensors to detect attempts to thwart or circumvent detection. Chapter 11 - Managing Physical Security
Lock and Key Systems • Types of Locks • Key • Combination • Electronic Chapter 11 - Managing Physical Security
Lock and Key Systems • Key lock: • Warded lock: has obstructions in the keyway or lock • Combination lock: used in safes, vaults, and doors • Electronic lock: digital locks that open when the correct code is entered by pushing buttons. • Electromechanical locks: that open when an electronic signal is received Chapter 11 - Managing Physical Security
Locks • Lock Strengths: • Grade 1 (commercial and industrial use) • Grade 2 (heavy duty residential/light duty commercial) • Grade 3 (residential and consumer expendable) • Cylinder Categories • Low Security (no pick or drill resistance) • Medium Security (some pick resistance) • High Security (pick resistance through many different mechanisms—used only in Grade 1 & 2 locks) Chapter 11 - Managing Physical Security
Key Control • Key control is an organized and formal security system which addresses control of master keys within a building or facility. • Key control prevents unauthorized access using documentation management and status reporting of critical elements in the master key system. Chapter 11 - Managing Physical Security
Key Control • The critical elements of facilities security are: • Physical keys (either issued keys or stored keys) • Key holders • Physical locations • Information on the products used in a location Chapter 11 - Managing Physical Security
Key Control • Important key control questions you should know the answers to: • What is your keying systems? • What keys do you have? • What keys have you issued? • What keys are not accounted for? • Where are the keys? • Who has them? • Where did they go? • Can I account for all my keys? Chapter 11 - Managing Physical Security
Two-Person Rule 175 • Whenever an area is so sensitive that unaccompanied entry cannot be permitted it is wise to use the two-person rule. • Two people must sign out for the key or • Two people must simultaneously turn two separate locks with their corresponding keys Chapter 11 - Managing Physical Security
Dual Systems of Key Control 176 • One system for nonsensitive situations. • One system for sensitive situations. Chapter 11 - Managing Physical Security
Perimeter Security • Locks are inexpensive access control mechanisms that are widely accepted and used. • Locks are considered delaying devices. • Know your locks! Chapter 7 - Internal Threats & Countermeasures
Perimeter Security • Types of Locks • Mechanical Locks • Warded & Tumbler • Combination Locks • Cipher Locks (aka programmable locks) • Smart locks • Device Locks • Cable locks, switch controls, slot locks, port controls, peripheral switch controls, cable traps Chapter 7 - Internal Threats & Countermeasures
Perimeter Security • Lock Strengths: • Grade 1 (commercial and industrial use) • Grade 2 (heavy duty residential/light duty commercial) • Grade 3 (residential and consumer expendable) • Cylinder Categories • Low Security (no pick or drill resistance) • Medium Security (some pick resistance) • High Security (pick resistance through many different mechanisms—used only in Grade 1 & 2 locks) Chapter 7 - Internal Threats & Countermeasures
Double-hung windows can be locked with wedge locks, key-operated latches, or locking pins that go through one sash and into the next. See also: Security for French Doors. Window latch Sliding Window Lock Sliding Window Latch Keyed sash lock Keyed Patio Door Lock Deadbolt Patio Door Bar Patio door pin Chapter 6
Keypad Lock Chapter 6