module 7 physical security system

Post on 08-Jun-2015

1.245 Views

Category:

Business

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

BE-NETTE C. REVIDAD, CST

At the end of the session, the trainees must be able to

Define the Physical Security System; Identify correctly the objectives of

Physical Security and It’s importance in the Security Industry

The physical measures designed to safeguard personnel, property, and information, to prevent unauthorize access to equipment, installations, materail and documents and to safeguard them against espionage, sabotage, damage, and theft.

ARCHITECTURAL FEATURESLOCATION / LAY OUTBARRIER / DOORSLOCKS and BOLTSLIGHTINGS

STAFF and PROCEDURESDEPLOYMENTPOLICIES and PROCEDURESCOMMUNICATIONTRAINING

ELECTRONIC SYSTEMACCESS CONTROL SYSTEMALARM SYSTEMCCTV SYSTEMSCOMMUNICATIONS

The type of access necessary will depend on a number of variable factors and therefore may be achieve in a number of ways.

There is no impenetrable barrier Defence in depth – barrier after barrier Delay provided against surreptitious and

non–surreptitious entry. Each installation is different

DETERRENCE DETECTION DELAY RESPONSE

PROTECTION IN DEPTH CPTED RISKED – BASED APPROACH

EXTERIOR PERIMETERS

BUILDING PERIMETERS

INTERIOR BARRIERS

INTERVENTION ZONE

“The proper design and effective use of the built environment can lead to a reduction in fear of crime and te incidence of crime and to an improvement in the quality of life”

Dr. Jeffery, CPTED

Natural access control utilises walkways, fences, lighting, signage and landscape to clearly guide people and vehicles to and from the proper entrances. 

Image and maintenance ensure that a building or area is clean, well kept and free of graffiti or litter. If a property is untidy and littered with trash and graffiti, it sends the message that no one cares for the property and undesirable behaviour will be tolerated. 

Territoriality allows for the feeling of pride or ownership of a place while also creating a welcoming environment. It is important to project the image that a property is well cared for and those responsible for it will protect it. 

Natural surveillance maximises the ability to spot suspicious people or activities. Clear sight lines and visible entranceways are helpful while dimly lit or isolated areas create a more comfortable location for criminals to act. 

Activity support encourages the intended use of public space by residents. An unsafe area may see a loss of business or a lack of people on the street, for example. An area active with legitimate users deters criminal activity. 

Hierarchy of space identifies ownership of an area by clearly delineating private from public space with boundaries such as decorative sidewalks, lawns, and hedges.

Proper allocation of space features a design or location decision that takes into account the surrounding environment and minimises the use of space by conflicting groups.   In addition to creating an environment in which criminals feel uncomfortable, the goal of these design principals is also to foster an environment in which law-abiding citizens do feel comfortable and secure. 

NATURAL SURVALLAN

CE

TERRITORIALITY

DEFENSIVE SPACE

ACTIVITY PROGRAMM

E

FORMAL ORGANIZED SURVAILLAN

CE

ACCESS CONTROL

TARGET HARDENING

PREPARATION RESOURCE APPRECIATION AUDIT OF EXISTING SECURITY

STRATEGIES THREAT ASSESSMENT IDENTIFICATION OF VULNERABILITIES FORMULATION OF STRATEGIES

AND RECOMMENDATION

Safety First Support business misson Adopt risk – based approach Integrate with business operations Aim at achieving the objective of deterrenct,

detection, delay and response Plan for business continuity Comply with rules and regulations Establish policies and procedures Raise staff awareness Periodic review and continuous improvement

Putting security before lives Not knowing what is at risk Not achieving the objective No policies and procedures Not integrated with business operations Low staff awareness of policies and

procedures No information classification Not compliant with local rules and

regulations relevant to physical security No business continuity planning

TARGET

THREAT

CHARACTERISTICS

PLANDEVELOP

DETECTION

DETERRENCE

RESPONSE

DELAY

COST / BENEFIT

FEASIBILITY

EVALUATEFINAL

DESIGN

ASSESSMENT

Thank you for your time...

7.19.2011

top related