Physical and Technological Security

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

INTRUSION ALARM TECHNOLOGY
PowerPoint ® Presentation Chapter 14 Homeland Security Homeland Security Building Layout Specific CBR Attack Prevention Recommendations Securing Outdoor-
Step two in developing a food defense plan.  Foot and Mouth Disease (FMD)  Spring 2001 outbreak in UK  Complete ban on sale of British cattle, pigs.
UNIT PHYSICAL SECURITY PLAN
In-depth look at ISACS Stockpile Management: Weapons Photo: MAG.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Physical Security John Schwertfeger Security Manager Duane Arnold Energy Center.
Phone: Fax: Emergency Mgmt.: Fire Safety: 15 Edgewood Avenue Atlanta, Georgia website:
Chapter 5 Enhancing Security Through Physical Controls
SECURITY HARDWARE & TECHNOLOGY CCPOA REGION 3 TRAINING CLASS MAY 11, 2011.
Contractor Induction Program Gippsland Southern Health Service is committed to a safe and healthy work environment.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
1 Exotic Disease Response Training Introduction to Movement Control.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
EMPLOY THE RISK MANAGEMENT PROCESS DURING JOB PLANNING and EXECUTION
1. 1.Define Systems Approach 2.List selection criteria for selecting at- risk neighborhoods. 3.Define neighborhood boundaries. 4.List assessment team.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Phone: Fax: Emergency Management Director: Fire Safety Officer: 15 Edgewood Avenue Atlanta,

Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
SafeZone® patent pending 1 Detect. Inform. Prevent. Metcalf Attack #2 August 27, 2014 SafeZone® Detect. Inform. Prevent.
Levels of safety Priorities for eliminating hazards in the workplace Eliminate the hazard through the machine design stage Apply safeguarding technology.
Fire Precautions Regulations 1997 Alexi and Mat. Employers Responsibility Employers are responsible for providing multiple access and exit points in the.
Merseyside Fire and Rescue Service Fire Safety Inspections.
Chapter 18 Institutional Security. Special Security Institutions  Hospitals and other health care facilities.  Educational institutions.  Libraries.
Chapter 6 Enhancing Security Through Procedural Controls.
Lesson 4 Physical Security - Motion Sensor - Passive Ultrasonic Sensor - Photoelectric System - Ultrasonic - Ultrasonic Motion Sensor - Vibration Sensor.
Physical (Environmental) Security
Chapter 19 Other Applications of Security at Work.
1 GSA Public Buildings Service GSA Western Regions Client Enrichment Series Welcome to today’s presentation on: Security Charges the presentation will.
SEC 410 Entire Course (UOP) SEC 410 Week 1 DQ 1 (UOP)  SEC 410 Week 1 Individual Physical Security Paper   SEC 410 Week 1 DQ 1   SEC 410 Week 1 DQ.
10. Security and Physical Protection Basic Concepts
INMM Nuclear Security and Physical Protection Technical Division.
LMZ Retail: Asset Protection through Robbery Prevention Nate Toon Unit 7 Project CJ 180 Prof. Bashore.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Warehousing and Storage Principles Session 12 – Security Day 6 / PM.
Located in the Lake Havasu, which is a big reservoir behind the Parker Dam from the Colorado River, the Storage in Lake Havasu is capable to offer professional.
SEC 410 cart Expect Success/sec410cartdotcom FOR MORE CLASSES VISIT
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Protecting Houses of Worship Security Plan Development Considerations Glenn Moore Protective Security Advisor – Oklahoma District National Protection and.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
Chapter 9 Security and Safety. I. Security: An Overview A. SECURITY DEFINED B. SECURITY OBLIGATIONS 1. Foreseeable Harm A landlord’s duty to take security.
Protecting Your Job Site with Construction Security Melbourne.
SEC 410 Help Bcome Exceptional / sec410.com
Security Best Practices in Vital Records Offices
Department of Juvenile Justice
Arson Risk Reduction Bradford Fire Prevention
Risk management.
Target Hardening 4 D’s of CRIME PREVENTION
Internal Control.
Crime Prevention Through Environmental Design
The University of Adelaide, School of Computer Science
Security Management Measures
Safety and Security of Radiation Sources
Narration by Bill Roth, Voice of the Hokies
International Workshop on National Registers of Radiation Sources
A Holistic Approach to School Security
Objectives Telecommunications and Network Physical and Personnel
Locking the Means of Egress in Health Care Facilities
Physical Security.
MidAmerica Nazarene University
MidAmerica Nazarene University
MidAmerica Nazarene University
Part 1 Security Action Plan Template.
Responding to Door Alarms
FACILITY TARGET HARDENING
Presentation transcript:

Physical and Technological Security Week 5 Lecture

Personnel can account for most of the cost of security. Physical and Technology based programs can better utilized the dollars spent.

What level of security do you want or can afford? Protectionless security-really none. Doors and windows left unlocked. Little fear of theft. Minimum security-With little effort such as locks on the door. This may be acceptable for some houses. Low-level security-Reinforced doors and window and a local alarm. High-level security-This can include Closed circuit cameras , advanced perimeter and interior security systems highly trained security officers, and strong management commitment. Exceptional security-This advanced system detects, assesses, and neutralizes most unauthorized external and internal activity. This is tamper-resistant, complex systems, and highly trained and vetted personnel capable or responding immediately to any alarm condition and most threats. (State Patrol officers at the Capitol building or Governor's residence). Failsafe Security- Conceptual level of security in which serious losses over an extended period of time are unlikely.

To determine your protection level evaluate four types of issues. What are the types of risks. The likelihood of occurring. The impact on operations. The resources reasonable available to identify the risks.

Access Control This is the process of controlling who or what is allowed on site. There are several methods available. Some are high tech and some are low tech.

Site Layout About 90% of the employers in the state of Washington are small. Their budget for security will not be big. What can the small business person do to control the access at their site?

Site Layout Site layout-This is depended on the type of business, but the principle is simple. Design the space placing barriers that restrict traffic through the area. Counter space-This provides a physical barrier between the public and non-public areas. This will not stop someone from jumping over the counter, but it does establish boundaries. Doors-Closed doors with signage limiting access to authorized personnel only. Doors with locks. Simple push button codes. Positioning of furniture and desks. Don’t forget that staff should have an escape route that is not blocked. Also consider hostile people. The escape route should be behind the worker. Equipment- Again this is dependent on what they are trying to protect and what they can afford. This could include items such as unmonitored closed circuit cameras, monitored alarms and motion detectors, tamper-proof locks, etc.

Large Employers This is much more complicated but you still ask the question “What am I trying to protect and what can I afford?”

What are my equipment needs? Equipment need is determine by your site assessment. It’s influenced by what you are trying to protect and again, what you can afford.

Countermeasures to loss Source: Introduction to Security for Business Students(1998), Alexandria VA:ASIS. Strengths Deter Delay Detect Cost Facility Design x x x Low Animals x x x Low Barriers x x Low Security Glazing x x ??? Signs x Low Locks and Keys, Containers x x Low Lighting systems x Low Closed-circuit Television (CCTV) x x High Intrusion detection systems x x Moderate Access control systems x x x High Alarms Systems x x x High Robotic systems x Very High Communications x Moderate Information Security Systems x x Low to High Contraband Detection x x Very High Fire Detection and Life Safety x High

Animals Used for ever for protection. Dogs and geese have been used to protect NATO facilities.

The following are a few examples The following are a few examples. This doesn’t cover everything and is not intended are a recommendation of any product.

Security Barriers Barriers-landscaping (bushes and shrubs), fences, Jersey Barriers, etc. http://www.thermal-solution.com/securitybarrier/securitybarrier.htm http://www.markstaar.com/ http://www.ultrablock.com/JerseyBarrier.html

Security Glazing Security Glass http://www.shattergard.com/home.html

Signs Warning signs http://www.safetysigns.com/?src=overture

Locks, Keys and Containers http://www.medeco.com/

Lighting Systems http://en.wikipedia.org/wiki/Security_lighting

Security cameras (CCTV) http://www.mysbp.net/home/security.htm http://www.securitycameraworld.com/

Intrusion Detection Systems Systems to deter and detect potential entry into protected area. Physical- http://www.adt.com/comm/ Computer- http://en.wikipedia.org/wiki/Intrusion_detection_system