Download presentation
Presentation is loading. Please wait.
1
Physical and Technological Security
Week 5 Lecture
2
Personnel can account for most of the cost of security.
Physical and Technology based programs can better utilized the dollars spent.
3
What level of security do you want or can afford?
Protectionless security-really none. Doors and windows left unlocked. Little fear of theft. Minimum security-With little effort such as locks on the door. This may be acceptable for some houses. Low-level security-Reinforced doors and window and a local alarm. High-level security-This can include Closed circuit cameras , advanced perimeter and interior security systems highly trained security officers, and strong management commitment. Exceptional security-This advanced system detects, assesses, and neutralizes most unauthorized external and internal activity. This is tamper-resistant, complex systems, and highly trained and vetted personnel capable or responding immediately to any alarm condition and most threats. (State Patrol officers at the Capitol building or Governor's residence). Failsafe Security- Conceptual level of security in which serious losses over an extended period of time are unlikely.
4
To determine your protection level evaluate four types of issues.
What are the types of risks. The likelihood of occurring. The impact on operations. The resources reasonable available to identify the risks.
5
Access Control This is the process of controlling who or what is allowed on site. There are several methods available. Some are high tech and some are low tech.
6
Site Layout About 90% of the employers in the state of Washington are small. Their budget for security will not be big. What can the small business person do to control the access at their site?
7
Site Layout Site layout-This is depended on the type of business, but the principle is simple. Design the space placing barriers that restrict traffic through the area. Counter space-This provides a physical barrier between the public and non-public areas. This will not stop someone from jumping over the counter, but it does establish boundaries. Doors-Closed doors with signage limiting access to authorized personnel only. Doors with locks. Simple push button codes. Positioning of furniture and desks. Don’t forget that staff should have an escape route that is not blocked. Also consider hostile people. The escape route should be behind the worker. Equipment- Again this is dependent on what they are trying to protect and what they can afford. This could include items such as unmonitored closed circuit cameras, monitored alarms and motion detectors, tamper-proof locks, etc.
8
Large Employers This is much more complicated but you still ask the question “What am I trying to protect and what can I afford?”
9
What are my equipment needs?
Equipment need is determine by your site assessment. It’s influenced by what you are trying to protect and again, what you can afford.
10
Countermeasures to loss Source: Introduction to Security for Business Students(1998), Alexandria VA:ASIS. Strengths Deter Delay Detect Cost Facility Design x x x Low Animals x x x Low Barriers x x Low Security Glazing x x ??? Signs x Low Locks and Keys, Containers x x Low Lighting systems x Low Closed-circuit Television (CCTV) x x High Intrusion detection systems x x Moderate Access control systems x x x High Alarms Systems x x x High Robotic systems x Very High Communications x Moderate Information Security Systems x x Low to High Contraband Detection x x Very High Fire Detection and Life Safety x High
11
Animals Used for ever for protection. Dogs and geese have been used to protect NATO facilities.
12
The following are a few examples
The following are a few examples. This doesn’t cover everything and is not intended are a recommendation of any product.
13
Security Barriers Barriers-landscaping (bushes and shrubs), fences, Jersey Barriers, etc.
14
Security Glazing Security Glass
15
Signs Warning signs
16
Locks, Keys and Containers
17
Lighting Systems
18
Security cameras (CCTV)
19
Intrusion Detection Systems
Systems to deter and detect potential entry into protected area. Physical- Computer-
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.