Presentation is loading. Please wait.

Presentation is loading. Please wait.

The University of Adelaide, School of Computer Science

Similar presentations


Presentation on theme: "The University of Adelaide, School of Computer Science"— Presentation transcript:

1 The University of Adelaide, School of Computer Science
Effective Physical Security Fourth Edition The University of Adelaide, School of Computer Science 22 July 2018 Chapter 5 Protective Barriers Copyright © 2013, Elsevier Inc. All rights reserved.. Chapter 2 — Instructions: Language of the Computer

2 The University of Adelaide, School of Computer Science
22 July 2018 Overview Protective barriers form perimeter of controlled, limited, and exclusion areas Natural protective barriers—terrain features (mountains and deserts, cliffs and ditches, etc.) Structural protective barriers—human-made devices (fences, walls, floors, roofs, etc.) #5 Protective Barriers Copyright © 2013, Elsevier Inc. All rights reserved.. Chapter 2 — Instructions: Language of the Computer

3 Copyright © 2013, Elsevier Inc. All rights reserved..
Overview Important benefits in physical security: Create a psychological deterrent Delay or prevent passage Direct impact on number of security posts needed and frequency of use Copyright © 2013, Elsevier Inc. All rights reserved..

4 Copyright © 2013, Elsevier Inc. All rights reserved..
Overview Considerations for type of structural barrier Weighing cost of completely enclosing area against threat and cost of alternate security Sizing restricted area based on degree of compartmentalization required Copyright © 2013, Elsevier Inc. All rights reserved..

5 Copyright © 2013, Elsevier Inc. All rights reserved..
Overview Barrier size should be kept to a minimum consistent with operational efficiency Restricted area size driven by likelihood of tactics that may be used Example: Protecting area from vehicle bomb Copyright © 2013, Elsevier Inc. All rights reserved..

6 Copyright © 2013, Elsevier Inc. All rights reserved..
Overview Establish protective barriers for: Controlling vehicle/pedestrian traffic flow Entry control points for ID checks Precluding visual compromise Delaying forced entry Protecting individual assets Copyright © 2013, Elsevier Inc. All rights reserved..

7 Copyright © 2013, Elsevier Inc. All rights reserved..
Overview Temporary limited or exclusion area can be established with temporary barriers Barriers may not be needed in limited or exclusion areas or integrated with other controls Inspect and maintain barriers at least weekly. Copyright © 2013, Elsevier Inc. All rights reserved..

8 Copyright © 2013, Elsevier Inc. All rights reserved..
Perimeter Entrances Should be designated to maintain full control without delaying traffic Enough entrances to accommodate peak flow Adequate lighting for inspection During nonduty hours: Lock gates Illuminate during darkness Roving patrol Copyright © 2013, Elsevier Inc. All rights reserved..

9 Entry-Control Stations
At main perimeter entrances where security personnel are present Construction and use based on info outlined in USACE STD Located as close as practical to perimeter entrance to allow constant surveillance Copyright © 2013, Elsevier Inc. All rights reserved..

10 Entry-Control Stations
Additional considerations: Establish holding area for unauthorized vehicles Establish control measures (window decals, specially marked vehicles) Copyright © 2013, Elsevier Inc. All rights reserved..

11 Entry-Control Stations
If manned 24 hours: Interior and exterior lighting Interior heating Glassed area for adequate observation If needed, design for optimum personnel ID and movement control Should have telephone and radio Copyright © 2013, Elsevier Inc. All rights reserved..

12 Entry-Control Stations
Signs to: Assist in controlling authorized entry Deter unauthorized entry Preclude accidental entry Should d be plainly displayed and legible Copyright © 2013, Elsevier Inc. All rights reserved..

13 Entry-Control Stations
Should be hardened against attack, using methods such as: Reinforced concrete or masonry Steel plating Bullet-resistant glass Sandbags (two layers in depth) Bullet-resistant building components Copyright © 2013, Elsevier Inc. All rights reserved..

14 Copyright © 2013, Elsevier Inc. All rights reserved..
Internal Barriers Barriers—psychological deterrents allowing unauthorized access Physical barriers—control entry points and complement security program and officers Examples: Turnstiles, access control Copyright © 2013, Elsevier Inc. All rights reserved..

15 Copyright © 2013, Elsevier Inc. All rights reserved..
Internal Barriers Functions of structural/natural barriers: Define protection area boundaries Delay—slow traffic or access Direct access to garages, parking lots, etc. Deny unauthorized access Copyright © 2013, Elsevier Inc. All rights reserved..

16 Copyright © 2013, Elsevier Inc. All rights reserved..
Internal Barriers Designing security and layout of site: Can begin with either exterior or interior If begun on outside: Main lines of defense—perimeter barriers on outer edge of property Second line of defense—exterior of building Third line of defense—interior Copyright © 2013, Elsevier Inc. All rights reserved..

17 Copyright © 2013, Elsevier Inc. All rights reserved..
Internal Barriers Passive Structural Barriers Jersey barriers Large boulders or rocks Large, round cement stones Fences Gates Bollards at entrances Active Structure Barriers Hydraulic bollards Motor-operated lift-arm gates Pop-up wedges All geared to control traffic at entrances and exits Copyright © 2013, Elsevier Inc. All rights reserved..

18 Copyright © 2013, Elsevier Inc. All rights reserved..
Barrier Planning Remember (con’t): Walls more expensive than fences/other components Fences/walls provide only limited delay. For substantial protection, combine a fence/wall with security lighting, intruder detection system, etc Perimeter should be short as possible. Emergency gates for safe evacuation Copyright © 2013, Elsevier Inc. All rights reserved..

19 Copyright © 2013, Elsevier Inc. All rights reserved..
Barrier Planning Remember (con’t): Perimeters should run in straight lines between corner posts. Drains/culverts should be protected. Ground on both sides of a perimeter barrier should be cleared. Copyright © 2013, Elsevier Inc. All rights reserved..

20 Copyright © 2013, Elsevier Inc. All rights reserved..
Barrier Planning Remember (con’t) Sterile zone protected by a double fence may be required Security guard force to support perimeter Exterior emergency phones connected to security officer’s desk Barriers are deterrents. Copyright © 2013, Elsevier Inc. All rights reserved..

21 Copyright © 2013, Elsevier Inc. All rights reserved..
Fence Standards Perimeter fence/wall should meet requirements of local planning/licensing authorities. More than 7 feet high Concrete fence posts with 3 strands of barbwire on top, embedded in concrete curb 45-degree angle point up and outward Copyright © 2013, Elsevier Inc. All rights reserved..

22 Copyright © 2013, Elsevier Inc. All rights reserved..
Fence Standards If value of site assets high or if a known risk, consider augmenting fence with: Security lighting CCTV Intruder detection system Security guard fence Copyright © 2013, Elsevier Inc. All rights reserved..

23 Types of Security Fences
In ascending order of effectiveness: Industrial security chain-link fence Standard anti-intruder chain-link fence Standard steel palisade fence High-security steel palisade fence Power fencing Upgraded palisade fences Copyright © 2013, Elsevier Inc. All rights reserved..


Download ppt "The University of Adelaide, School of Computer Science"

Similar presentations


Ads by Google