3 Cpted, Eacs & CCTV Monitoring
3 Cpted, Eacs & CCTV Monitoring
CRIME
PREVENTION
THROUGH
ENVIRONMENTAL DESIGN
Training Objective
By defining the Physical and Procedural layer in general will help influencing human behavior and
thereby helps us to prevent criminal activities
CPTED- Purpose of Access Control
The basic idea of Physical access control is to create barriers to prevent unauthorized people from entering a
physical space. In other words, physical access control ensures that only those who are allowed to enter an area can
enter it.
Barriers to physical access can be either physical barriers – a locked door, a turnstile, a fence – or barriers of
authority.
A barrier of authority is a person or a sign explaining any restrictions.
Physical access is very often controlled via a physical access control system i.e. software and hardware
designed to work in combination with electronic door locks and authorization guidelines.
These systems translate an organization’s guidelines about who has access to what (e.g. rooms, equipment,
vaults, etc.) into verification that locks and unlocks access.
CPTED Principles - Brief
Physical security: the measures which are used on individual building to ensure that they withstand attack.
Surveillance: design ensuring that residents are able to observe the areas surrounding their area. Surveillance can be facilitated
by ensuring that front doors face onto the street; that areas are well illuminated and blank walls are avoided.
Above involves mechanical controls – incorporation of security hardware (e.g. CCTV, locks, lighting).
Movement control: the restriction of access, egress and through movement. High levels of through movement allow offenders to
access and egress an area; permits identification of targets and increases anonymity.
Management and maintenance: the processes are in place to ensure that a development is free from signs of disorder. This
signals that the area is cared for.
Defensible space: the ownership of space in a neighborhood should be clearly defined. For example: public semi-public; semi-
private and private.
• Furthermore, the physical environment may be managed in order to reduce the opportunity for crime: Natural – inclusion of basic
security and behavioural provisions, influencing how spaces/buildings are used (e.g. definition of borders, windows for
surveillance).
• Organized – formal, human security (e.g. police, patrols).
Key components of physical security include:
• Access control and monitoring of physical access should cover the entire area, using sophisticated
physical security tools such as biometric and ID card restrictions. However, it is important to
understand the pros and cons of each measure and how these access controls can be forged.
• Surveillance, containing burglar alarms, guards, and CCTV that keeps a complete record of the
entire movement. High-risk areas may have sophisticated detectors to ensure a more holistic view.
The general principles of physical security measures should respond to:
• Physical Security Perimeter
• Physical Input Controls
• Security of Offices, Rooms, and Facilities
• Protection against External and Environmental Threats
• Working in Safe Areas
• Public Access, Loading and Unloading Areas
• Protection and Disposal of Equipment
Perimeter wall with barbed fencing
Automatic Perimeter Gate
Locked State
Access control doors
Basics components of Electronic Access Control and Video
Monitoring System
Activity – Name the below pictures
Flap barrier, Half Height & Tripod turnstile
Full height Turnstile Man trap Portal
Boom barrier with ANPR
CCTV Camera
1. Dome Camera
2. Bullet Camera
3. PTZ Camera (Pan, Tilt and Zoom Camera)
• The bullet camera will work better for a long-range video while the dome camera will work better for shorter
distances but a wide-angle.
• PTZ cameras are made to view larger areas, since they support 360 degrees of horizontal and 90 degrees, or even 180
degrees of vertical rotation
Reality vs requirement
Access control software
A access control software system will contain a database of different access levels
and lists of which people belong to those access levels. It will actually control the
locking mechanisms on various doors and barriers in accordance with the access
level of the person providing credentials.
The beauty of access control systems – as opposed to issuing actual keys to open
physical locks – is the ability to designate which credentials can open which doors,
and to turn off access at a moment’s notice. It is far too easy for a physical key to be
lost or stolen, requiring physical door lock changes that are quite costly.
Advantages of access control system
Here are a few examples of why this functionality is helpful, using a hypothetical company that uses a key card
access control system:
•John gets hired to work as a program developer at a medical laboratory. While he has access to most areas of the
building, he does not have the authority to enter the bio-lab unaccompanied. His key card cannot open the lab door.
•Mary recently left for a new position at another company. When she left, she forgot to return her key card. The
system administrator can simply turn off access and her card will no longer unlock doors.
•Therehas been an accident in the lab. No one is allowed to enter until emergency personnel arrives. The doors can be
remotely locked and all access denied.
•Visitors to the organization receive visitor badges and are issued cards with baseline access to common areas. If a
visitor does not return a card after checking out, the card is deactivated.
ALARM MONTIORING SOFTWARE SCREEN
Alarm monitoring screen
Alarm monitoring associate
Security operation center Executives/ Operators/ managers will continuously monitor the facility access control and
video monitoring system for active alarms of low TO high priority.
Officer must be aware of all the access control alarm types and its priority.
Response time: Response time is very crucial as delaying in response leads to serious security incidents. Hence it is
very important for an officer at alarm monitoring station to be alert at any point of time. Leaving an alarm unnoticed will
be considered as serious security issue and hence this act will lead to immediate termination of security personnel.