0% found this document useful (0 votes)
28 views36 pages

Physical Security 2

The document discusses security measures for buildings including controlling access points, using alarms, monitoring keys and access cards, installing security glass and locks on doors and windows, and maintaining good housekeeping practices to control the facility and detect suspicious items.

Uploaded by

thrazh2287
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views36 pages

Physical Security 2

The document discusses security measures for buildings including controlling access points, using alarms, monitoring keys and access cards, installing security glass and locks on doors and windows, and maintaining good housekeeping practices to control the facility and detect suspicious items.

Uploaded by

thrazh2287
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 36

1

• Building walls establishes a second line of defense


against the intruder.
• The extent of this control will depend on the nature
and function of the facility; the controls must NOT
interfere with the facility’s operation.
• It is the responsibility of security to control traffic of
outsiders, customers, and service personnel, as well
as those authorized to enter.
• It is necessary to also consider the need to protect
against internal theft.

2
 The first point of examination in
determining inner defenses are the doors
and windows.
 Burglary-resistant glass, also known as
“safety glass,” resists heat, flame, cold,
picks, rocks and other tools that a burglar
or robber may use. It is a useful security
glazing material because it is durable,
weathers well, and is noncombustible.
On the other hand, it is heavy, difficult to
install, and expensive.

3
 Acrylic glazing material or
“Plexiglass” is much
stronger than ordinary glass,
is lighter in weight and
cheaper than safety glass,
and is considered a bullet-
resistant barrier.

4
 Whatever security
measures may be required
at any specific door will be
determined by the
operations within or by the
value of assets stored
inside.
 Doors are frequently much
weaker than the surface
into which they are
positioned.

5
• Door panels or the door itself may easily be broken
into.
• Locks may be old and ineffective.
• A poorly constructed door frame may allow a plastic
card to be easily inserted between door an jamb to
disengage the bolt in the lock.
• The lock cylinder may be forcibly pulled out of the
door, and then the lock operated through the hole left
in its face.
• The hinges may be exposed to the outside.

6
 Direct forcible assault is the method generally
used to gain entry,
 Picking the lock or making a duplicate key are
also commonly used methods in illegal entry.
 Lock picking and unauthorized use of duplicate
keys do not show signs of forced entry, and so,
result in difficulty in claiming against theft
insurance.

7
8
9
• May be operated by remote control.
• Employ magnetism to hold the door closed.
• When the electrical power is on, the lock can
withstand a pressure of up to 1,000 pounds.
• Problems will occur in the event of power failure. In
most cases, these locks are designed to open if the
power is turned off, for safety reasons.
• In high-security areas, these devices stay locked in
the event of loss of power. The door can only open if
power is restored.

10
• There must be a system of inventory and accountability in
issuance of keys. This record should indicate the name,
department where the person belongs, as well as the date of
issue.
• Keys should only be issued to those considered responsible
people.
• Keys should never be issued on a long-term basis to outside
janitorial personnel. Janitors and contractual personnel should be
issued interior keys only after being screened by the guard. Then
they should return the keys before they leave the building.
• A guard or building employee should control entry and exit
before and after regular building hours.

11
• If keys must be issued to tenants, the locks in the entrance
should be changed every few months and new keys issued to
authorized tenants.
• A key depository for securing keys during non-working hours
should be centrally located, locked, and kept under supervision
of security personnel.
• Keys issued on a daily basis, or those issued for a specific one-
time purpose, should be accounted for daily.
• Keys should be counted and signed for by the security
supervisor at the beginning of each working day.
• When a key is lost, the circumstances should be investigated and
set forth in writing.

12
 If the lost key provides access to sensitive areas,
locks should be changed.
 Master keys should be kept to a minimum.
 Sub-masters should be issued only to limited
personnel especially selected by management.
 Records should be reviewed periodically to
determine whether all those authorized should
continue to hold keys.

13
• In order to further protect against entry, alarm
systems are frequently employed to augment
physical and human barriers.
• Alarms may also substitute for costly construction of
barriers.
• Alarms do NOT act as a substitute for barriers, but
support barriers of lesser impregnability and
expense,
• Alarms also warn of movement in areas where
barriers are impractical, undesirable, or impossible.

14
1. Intrusion alarms
2. Fire alarms
3. Special use alarms – Ex. process reaching a
dangerous temperature, warn against the
presence of toxic fumes, or warn that a machine
is running too fast.

15
• An alarm sensor – which is designed to respond to
certain change in conditions, such as, the opening of a
door, movement within a room, or rapid rise in heat.
• A circuit or sending device – which sends a signal via an
electrical circuit that transmits the alarm signal over a
telephone, fiber optic lines, or even via radio waves.
• An enunciator or sounding device – is used to alert
someone when the alarm sensor detects a change in
condition. The device may be a light, bell, horn, or a
telephone dialer.

16
 Who can respond to an alarm fastest and most
effectively?
 What are the costs of such response as opposed
to a less efficient alternative?
 What is the comparable loss factor between these
alternatives?

17
• Electromechanical devices – are switches which are
turned on by some change in their condition. An example
of this is a magnetic contact switch attached to a window
or door.
• Pressure devices – are sensors that are activated when
pressure is exerted on them. They are usually installed on
floors or on the ground. If an intruder steps on the
pressure device, then the alarm is switched on.
• Taut wire detectors – are usually used in perimeter
defense, where they are stretched along the top of the
perimeter barrier.

18
• Photoelectric devices – use a beam of light transmitted as much
as 500 feet to a receiver. Should the beam be broken or
intercepted, the alarm is activated. These devices may also be
used to protect doors and windows from opening.
• Motion detection systems – operate with the use of radio
frequency transmission or with the transmission of ultrasonic
waves. The system emits a wave pattern that if absorbed or
altered, as by the presence of an intruder, will trigger the alarm.
Unfortunately, they are prone to false alarms.
• Vibration detectors – utilize a special type of contact
microphone. Used in many bank vaults.

19
20
 Local Alarm System
 Auxiliary System
 Central Station System
 Proprietary System

21
Basic good housekeeping reduces the opportunity for
planting suspect packages and helps deal with false
alarms and hoaxes.
• Keep public and communal areas - exits, entrances,
reception areas, stairs, halls, lavatories, washrooms -
clean and tidy
• Keep the furniture in such areas to a minimum -
ensuring that there is little opportunity to hide
devices
• Lock unoccupied offices, rooms and store cupboards

22
• Ensure that everything has a place and that items
are returned to that place
• Consider the removal of litter bins or replacing
them with clear bags
• Put plastic seals on maintenance hatches
• Keep external areas clean and tidy
• Prune vegetation and trees, to assist in
surveillance and preventing concealment of
packages.

23
• Staff vigilance is key to your protective measures.
• Staff should be encouraged to look out for unusual
behavior or items out of place.
• They must report any suspicions.
• Staff should be briefed to look out for packets, bags
or other items in odd places, carefully placed (rather
than dropped) items in rubbish bins and unusual
interest shown by strangers in less accessible places.

24
• An efficient reception area is essential to controlling
access, with side and rear entrances denied to all but
authorized people.
• Keep access points to a minimum and make sure the
boundary between public and private areas of your
building is secure and clearly signed.
• Invest in good quality access controls such as
magnetic swipe identification cards or 'proximity'
cards which are readable from a short distance.

25
 Staff should wear their passes at all times.
 Visitors should be escorted and should wear
clearly marked temporary passes, which must be
returned on leaving.
 Anyone not displaying security passes should
either be challenged or reported immediately to
security or management.

26
• The random screening of hand baggage is
a significant deterrent .
• Building owners have the right to refuse
entry to anyone who does not allow you to
search their possessions.
• Body searches may be carried out only
with the agreement of the person being
searched.
• Conduct searching and patrolling of
premises. Keep the patrols regular, but not
too predictable.

27
. Reasons for determining identity :
• To include or exclude the person as a member of a
certain class or group (for instance, to determine whether
a person is an employee or not).
• To allow or deny entry to a place;
• To issue or withhold material or information; and
• to permit or deny or qualify in some way the person’s
use of a privilege or right (for example, to determine if a
person is allowed to drive a company vehicle out of the
company premises.)

28
 To increase or reduce the rate or density of
movement to, from, or within a defined place (for
example, the volume of vehicles entering a paid
parking area);
 To protect persons, materials, or information
against unauthorized observation or removal;
 To prevent injury to persons or damage to things.

29
• It is valid.
• It is reliable.
• It should be resistant to tampering or
counterfeiting.
• It should be rugged and durable.

30
The following conditions are required:
• Prior familiarity
• Opportunity to observe
• Controllable turnover

31
 The document is submitted by the person being
identified. (Example: Govt-issued ID)
 The document is supplied by the organization
requiring the identification. (Example: company
ID of employee)

32
• Obviously distinctive. Use clear and legible writing,
company logos and other trademarks. Use of symbols
and logos also makes the ID more difficult to counterfeit.
• Resistant to tampering. The use of holograms is a
defence against counterfeiting.
• Unique to the authorized holder. The ID pix should be
current, in natural color, and sufficiently large to allow
comparison of distinctive features. Adding physical
description and the signature of the owner also further
protects the validity and reliability of the ID.

33
 Coded for access. Ex. color-coding to represent
different departments.
 Adaptable to display wearing, such as pinning or
clipping.
 Of limited period of validity. Recommended
period: every two or three years. This allows a
regular re-evaluation of those still authorized to
use them.

34
• Metal detectors are commonly used when weapons
or metals are to be detected when carried on the
person.
• In airports, x-rays are used to reveal whether a bag or
package contains illegal items or not.
• For detection of bombs and explosives, detection is
through the use of specially-trained dogs or
machines that can detect the presence of explosives
through vapor detection.

35
36

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy