Vous êtes sur la page 1sur 33

University Of Nueva Caceres

Naga City

College Of Criminal Justice


Education

INTRO TO Physical
INDUSTRIAL Security
SECURITY
MANAGEMENT
CONCEPT Dr. Lorlie B.Tanjay
Subject Professor
Physical security
 A system of barriers placed between potential
intruders and the matter to be protected.
 Part of security concerned with PHYSICAL
MEASURES designed to safeguard personnel
and to prevent unauthorized access to
equipment, facilities, material, document and
to protect them from espionage, sabotage,
and damage to property or theft.
 This is the broadest type of security.
The application of physical
security is the process of using
layers of physical protective
measures to prevent unauthorized
access, harm, or destruction of
property.
In essence, physical security
protects a property, plant, facility,
building, office, and any or all of
their contents from loss or harm.
Physical security
 Physical security includes:
 Layered defense model
 Crime prevention through environmental design
 Facility and infrastructure criteria

 Primary goal
 Lifesafety is the prime goal in physical security.
 In emergencies. organization must ensure safety
of personnel before safety of the facility or
equipment.

5
Concept of physical security

1. Enemy agents must access


2. There is no impenetrable
barrier
3. Surreptitious vs non-
surreptitious entry
4. Each installation is different
Goals of physical security
1. Deterrence for Crime and disruption
 Convince threat agent not to attack
 Fence, Security Guards, etc
2. Delay to reduce damage
 If attacked, delay long enough to detect and respond
1. Before damage to IS or information occurs
2. Layers of Defense, barriers, etc.
3. Detection of crime or disruption
 Develop capability to detect attacks that cannot be
delayed forever.
1. For example install Smoke Detectors, CCTV, etc
4. Assessment
 Once detected, assess the method of attack, the target,
and remediation
5. Respond procedures
 Take appropriate actions without overreacting (fire
suppression, Emergency response, etc)
7
Barriers

 Physical structures capable of restricting,


deterring, delaying or preventing illegal
and unauthorized access to an
installation.
 Types:
 1. Natural
 2. Manmade
Threats to physical security
1. Natural/environmental
2. Utility systems
3. Human-made/politics events
4. Malicious threat sources and countermeasure
1. Theft
Countermeasure: Strong Access controls, IDS, locked doors, etc.
2. Espionage
Countermeasure: good hiring process, background checks, etc.
3. Dumpster Diving
Countermeasure: proper disposal policy and procedure, etc
5. Social engineering and shoulder surfing (In computer security,
shoulder surfing is a type of social engineering technique used to obtain
information such as personal identification numbers (PINs), passwords and
other confidential data by looking over the victim's shoulder)
1. Countermeasure: employee awareness program, etc

9
Line of defense
1. First line- perimeter
barrier
2. Second line- building
exterior
3. Third line- internal
control
Layered defense model

 Security through “layers” of controls-Mutli–


layered:
 perimeter, grounds, building entrances

11
Specific types of physical
security barriers
1. Natural barriers
2. Structural barriers
3. Human barriers
4. Animal barriers
5. Energy barriers
Perimeter barriers

 Perimeter security controls: first line of


defense
 Protective barriers either natural or structural
 Offer Natural barriers, such as terrain
 Structural barriers  fences, gates, and facility
walls
 Landscaping
 Ponds, hedges can provide a barrier or entry
point
 Spiny shrubs (thorny woody plant) make it harder
for an intruder to enter
13
Perimeter barriers

1. Gates and doors


2. Sidewalks elevator
3. Utilities opening
4. Clear zones
Fences /controlled access points
 Fences
 Enclose Security areas and designate property boundaries
 No parking near fences
 Gates – minimum number needed.
 Bollards
 variety of sizes and shapes depending on use
 Retractable ones are designed for traffic control
 Provide security against vehicles ramming into or stopping
near buildings
 Lighted bollards can be used for lighting controls along
parks, paths, and sidewalks

15
TYPES OF FENCES
1. SOLID FENCE
2. FULL VIEW FENCE
3. WIRE FENCE
Buildingwalls
Bodies of water
Perimeter intrusion detection systems
 Detectsunauthorized access into an area
 Some of the characteristics are:
 Photoelectric
 Active infrared beam that triggers an alarm when crossed.
 Ultrasonic
 Ultrasound energy bounced off the floors, walls, objects. The
receiver detects the foreign signal change caused by the
intruder and sounds the alarm
 Microwave
 Receiver diode picks up transmitted and bounced energy
waves in an enclosure. Intruder disrupts the waves and
activities
 Passive infrared
 Where objects radiate IR with the heat of their bodies.
Detector notes change and triggers an alarm
 Pressure sensitive
 Detects pressure on the sensor or surrounding area

18
Closed Circuit Television (CCTV)
 CCTV  an excellent tool for security.
 Not a simple security device.
 blind-spots, motion detection systems, and workplace
privacy.
 CCTV capability requirements
 Detection
 Recognition
 Identification
 Mixing capabilities
 Provide joint capabilities
 Virtual CCTV Systems
 Fake systems that are installed as a deterrent
20
CCTV main components
 CCTV have three main components:
 Camera lens
 Fixed
 Zoom
 Automatic iris
 Fresnel lens

 Transmission media
 Wired or Wireless
 Display monitor
 National television System Committee (NTSC)
 Phase Alternative Line (PAL)

21
CCTV concerns
 Total surveillance

 Size depth, height, wand width

 Lighting

 Contrast

23
Lighting
 Use with other controls
 Support crime prevention
 Type
 Continuous
 A series of fixed lights arranged to flood a given area during
hours of limited visibility
 Trip
 activated by sensor that detects activity such as movement or
heat
 Standby
 Like continues lighting but lights not always on but are turned
on either automatically or manually when suspicious activity
suspected.
 Emergency
 Is used for power failures or other emergencies that render
normal system inoperative
24
Building entry point protection
 Locks
 Considered delay devices and not foolproof barriers to
entry
 Lock components
 Lock body
 Strike and strike plate
 Key
 Cylinder
 Types of locks
 Combination
 Deadbolt
 Keyless
 Smart
25
Lock picking /security measures
 Lock picking
 Basic picking tolls are tension wrench and pick
 Locks are “pick-resistant”, not “pickproof”
 Lock and key control system
 Key control procedures
 Who has access to keys?
 To whom are the keys issued?
 Key inventory

 Combination locks must be changed


 Every
twelve months and when possibly
compromised, etc 26
Other important Controls
 Guards and guard stations
 provide a deterrent
 Electronic physical controls
 Card Access
 Biometric Methods
 Compartmentalized areas
 Extremely sensitive location and most stringent security controls
 Multi-layered physical access controls
 Data Center/ server room security
 Wall solid, of fire-proof material and permanent part of floor and ceiling
 Multi-factor access controls
 Computer equipment protections
 Laptop and portable device security
 Docking stations, tracing software, etc.
 Computer equipment security
 Protecting the device, data, etc
 Objects placed inside security containers
 Safes, vaults, etc

27
Crime prevention through environmental
design

 Managing the physical environment


 Relationships between people and
environments
 Three key strategies of CPTED (Crime
Prevention through Environmental Design)
 Territoriality
 Surveillance
 Access control
28
Site and Facility considerations
 Site security
 Location of building
 Where to build
 Surroundings
 Highway
 Airport
 Military base, etc
 CPTED should be part of the process
 Facility security
 Entry points
 Primary & secondary Entrances
 Windows, etc
 Doors
 Hollow-Core versus solid-core
 Isolation of critical areas
 Lighting of doorways, etc
 Windows
 Standard plate glass
 Tempered glass, etc

29
Infrastructure
 Infrastructure support systems
 Electrical
power
 water/plumbing
 Steam lines, etc

 Key threats to support the system


 Fire-
Damage & destruction of facilities
 Water-flooding/dripping
 Power loss- Disruption/ stop operations
 Gas leakage-explosion
 HVAC failure-overheating/overcooling, etc

30
Fire
Concerns
 Abiding by fire codes
 Fire containment system
 Fire extinguishing system
 Fire prevention training and drills

Protection
 Fire prevention
 Fire detection
 Fire suppression

31
Fire types and suppression
 common combustion ( fuel, oxygen, etc)
 Suppression: water, foam, dry chemicals
 liquid
 Suppression: gas, CO2, foam, dry chemicals
 Electrical
 Gas, CO2, dry chemicals
 Combustible metals
 Dry powders
 Cooking Media
 Wet chemicals
32
Halon Gas
Restricted by 1987 Montreal protocol
Halon is no longer used due to this,
and many jurisdictions require its
removal
Alternative replacements are:
PFC-410 or CEA-410,PFC-218 or CEA-308,
etc
Water
CO2
33
Electrical power faults
 Complete loss of power
 Blackout
 Fault
 Power Degradation
 Brownout
 Sag/Dip
 Surge
 Transients
 Inrush Current
 Electrostatic Discharge
 Interference (noise)
 Electromagnetic Interference (EMI)
 Radio Frequency Interference (RFI)
34

Vous aimerez peut-être aussi