1 Introduction to Security Chapter 6 Enhancing Security through Physical Controls.

Slides:



Advertisements
Similar presentations
McMaster Universitys Moveable Assets Policy Property Protection.
Advertisements

INTRUSION ALARM TECHNOLOGY
CLOSED CIRCUIT TELEVISION (CCTV) SURVEILLANCE SYSTEMS
How Electronic Security Solutions can Help the Government in Securing its Assets and Reduce Energy expenditure Presented By- Nimish Vishnoi Manager-Product.
Neighborhood Watch John E. Williams, CPS Certified Crime Prevention Specialist Beavercreek Police Department.
Presentation Retail Security Key Holding Mobile Patrols Access Control Systems Manned Security Receptionist CCTV Monitoring.
1 Introduction to Security Chapter 15 Institutional Security.
Instructor SSG JOHNSON
Tel: Unique Home Security Systems Security Supplies Captures Boards Digital Video Recorders Power Line Communication Wireless Solutions.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fifteen Police Technology Tracking and Surveillance.
Western District Station 8900 Freedom Center Blvd Manassas VA Phone: Prince William County Police.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
EMI Systems Limited specializes in CCTV surveillance systems that ranges from stand-alone cameras to fully integrated security control centers and to the.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Chapter 5 Enhancing Security Through Physical Controls
Crime Prevention Through Environmental Design
SECURITY HARDWARE & TECHNOLOGY CCPOA REGION 3 TRAINING CLASS MAY 11, 2011.
Crime Prevention Through Environmental Design
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
TAPA BARRACKS AT/FP EVALUATION 5 JUNE 12.
Information Security Principles and Practices
© 2001 National Burglar & Fire Alarm Association Chapter 10 The Central Station –24 hour /7day Operation –Receive Signals –Process Signals –React.
Surveillance camera in terms of business. Index *surveillance systems * Types of control systems * Elements of control systems * Types of monitoring camera.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
1 INTRUSION ALARM TECHNOLOGY DETECTION DEVICES. 2 INTRUSION ALARM TECHNOLOGY Detection devices can be either passive or active. Passive devices typically.
1. 1.Define Systems Approach 2.List selection criteria for selecting at- risk neighborhoods. 3.Define neighborhood boundaries. 4.List assessment team.
Bus. Computer Applications Supervised by: t. Ahmed Abu msameh Prepared by Mohammed fathi al – amawi ID : CCTV systems.
Three Lines of Defense Presented by the Arapahoe County Sheriff’s Office.
AMARI AIR BASE AT/FP EVAL 9 JUNE (No photos taken due to tight security)
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Alarms and Cameras Presented by Sgt. Steve Garst, L.C.C./ C.C.P.S. Little Elm Police Department Little Elm, Texas C.P.T.E.D. The third line of defense.
McMaster Rounds. A Crime Prevention Initiative designed to work with the community to improve safety on campus Basis of rounds is similar to “medical.
CPTED Crime Prevention Through Environmental Design.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
CPTED Fences and Landscaping Part of the FIRST line of defense Presented by Sgt. Steve Garst, L.C.C. Certified Crime Prevention Specialist Community Services.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Crime Prevention Through Environmental Design Presented by The Arapahoe County Sheriff’s Office.
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
CRIME PREVENTION AND THE BUILT ENVIRONMENT IN TANZANIA By Ludigija Boniface Bulamile, Lecturer, Department of Architecture, University College of Lands.
Chapter 18 Institutional Security. Special Security Institutions  Hospitals and other health care facilities.  Educational institutions.  Libraries.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
BE HOSPITABLE, BE SAFE PERSONAL AND PROFESSIONAL SECURITY Ofc. B.P.Corrado Colorado Springs Police Department School Resource Officer Palmer High School.
Lesson 4 Physical Security - Motion Sensor - Passive Ultrasonic Sensor - Photoelectric System - Ultrasonic - Ultrasonic Motion Sensor - Vibration Sensor.
Physical (Environmental) Security
Site Layout constructionsite.
Teaching Kids To Help Design Out Crime National Crime Prevention Council 2006.
Hospitality Operations Objective 3.04 Security. Objective Security  State the major responsibility of the Security Department The protection of.
Physical security By Ola Abd el-latif Abbass Hassan.
Unit 32 – Networked Systems Security
Physical Security Concerns for LAN Management By: Derek McQuillen.
CCTV SYSTEM There is a phrase commonly used among internet users i.e. “Nothing is Safe”. Adhering to this phrase industries have been trying from years.
CJ-180 Private Security Seminar Unit 4. Overview of Unit 4 Security Concerns Interior Exterior Intrusion Access Control Contingency Planning Fire Protection.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
What is a Brownfield? Brownfield: A tract of land that has been developed for industrial purposes, polluted, and then abandoned. – Merriam-Webster’s 10.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Home security consultants provide hardware and customer support services to help homeowners prevent crime and fires in their homes and on their property.
Chapter 9 Security and Safety. I. Security: An Overview A. SECURITY DEFINED B. SECURITY OBLIGATIONS 1. Foreseeable Harm A landlord’s duty to take security.
Protecting Your Job Site with Construction Security Melbourne.
SEC 410 Help Bcome Exceptional / sec410.com
Physical and Technological Security
Arson Risk Reduction Bradford Fire Prevention
The University of Adelaide, School of Computer Science
Crime Prevention Through Environmental Design
Crime Prevention Through Environmental Design
Access Control Limits the number of entrances and exits on a property.
CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN (CPTED)
Physical Security.
AEDESOL TECHNOLOGIES PVT. LTD.
Solar-Cam NW ™ Solar Powered Network Video Camera
The Store Starts Here: Increasing Awareness of Events and Customer Perceptions in Parking Lots.
Presentation transcript:

1 Introduction to Security Chapter 6 Enhancing Security through Physical Controls

2 Crime Prevention Through Environmental Design (CPTED)  Began in the early 1960s  A fundamental concept in security design that is based on the premise that effective use and manipulation of the physical environment can reduce criminal behavior

3 Crime Prevention Through Environmental Design (CPTED) 4 Key Strategies: 1. Territoriality 2. Natural Surveillance 3. Activity Support 4. Access Control

4 Crime Prevention Through Environmental Design (CPTED) 1. Territoriality: Most people tend to protect area that they feel is their own, and have a certain amount of respect for other’s. Fences, pavement treatments, signs and landscaping all help to express ownership.

5 Crime Prevention Through Environmental Design (CPTED) 2. Natural Surveillance -This is almost entirely based off of the fact that criminals do not want to be seen. - place physical activities, features and people in a way that they can be observed - remove trees, sheds, bushes and other sight obstructions

6 Crime Prevention Through Environmental Design (CPTED) 3. Activity Support - encourage legitimate activity in public spaces - any activity that gets people out and interacting helps to discourage crime - basketball courts in parks, neighborhood parties, etc.

7 Crime Prevention Through Environmental Design (CPTED) 4. Access Control - properly located entrances/exits - fencing - lighting - receptionist at a front desk - a neighbor sitting on their front porch

8 An Overview of Physical Controls Concentric Zone Theory – based on the premise that the more valuable an asset is, the more protection it needs

9 Concentric Zone Theory

10 An Overview of Physical Controls 3 Basic Lines of Physical Defense: 1. The perimeter of the facility 2. The building exterior 3. The interior

11 Basic Security Equipment A. Locks - key, key card or smart card operated – first used in Egypt over 4,000 years ago - remains one of the oldest, most commonly used methods of access control

12 Basic Security Equipment B. Biometrics - the science of using individual physiological features or behavioral characteristics to positively identify a person Examples: fingerprint, iris/retinal scans, hand geometry, voice, et al.

13 Basic Security Equipment C. Lighting - intruders want darkness to cover their actions - 3 out of 4 commercial burglaries are committed within buildings with little or no light

14 Basic Security Equipment C. Lighting 4 types: 1. Continuous 2. Standby 3. Moveable 4. Emergency

15 Basic Security Equipment D. Alarms - date back to 390 BC when geese were used - many federally insured institutions are required to use them - some insurance companies offer discounts for alarm installation/use

16 Basic Security Equipment D. Alarm uses: Burglar Fire Temperature Humidity Water flow Electrical power

17 Basic Security Equipment D. Alarm system types: Local – sound on the premises only Proprietary – a constantly-manned alarm panel operated by the owner Central Station – similar to proprietary, except usually operated off premises by an alarm company Police Connected – the alarm is directed via phone lines to the nearest police dept.

18 Basic Security Equipment D. Alarms – False Alarms More than 90% of all intrusion alarms are false alarms, resulting in needless expense and risks on the part of responders. Because of the high number of false alarms, many cities prohibit alarms connected directly to the police department.

19 Basic Security Equipment E. Closed Circuit Television (CCTV) A generic term, generally meaning a system in which a number of video cameras are connected in a closed circuit or loop, where the images are sent to a central television monitor or recorded. CCTV systems range from basic system to very complicated networks.

20 Basic Security Equipment E. Closed Circuit Television (CCTV) Cameras may be overt or covert, or semi-covert.  Overt – out in the open  Covert – hidden  Semi- Covert – cameras are in public view but behind a one-way transparent covering.

21 Basic Security Equipment E. CCTV other technology: Internet Protocol Video (IP) Video can be sent across a company’s data network so that it can be viewed wherever the company chooses. These can cause bandwidth and digital storage issues for a company’s network.

22 Basic Security Equipment E. CCTV other technology: Night Cameras – most popular kind use image intensification that amplifies available visible and near- infrared light to achieve better vision Thermal Imaging – operates on the principle that all objects emit infrared energy that can be seen using a thermal imager

23 Privacy concerns…  There is concern over the amount of, or rather lack of, privacy by private, non-criminal citizens through the extensive use of surveillance methods.  Some cities are passing legislation to govern these types of devices and their use.

24 Facility Physical Defense Guidelines

25 The Perimeter  The perimeter can be controlled by a variety of ways: A. Fences – 2 basic types Ornamental Chain Link – effectiveness can be increased by adding razor wire, barbed wire, etc.

26 The Perimeter  The perimeter can be controlled by a variety of ways: B. Alarms C. Perimeter Lighting Floodlights Street lights Fresnal units Searchlights

27 The Perimeter  The perimeter can be controlled by a variety of ways: D. Surveillance Cameras E. Vehicle Barriers Active – require some action by a person or equipment to be raised into place Passive – a fixed device with no moving parts, such as guard rails, concrete poles, etc.

28 The Perimeter  The perimeter can be controlled by a variety of ways: F. Patrols Security Officers Patrol or Guard Dog units – roam alone inside a perimeter or building to deter intruders

29 The Perimeter  The perimeter can be controlled by a variety of ways: G. Signs H. Physical Layout – When possible, we should always try to maintain a clear zone of 20 feet on either side of the perimeter

30 The Building Exterior  For some facilities, the exterior is the first line of defense.  Keys for effective security: Strong, locked doors Limited number of entrances Secured openings (>96 sq. inches) Alarms Surveillance Lighting

31 The Building Interior  Internal physical controls are usually required along with external controls.  Secure areas should be separated from non-secure areas if possible.

32 The Building Interior Safeguards: Locks Alarms Mirrors Document shredders Vaults/ safes Bolt down large, moveable equipment Lock down devices on office equipment Surveillance systems

33 The Building Interior The Command Center Should be linked to the security control center Should be in a tightly controlled area Can also monitor access Increasingly, staff members of the command center can also handle computer network issues if need be.

34 The Physical Security System  The goal is to provide the amount of security needed - neither too much nor too little.  This is a balancing act between aesthetic, operational, safety and security needs.

35 The Physical Security System  Physical security footprint – the mark left during or after a security action that the public sees and lets them know security is present.