Physical Security: 150 Things You Should Know
eBook - ePub

Physical Security: 150 Things You Should Know

  1. 204 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Physical Security: 150 Things You Should Know

About this book

Physical Security: 150 Things You Should Know, Second Edition is a useful reference for those at any stage of their security career. This practical guide covers the latest technological trends for managing the physical security needs of buildings and campuses of all sizes. Through anecdotes, case studies, and documented procedures, the authors have amassed the most complete collection of information on physical security available. Security practitioners of all levels will find this book easy to use as they look for practical tips to understand and manage the latest physical security technologies, such as biometrics, IP video, video analytics, and mass notification, as well as the latest principles in access control, command and control, perimeter protection, and visitor management. - Offers a comprehensive overview of the latest trends in physical security, surveillance, and access control technologies - Provides practical tips on a wide variety of physical security topics - Features new technologies, such as biometrics, high definition cameras, and IP video - Blends theory and practice with a specific focus on today's global business environment and the various security, safety, and asset protection challenges associated with it

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Physical Security: 150 Things You Should Know by Lawrence J. Fennelly,Marianna Perry in PDF and/or ePUB format, as well as other popular books in Social Sciences & Information Management. We have over one million books available in our catalogue for you to explore.
Part 1

Property Management

Abstract

There is a group of people out their referred to as Property Managers; they not only control the budget but also play the role of decision makers when it comes to the protection of their property. Their responsibility is the same as ours—the protection of people, property, and facilities through the use of security forces, security systems, and security procedures.

Keywords

ASIS; Army field manual; Badges; Biometrics; Card access control systems; CPTED; Deterrents; Environment; Fences; Flash mob; Guidelines; Internal theft; Metal detectors; Physical barriers; Physical security; Proactive; Property management; Risk; Signage; Target harding; Types of doors; Vandalism

1. What Is Physical Security?

There are different opinions and interpretations about exactly what physical security is, but the two definitions below incorporate all the aspects and are all-inclusive.
The American Society for Industrial Security (ASIS) International (2005) defines physical security as follows:
Physical security focuses on the protection of people, property, and facilities through the use of security forces, security systems, and security procedures. Physical security personnel oversee proprietary or contract uniformed security operations, identify security system requirements, assess internal and external threats to assets, and develop policies, plans, procedures, and physical safeguards to counter those threats. Physical security can include the use of barriers, alarms, locks, access control systems, protective lighting, CCTV, and other state-of-the-art security technology.1
The Army Field Manual, No. 3–19.30 defines physical security as ā€œthat part of security concerned with physical measures designed to safeguard personnel; to prevent unauthorized access to equipment, installations, material, and documents; and to safeguard against espionage, sabotage, damage, and theft.ā€2

2. Effective Physical Security

Someone has to question design, development, and event planning decisions. Do you think that anyone from the police department or fire department for that matter asked the builder of a major hotel in Kansas City whether they had extra steel reinforcing rods left over when they built the cross-bridge that fell and resulted in many deaths and injuries? Did anyone ask the planners how the downtown pedestrian malls would respond when the ā€œFlash Mobā€ fad swept the country in early 2000–16? No! Major planning mistakes were made then and continue to be made because no one is asking the right questions.
• People: Will always be the number one aspect in security. Their motivation and training make it work.
• Policy/procedure: Allows for easy enforcement.
• Hardware: Must be state of the art and highly reliable.
• Facilities: Although each complex may look different in shape and design, the principles and concepts are the same.
• Information: Proactive responses and documentation are needed.
• Human resources department: A critical area, especially when the termination of an employee is to take place. For example, access cards will need to be disabled and ID badges need to be returned/recovered along with any keys to mechanical locks.

3. Site and Target Hardening

Some factors to consider when hardening a site or facility include:
1. Layered security or defense in depth—a single protection approach is not effective, but instead a series of levels that complement each other are needed.3
a. The ASIS security glossary (2006) defines layered security as, ā€œa physical security approach that requires a criminal to penetrate or overcome a series of security layers before reaching the target. The layers might be perimeter barriers, building or area protection with locks, CCTV and guards’ and point and trap protection using safes, vaults, and sensors.ā€4
2. Standoff distance—the distance between a critical asset and the nearest point of attack.
a. The Department of Homeland Security has designed a standard standoff distance chart to protect critical assets, such as buildings and areas, from the effects of a bomb blast.5
3. Structural integrity of the premises—against attacks and natural disasters.
a. Structural integrity can be assessed to determine how reliable a structure is to be able to withstand day-to-day activities as well as natural and man-made disasters.
4. Redundancy of operation systems—such as power; heating, ventilation, and air conditioning (HVAC); and communications systems.
a. Have backup systems that are in place and tested to endure operability.
Sample recommendations are as follows:
• The HVAC exterior intakes should be protected to prevent the introduction of harmful materials into the intake systems. Some buildings place air intakes high above the ground or on the roof, whereas others use physical barriers to prevent unauthorized access to the air intakes. Intrusion detection devices, video surveillance, and/or security officers may be utilized.
• Air intakes exhaust and ventilation openings greater than 10 in. in diameter should be secured and/or monitored to prevent unauthorized access to or the introduction of a biological agent into the building.6
• It should be ensured that there is no subterranean access to buildings through underground utility openings such as water intakes, sewers, vents, or ducts. Any opening larger than 96 in. should be protected with welded bar grills. An alternative to one large pipe with access into the facility is the construction of multiple pipes, each having a diameter of less than 10 in. but with the same capacity as the one large pipe.6
• It should be ensured that there is no access to buildings through roof-mounted air returns, ventilation louvers, or maintenance hatches.
Additionally, we have 10 items listed below to consider as part of your physical security program:
1. Use effective lockdown procedures and products.
2. Make window glazing impact and bullet resistant.
3. Improve access control with appropriate visitor screening.
4. Identify sexual predators.
5. Stay current on real-time crime and local incident data.
6. Utilize duress alarms for additional immediate response.
7. Use mass notification tools like beacons, digital signage, public address systems, and electronic device alerts.
8. Maximize entry/exit door security.
9. Utilize internet protocol (IP) cameras with effective storage capabilities.
10. Expedite response time of emergency response personnel.

4. Physical Barriers

Phy...

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Quote
  6. Dedication
  7. In Memoriam
  8. Foreword
  9. Part 1. Property Management
  10. Part 2. Assessing Risk and Vulnerabilities
  11. Part 3. Crime and Crime Prevention Techniques
  12. Part 4. Fire Protection, Emergency Management, and Safety
  13. Part 5. Emerging Trends
  14. Index