CPP Study Course Protection of Assets Manual Physical Security.
-
Upload
augusta-gallagher -
Category
Documents
-
view
224 -
download
3
Transcript of CPP Study Course Protection of Assets Manual Physical Security.
![Page 1: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/1.jpg)
CPP Study CourseCPP Study Course
Protection of Assets ManualProtection of Assets Manual Physical SecurityPhysical Security
![Page 2: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/2.jpg)
Vulnerability
• Define the problem.– Kind of threats or risks.– Likelihood or probability of threat.– Impact or effect on assets.
• Loss Event Profile– Security counter measure should be provided if – It will cause an actual loss measurable by some standard– The loss is not speculative in the sense that nonoccurrence
would realize a gain– Loss Event Probability or Frequency
![Page 3: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/3.jpg)
Vulnerability (Cont.)
• Loss Event Probability or Frequency– Probability Factors
• Physical Environment• Social Environment• Political Environment• Historical Experience • Criminal State-of-Art
– Application of Probability Factors Analyses• Check List• Risk Matrix
![Page 4: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/4.jpg)
Vulnerability (Cont.)
• Probability Ratings– Virtually Certain– Highly Probable– Moderately Probable– Improbable– Probability Unknown
• Rating Symbols• Loss Event Criticality
![Page 5: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/5.jpg)
Vulnerability (Cont.)• Kinds of Costs to be considered
– Direct– Money– Negotiable Instruments
• Property• Information
• Indirect• Reputation• Goodwill• Loss of Employees• Morale of Employees
![Page 6: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/6.jpg)
Vulnerability (Cont.)• Criticality Ratings
– Fatal– Very Serious– Moderately Serious– Relatively Unimportant– Seriousness Unknown
• Preparing a Solution– Logically look at what must occur for threat to happen– Leverage attack point
![Page 7: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/7.jpg)
Vulnerability (Cont.)• Solving the Problem• Countermeasures
– Countermeasures Criteria• Validity• Degree of Reliability• Approximate Cost• Delay or Required time to implement
![Page 8: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/8.jpg)
Vulnerability (Cont.)
• Economic Justification of Security– Cost Avoidance– Loss Control– Asset Recoveries– Measuring Return on Expenditures
![Page 9: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/9.jpg)
Barriers
• Have Security in depth – Layers of security to delay and deter Natural
• Water• Mountains • Marshes• Deserts • Other Terrain difficult to traverse
![Page 10: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/10.jpg)
Barriers (Cont.)
“Structural Barrier physically and psychologically deters or discourages the undetermined, delays the determined, and
channels the flow of the traffic through entrances.”
![Page 11: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/11.jpg)
Barriers (Cont.)
• Structural Barriers– Building Surfaces
• Roofs, Floors and Walls– Building Openings
• Doors• Windows• Drives • Grills • Utilities into and out of area
– Metal, including drawn wire– Masonry
![Page 12: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/12.jpg)
Barriers (Cont.)
• Glass– Electrically Conductive Glass – Rough or patterned Glass– Mirrors and Transparent Mirrors– Tempered Glass– Laminated Glass– Bullet-Resisting Glass– Wired Glass– Acrylic Glass (plexiglass) (polycarbonate)
![Page 13: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/13.jpg)
Perimeter Barriers
• Perimeter Barriers– Chain Link Fencing
• Outriggers• Privacy slats
– Barbed Wire• Concertina Wire• Barbed Tape
– Expanded Metal and Welded wire Fabric
![Page 14: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/14.jpg)
Locking• Mechanical Lock
–Warded Lock–Lever Locks–Pin Tumbler Lock–Interlocking Pins–Multiple Axes Tumblers–Wafer Tumbler
• Key Accountability“The use of a single Grand Master combination for any
mechanical locking system is not a sound security practice.”
–Electromagnetic Lock –Electro-Mechanical Locks (breakaway strikes)–Electronic Lock (Crash bars)–Dial Type Combination Locks (Safe Locks)
![Page 15: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/15.jpg)
Alarm sensors
• Alarm sensors– Perimeter or point of entry– Area– ObjectOr
• Electro-mechanical– Foil– Switches– Wire and Screen Detectors– Pressure Mats
![Page 16: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/16.jpg)
Alarm sensors (Cont.)
• Sound wave-Microwave– Ultrasonic Detectors
• Capacitance (Safe Detection Mainly)• Vibration (Typically installed inside of safe or controlled areas.) • Audio (Glass break detectors)• Light (Infra-red Beam detectors)• Other
– Pressure – Thermal– Chemical
![Page 17: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/17.jpg)
Sensor Integration
• Types of Systems– Local Alarm– Central Station– Direct Connection– Proprietary
![Page 18: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/18.jpg)
Engineering Design• Protection Improvement• Patrol Reduction• CCTV and Personal Reduction• The Automated Security System• Centrally- Controlled Systems• Control Center Equipment• Costs• Personnel Control
– Identification– Access
• Monitoring Sensors• Supervision of Protection Personnel• Time and Attendance Recording• Programming the Computer
![Page 19: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/19.jpg)
Engineering Design (Cont.)• System Expansion• The Control Center• Emergency Power
– Standby Power– Continuous Power
• The System Design Task– System Objective– System and Subsystem Task Relationship
• The Vulnerabilities Analysis• Determination of Functional Countermeasures
– Countermeasures Network Relationships• Subsystem Importance• Complete Functional Statement
![Page 20: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/20.jpg)
Engineering Design (Cont.)
– Development of a Complete Functional Specification• Elements of a Typical Functional Specification
– General Requirements– Bid or Cost Proposal– Relevant Standards– Subsystem Description– Summaries of Devices– Alternate Approaches
– Evaluation of Proposals Responsive to Functional Specification
– Selection of the Supplier and Negotiation of the System Contract
![Page 21: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/21.jpg)
Communications• Line Protection• Wire Transmission of Alarm and Audio Signals
– Loop– Point to Point– Multiplexing
• Optical Fiber• Video Transmission by Wire
• Radio– Radio-Telephone– Cellular Telephone– Radio Interference– Microwave Transmissions
• Light• Interconnection• Communication Security
![Page 22: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/22.jpg)
Communications (Cont.)
• Scramblers– Frequency inverters– Bandsplitters– Rolling Bandsplitters– Frequency or Phase Modulators– Masking– Vocoder– Rolling Codes– Digital Coding and Encryption
![Page 23: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/23.jpg)
Identification
• To include or exclude someone or something from a group (employee, police officer , welfare recipient)
• To grant or Deny admittance• To Issue or Withhold material or information• To permit, Deny or qualify in some way a privilege
![Page 24: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/24.jpg)
Identification (Cont.)• Security Applications of Access Control
– Permit or deny entrance to or presence in a given place.– Increase or reduce the rate or density of movement to,
from or with in a defined place.– Protect persons, materials, or information against
unauthorized observation or removal.– Prevent injury to persons or damage to things.
• Performance Requirements – It is valid.– It is reliable– It is easy to use.– It should be resistive to surreptitious substitution or
counterfeiting.– It should be rugged and long-lived.
![Page 25: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/25.jpg)
Identification (Cont.)
• Performance Criteria– It should be physical adequate.– It should be valid and reliable– If mechanical or electro-mechanical, it should be easily
maintained.• Manual Access Control Systems
– Personal Recognition• Prior Familiarity• Opportunity to observe• Frequency of observation• Verifiable Authorization• Controllable
![Page 26: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/26.jpg)
Identification (Cont.)• Document Criteria
– Obviously distinctive– Resistive to surreptitious changes
• Watermark• Laminate the document.• Holograms
• Document Criteria Cont.)– Unique to the authorized holder
• Photograph• Description of holder
– Positive if coded or access– Adaptable for display wearing.– Of limited valid period.
![Page 27: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/27.jpg)
Access Control
• Automated Personnel Identification and Control– A device or artifact which can be possessed, such as a key
or coded card – Information which can be remembered, such as a personal
identification number (PIN) and/or– A uniquely personal characteristic, such as a fingerprint,
voice pattern, signature characteristics or retinal vascular pattern - the biometric approach.
![Page 28: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/28.jpg)
Access Control (Cont.)
• Coded Card System Elements– The card or token.– The sensing or point of entry device.– The control processor– The communications links between those two:and– The local or central database.
![Page 29: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/29.jpg)
Access Control (Cont.)• Magnetic Stripe
– ANSI/ ISO 7810 and 7811/2• Track 1 used by International Air Traffic Association
(IATA)• Track 2 used By American Bankers Association
(ABA)– Coercivity
• 300 oersteds (early card system usually)• 4000 oersteds
– Encoded data is read when the card is passed over the reader head.
• Insertion reader• Swipe reader
– Watermark (usually on Track 3 or 4)
![Page 30: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/30.jpg)
Access Control (Cont.)• Magnetic Matrix
– Advantages• Cards and readers are relatively inexpensive• Card codes are user changeable.• The card life is fairly long.• There is a low read error rate
– Disadvantages• Cards can be duplicated.• Interference from other magnetic energy fields
may occur.
![Page 31: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/31.jpg)
Access Control (Cont..)• Optical Matrix (Transparent Bar Code)
– Advantages• Low cost• Difficult to counterfeit• A low read error rate.• Avoidance of electromagnetic interference.• A relatively long life for the card and reader.
– Disadvantages• Cannot be user coded• Vulnerable to obscuring markings on card or
dirt/dust in reader
![Page 32: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/32.jpg)
Access Control (Cont..)• Hollerith Code (Hole Pattern)
– Advantages• very inexpensive• Large coding capacity• No read errors• Not vulnerable to electromagnetic interference
– Disadvantages• Codes not user changeable• Easy to duplicate• Short card life
![Page 33: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/33.jpg)
Access Control (Cont..)
• Electrical Matrix– Advantages
• None– Disadvantages
• Not durable• Easily Decoded • Not user Changeable• Bulky
![Page 34: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/34.jpg)
Access Control (Cont..)
• Capacitance Code– Advantages
• Diffcult to read or counterfeit• Low cost
– Disadvantages• User cannot change codes• Limited data carrying capacity
![Page 35: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/35.jpg)
Access Control (Cont..)
• Proximity Code– Advantages
• Hands-free operation• Low maintenance• Difficult to decode or counterfeit
– Disadvantages• Limited data coding capability.• Bulky• Substantially higher cost per card• Codes are not user changeable
![Page 36: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/36.jpg)
Access Control (Cont..)
• Wiegand Coding– Advantages
• Highly secure and resistive to alteration or counterfeiting.
• Durable cards.• Not vulnerable to radio frequency or
electromagnetic interference.– Disadvantages
• Cards are expensive• Codes not user changeable
![Page 37: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/37.jpg)
Access Control (Cont..)
• Bar Coding– Advantages
• Inexpensive• Cards and readers have long live• A large amount of data can be coded • A low error rate
– Disadvantages• Can be easily decoded and reproduced
![Page 38: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/38.jpg)
Access Control (Cont..)
• BioMetric Access– Fingerprint Identification– Speech Identification– Hand Geometry– Handwriting– Retinal Scan
• Detection of Weapons and Metal – Metal Detectors– X-ray Detectors
• Detection of Explosives– Vapor Trace Detection– Electron Detection
![Page 39: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/39.jpg)
Parking and Traffic Control
• Vehicular Access– Driveways and Ramps– Vehicle Checkpoints
• Locally Operated• Remotely Operated
• Signs and Placards• On-Premises Vehicle Safety• Vehicle Identification and Registration• Identifying Employee Vehicles• Identifying Delivery Vehicles• Identifying General Visitors• The Goal - All Vehicles Identified
![Page 40: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/40.jpg)
Parking and Traffic Control (Cont..)
“It is suggested that as many vehicles as possible be assigned general parking authorization and as few as possible be given reserved parking.”
• General On-Premises Parking– Lot Layout
• Smaller-than-Standard Cars• Larger-than-Standard Vehicles
• Reserved On-Premises Parking– Lot or Area Control– General Areas– Oversubscription– Mechanized Control– Differential Counter– Visitor Parking
![Page 41: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/41.jpg)
Parking and Traffic Control (Cont..)
• Violations and Sanctions• Parking Area Censuses• Personal Safety (Emergency Stations0
![Page 42: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/42.jpg)
Dogs for Protection
• Characteristics of Dog Behavior and Motivation– Senses
• Smell• Hearing• Sight• Touch• Intelligence• Sensitivity
– Over Sensitive Dog– Under Sensitive Dog– Moderately Sensitive Dog
– Energy
![Page 43: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/43.jpg)
Dogs for Protection (Cont..)– Aggressiveness
• Over Aggressiveness• Under Aggressiveness• Moderately Aggressiveness
– Willingness– Motivation
• Dogs are used for– Tracking– Detection of Drugs, Explosives and other substances– Protection or Patrol of an area alone– Protection of and area with handler– Guarding or a holding a person in a location– Aggressive attack
![Page 44: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/44.jpg)
Dogs for Protection (Cont..)
• Care Of Dogs– Kennels
• Noise• Drainage• Water Supply• Fire Protection• Lighting, Ventilation and Heat• Areas Relating to Kennels (Dog Runs)• Sanitation• Maintenance• Feeding Area
![Page 45: CPP Study Course Protection of Assets Manual Physical Security.](https://reader035.fdocuments.us/reader035/viewer/2022062308/56649ddf5503460f94ad8036/html5/thumbnails/45.jpg)
Dogs for Protection (Cont..)
• Grooming• Inspections
– Eyes– Ears– Nose– Mouth Feet– Skin and Hair– Limbs– Genitals– Anal Region– Temperature– Body Functions– Attitude