1 Introduction to Security Chapter 6 Enhancing Security through
Physical Controls
Slide 3
2 Crime Prevention Through Environmental Design (CPTED) Began
in the early 1960s A fundamental concept in security design that is
based on the premise that effective use and manipulation of the
physical environment can reduce criminal behavior
Slide 4
3 Crime Prevention Through Environmental Design (CPTED) 4 Key
Strategies: 1. Territoriality 2. Natural Surveillance 3. Activity
Support 4. Access Control
Slide 5
4 Crime Prevention Through Environmental Design (CPTED) 1.
Territoriality: Most people tend to protect area that they feel is
their own, and have a certain amount of respect for others. Fences,
pavement treatments, signs and landscaping all help to express
ownership.
Slide 6
5 Crime Prevention Through Environmental Design (CPTED) 2.
Natural Surveillance -This is almost entirely based off of the fact
that criminals do not want to be seen. - place physical activities,
features and people in a way that they can be observed - remove
trees, sheds, bushes and other sight obstructions
Slide 7
6 Crime Prevention Through Environmental Design (CPTED) 3.
Activity Support - encourage legitimate activity in public spaces -
any activity that gets people out and interacting helps to
discourage crime - basketball courts in parks, neighborhood
parties, etc.
Slide 8
7 Crime Prevention Through Environmental Design (CPTED) 4.
Access Control - properly located entrances/exits - fencing -
lighting - receptionist at a front desk - a neighbor sitting on
their front porch
Slide 9
8 An Overview of Physical Controls Concentric Zone Theory based
on the premise that the more valuable an asset is, the more
protection it needs
Slide 10
9 Concentric Zone Theory
Slide 11
10 An Overview of Physical Controls 3 Basic Lines of Physical
Defense: 1. The perimeter of the facility 2. The building exterior
3. The interior
Slide 12
11 Basic Security Equipment A. Locks - key, key card or smart
card operated first used in Egypt over 4,000 years ago - remains
one of the oldest, most commonly used methods of access
control
Slide 13
12 Basic Security Equipment B. Biometrics - the science of
using individual physiological features or behavioral
characteristics to positively identify a person Examples:
fingerprint, iris/retinal scans, hand geometry, voice, et al.
Slide 14
13 Basic Security Equipment C. Lighting - intruders want
darkness to cover their actions - 3 out of 4 commercial burglaries
are committed within buildings with little or no light
15 Basic Security Equipment D. Alarms - date back to 390 BC
when geese were used - many federally insured institutions are
required to use them - some insurance companies offer discounts for
alarm installation/use
Slide 17
16 Basic Security Equipment D. Alarm uses: Burglar Fire
Temperature Humidity Water flow Electrical power
Slide 18
17 Basic Security Equipment D. Alarm system types: Local sound
on the premises only Proprietary a constantly-manned alarm panel
operated by the owner Central Station similar to proprietary,
except usually operated off premises by an alarm company Police
Connected the alarm is directed via phone lines to the nearest
police dept.
Slide 19
18 Basic Security Equipment D. Alarms False Alarms More than
90% of all intrusion alarms are false alarms, resulting in needless
expense and risks on the part of responders. Because of the high
number of false alarms, many cities prohibit alarms connected
directly to the police department.
Slide 20
19 Basic Security Equipment E. Closed Circuit Television (CCTV)
A generic term, generally meaning a system in which a number of
video cameras are connected in a closed circuit or loop, where the
images are sent to a central television monitor or recorded. CCTV
systems range from basic system to very complicated networks.
Slide 21
20 Basic Security Equipment E. Closed Circuit Television (CCTV)
Cameras may be overt or covert, or semi-covert. Overt out in the
open Covert hidden Semi- Covert cameras are in public view but
behind a one-way transparent covering.
Slide 22
21 Basic Security Equipment E. CCTV other technology: Internet
Protocol Video (IP) Video can be sent across a companys data
network so that it can be viewed wherever the company chooses.
These can cause bandwidth and digital storage issues for a companys
network.
Slide 23
22 Basic Security Equipment E. CCTV other technology: Night
Cameras most popular kind use image intensification that amplifies
available visible and near- infrared light to achieve better vision
Thermal Imaging operates on the principle that all objects emit
infrared energy that can be seen using a thermal imager
Slide 24
23 Privacy concerns There is concern over the amount of, or
rather lack of, privacy by private, non-criminal citizens through
the extensive use of surveillance methods. Some cities are passing
legislation to govern these types of devices and their use.
Slide 25
24 Facility Physical Defense Guidelines
Slide 26
25 The Perimeter The perimeter can be controlled by a variety
of ways: A. Fences 2 basic types Ornamental Chain Link
effectiveness can be increased by adding razor wire, barbed wire,
etc.
Slide 27
26 The Perimeter The perimeter can be controlled by a variety
of ways: B. Alarms C. Perimeter Lighting Floodlights Street lights
Fresnal units Searchlights
Slide 28
27 The Perimeter The perimeter can be controlled by a variety
of ways: D. Surveillance Cameras E. Vehicle Barriers Active require
some action by a person or equipment to be raised into place
Passive a fixed device with no moving parts, such as guard rails,
concrete poles, etc.
Slide 29
28 The Perimeter The perimeter can be controlled by a variety
of ways: F. Patrols Security Officers Patrol or Guard Dog units
roam alone inside a perimeter or building to deter intruders
Slide 30
29 The Perimeter The perimeter can be controlled by a variety
of ways: G. Signs H. Physical Layout When possible, we should
always try to maintain a clear zone of 20 feet on either side of
the perimeter
Slide 31
30 The Building Exterior For some facilities, the exterior is
the first line of defense. Keys for effective security: Strong,
locked doors Limited number of entrances Secured openings (>96
sq. inches) Alarms Surveillance Lighting
Slide 32
31 The Building Interior Internal physical controls are usually
required along with external controls. Secure areas should be
separated from non-secure areas if possible.
Slide 33
32 The Building Interior Safeguards: Locks Alarms Mirrors
Document shredders Vaults/ safes Bolt down large, moveable
equipment Lock down devices on office equipment Surveillance
systems
Slide 34
33 The Building Interior The Command Center Should be linked to
the security control center Should be in a tightly controlled area
Can also monitor access Increasingly, staff members of the command
center can also handle computer network issues if need be.
Slide 35
34 The Physical Security System The goal is to provide the
amount of security needed - neither too much nor too little. This
is a balancing act between aesthetic, operational, safety and
security needs.
Slide 36
35 The Physical Security System Physical security footprint the
mark left during or after a security action that the public sees
and lets them know security is present.