403 10

49
Chapter Ten: Physical and Procedural Security http://video.foxbusiness.com/v/ 932711473001/wikileaks-freedom-of-press-and- national-security/

Upload: doing-what-i-do

Post on 20-Jun-2015

82 views

Category:

Government & Nonprofit


0 download

DESCRIPTION

403-10

TRANSCRIPT

Page 1: 403 10

Chapter Ten: Physical and Procedural Security

http://video.foxbusiness.com/v/932711473001/wikileaks-freedom-of-press-and-national-security/

Page 2: 403 10

IntroductionSome factors that determine the

requirements for an individual system include a determination of what is the

actual risk or threat, what type of equipment is needed to protect the assets

of the organization, what methods are appropriate and the methods and means to deploy the whole package. Measures must be layered to provide diversity and

redundancy.

Page 3: 403 10
Page 4: 403 10

The primary function of a barrier is to delay the intruder as much as possible

and to force him to use methods of attack that are more conspicuous and noisy. As

the value of the target increases, however, the strength of the barrier must

increase proportionately. The trade-off between delay time and detection time is

perhaps the single most important consideration in designing a barrier.

Page 5: 403 10

Walls

Page 6: 403 10

At a minimum a good perimeter barrier should discourage an

impulsive attacker. To be effective a wall must be at least eight feet high

and must be substantially built. The wall should have a minimum

thickness at the top of nine inches and the foundation should have no

easy accessible footholds.

Page 7: 403 10

Fences

Page 8: 403 10

The fence itself needs to be sufficiently high, at least eight feet and should have at least six feet clear space on either side. Chain link fence is the most commonly used and is relatively cost effective. It should have a

mesh no larger than two inches and should be topped with some sort of barbed wire extending at an

outward angle. For airports, the U.S. government requires that the fence be at least 11 gauge wire.

Fence must also always be flush with the ground. If the facility is located in a sandy soil or loose soil area,

the fence needs to extend down into the ground.

Page 9: 403 10

Gates and Doors

Page 10: 403 10

Any opening larger than 20 cm must be adequately secured. All access points must be as secure as the fence or wall it breaches. To

fail to do so simply nullifies the physical barrier. Additionally, it must be adequately secured

when closed and the hinges must be sealed in order to prevent lifting. Separate pedestrian

and vehicle gates are essential. Doors need to be of solid timber or metal construction. If of

wooden construction they should be at least 44 cm thick but preferably 50 cm. A strong door

however is of little use if it can be pulled off the hinge.

Page 11: 403 10
Page 12: 403 10

1. Enable only those persons authorized to have access to secured areas to obtain that access.2. Immediately deny access at the access point to individuals whose access authority has changed.3. Have the capability of zone coding, so that it can admit or deny access by area.4. Have the capability of time-coding, being able to admit or deny access by time and date.

Access control restricts the ability of unauthorized individuals from gaining access to a specific area. Access control systems assure the proper identification of personnel across multiple facilities and locations on a selective basis, to secure areas.

The TSA obligates that access control systems must:

Page 13: 403 10

Smart Cards

Page 14: 403 10

They possess one or more integrated circuit chips capable of storing a great deal of

information and interpreting it. Smart cards are very complicated entities. It is just this

complexity which might doom them in the market place. They require sophisticated

microprocessors and exhaustive authorization procedures. Cards do not provide effective

security in the wrong hands. The card does not know who is holding it and the machine reading the signal or data does not know

either. An access card can simply not identify a specific individual using the card.

Page 15: 403 10

Biometrics

http://video.foxbusiness.com/search?q=Biometrics

Page 16: 403 10

a. Fingerprint—optical scanning of a finger which is matched to a database.b. Signature recognition—relies on the fact that individuals write with distinct motion and pressure. Forgers can duplicate the appearance but not the style.c. Hand geometry—utilizes the physical attributes of the hand such as the length of fingers.d. Speaker verification—utilizes the uniqueness of voice patterns.e. Eye retina—analyzes the blood vessel pattern of the retina.

Employees should all need to enroll their fingerprints or some other unique physical trait into a database. Currently, the following types are available commercially.

Page 17: 403 10

Locks

Page 18: 403 10

A lock is a mechanical device designed to prevent access to the object it protects. Locks are probably the most commonly used means of controlling access to

an area. The basic purpose of a lock and key system is to deter unauthorized entry. Two mechanical

principles are usually combined to defeat the intruder. The first is to utilize fixed obstructions to prevent use

except with an appropriate key and the second involves the use of movable levers that must be

aligned to function. Locks are still very valuable in that they increase the time an intruder needs to actually gain access. That time can be used to increase the

probability of being detected.

Page 19: 403 10

Volumes have been written on locks and how to defeat

them. Whatever type of lock is used, the longer it

takes to attack the lock, the greater the exposure for the

intruder.

Page 20: 403 10

Closed Circuit Television (CCTV)

Page 21: 403 10

Closed circuit television has become the most common security device in many applications, not just along a perimeter. The sophistication may range from simple fixed black and white

monitoring cameras to infrared capability. A significant enhancement to CCTV came with digitization. Video security

systems that protect large scale air, land, and sea transportation systems must be extremely reliable and meet a wide range of

image quality, communications, storage, and display requirements. Unfortunately, some of these attributes compete

with each other. Common to all of these requirements is the need for the utmost in system reliability. Video security systems

must be able to instantly and autonomously detect and compensate for transient and permanent faults not only in

themselves but also in the network and mass storage infrastructure on which they rely

Page 22: 403 10

Alarms

Page 23: 403 10

Should the fence, barrier, or wall be circumvented, alarm systems are the next

line of defense. Alarms can be silent, audible, or visual. There are three basic

types of alarm systems. They include intruder alarms, fire alarms, and special use

alarms. Intervention must occur to stop the actual intruder.

Page 24: 403 10

Signs

Page 25: 403 10

Signs, of course, will not stop an uninvited and unwanted intruder. However, they will redirect the inadvertent intruder or wandering visitor. All areas identified as

those needing to be restricted necessitate appropriate markings. As regards

transportation facilities, the TSA has determined that, at a minimum these

signs should be posted at intervals of no more than 100 feet.

Page 26: 403 10

Lighting

Page 27: 403 10

Adequate lighting on the perimeter is also a mandatory security function. The spread

of the light should be directed outward from the fence line. This will illuminate

the approach of an intruder and also obstruct the intruder’s view. An

unobstructed 20 foot view is useless if it is cloaked in complete darkness. No reliance

should be placed on street lights or adjacent lighting on other premises. They

cannot be controlled.

Page 28: 403 10

Exterior Alarm Sensors

Page 29: 403 10

A fence provides minimal protection. Lighting adds to the protection level.

However, the combination of a fence, proper lighting, and at least two sensors greatly increases the

probability that an intruder will be detected. Sensors can be expensive,

and the actual threat must be weighed against the cost.

Page 30: 403 10

Motion Detectors

Page 31: 403 10

These devices are based on the simple concept of detecting

motion. They operate by radio frequency or ultrasonic wave

transmission.

Page 32: 403 10

Microwave

Page 33: 403 10

Microwave motion detectors operate on the Doppler effect using an emitter and a

receiver. An energy field is transmitted into an area and monitored for a change in its pattern and frequency. Due to their

extremely high radio frequency, the microwave detection pattern can see “too

much” causing confusion as to what is actually a threat.

Page 34: 403 10

Electric Fields

Page 35: 403 10

They require a field generator that has a long field wire and a sense wire, that are placed parallel to

each other. If an intruder approaches the fence, the signal is

interrupted.

Page 36: 403 10

Vibration/Stress Detectors

Page 37: 403 10

These units can detect someone simply walking into a protected area from a completely concealed unit. Near fences they can be installed

under ground in order to follow along the terrain and the actual weight of

the intruder affects the system. Most systems can be adjusted for sensitivity so that small animals do not trigger it.

Page 38: 403 10

Infrared Motion Detectors

Page 39: 403 10

Active Infrared- Active infrared systems are photoelectric using visible or invisible

pulsed infrared beams. Passive Infrared- An infrared detector literally sets a “virtual” barrier along a path. Passive infrared detectors do not

even emit any energy. They are passive in that they do not transmit a signal for an

intruder to disturb. They are in the strictest sense only receivers which detect the body

heat of an intruder.

Page 40: 403 10

Glass Breaking Detectors

Page 41: 403 10

and a second space coverage type of

acoustical sensors that protect all the glass in a specific

area.

There are two categories of these. One which attaches directly to the glass being protected

Page 42: 403 10

The Control Room

Page 43: 403 10

All of the unique devices installed in a complete security system need to be controlled from a

central point.

Page 44: 403 10

Continuous Power

Page 45: 403 10

Unless a security system has power, it is severely

handicapped. Alarm systems should always be programmed

to report a current failure or low battery conditions. Testing

of the back-up system is critical.

Page 46: 403 10
Page 47: 403 10

The student should have developed a sense of what components of an effective security system might be lacking in a particular environment

and be able to take countermeasures consistent with the threat and vulnerability of a

particular transportation environment.

Page 48: 403 10

Case Study: Sometime between midnight on December 24th and 7 am on the morning of December 25th, UConn was burglarized. An alarm company, contracted for by

UConn, had received two separate alarm signals. A guard was dispatched but failed to gain entrance to the building. Later, a second company, which was monitoring a CCTV system saw burglars and called the police. However, it was too late and all of the

computers in one building were stolen. Will a disclaimer of liability in the contract stand

up in court? How could UConn have protected itself better?

Page 49: 403 10

Discussion Questions and Exercises

1. Define the components of an adequate barrier. 2. Local communities usually pass ordinances to curtail false alarm responses by the police. From the user’s standpoint is this an advantage or a disadvantage?3. Discuss the disadvantages of a CCTV system.4. In providing for security needs, are aesthetics important to the security manager? 5. How do private security officers assist public police in your jurisdiction?6. List the parts of an alarm system.7. Design a storage building that will contain transportation assets. Include locks, lighting, and alarms that would be appropriate.8. Obtain data from you local police on false alarms in your community.

9. Explain the pros and cons of modern biometrics.10. How has digitalization transformed CCTV?