Module 7 physical security system(new)

Preview:

Citation preview

PHYSICAL SECURITY SYSTEM

OBJECTIVE

At the end of the session, the trainees must be able to

* Define the Physical Security System;* Identify correctly the objectives of

Physical Security and It’s importance in the Security Industry

PHYSICAL SECURITY SYSTEM

The physical measures designed to safeguard personnel, property, and information, to prevent unauthorize access to equipment, installations, material and documents and to safeguard them against espionage, sabotage, damage, and theft.

PRINCIPLES OF PHYSICAL SECURITY SYSTEM

* The type of access necessary will depend on a number of variable factors and therefore may be achieve in a number of ways.

* There is no impenetrable barrier* Defence in depth – barrier after barrier * Delay provided against surreptitious

and non–surreptitious entry. * Each installation is different

BARRIERSARCHITECTURAL FEATURESLOCATION / LAY OUTBARRIER / DOORSLOCKS and BOLTSLIGHTINGS

STAFF and PROCEDURESDEPLOYMENTPOLICIES and PROCEDURESCOMMUNICATIONTRAINING

ELECTRONIC SYSTEMACCESS CONTROL SYSTEMALARM SYSTEMCCTV SYSTEMSCOMMUNICATIONS

WHAT ARE THE OBJECTIVES?

* DETERRENCE* DETECTION* DELAY* RESPONSE

HOW TO ACHIEVE THE OBJECTIVES?

* PROTECTION IN DEPTH* CPTED* RISKED – BASED APPROACH

PROTECTION IN DEPTHEXTERIOR PERIMETERS

BUILDING PERIMETERS

INTERIOR BARRIERS

INTERVENTION ZONE

CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN - CPTED

CPTED - is the proper design and effective use of the built environment which may lead to a reduction in the fear and incidence of crime, and an improvement of the quality of life.

TARGET HARDENING

SEVEN COMPONENTS OF CPTED

NATURAL SURVALLANC

E

TERRITORIALITY

DEFENSIVE SPACE

ACTIVITY PROGRAMME

FORMAL ORGANIZED

SURVAILLANCE

ACCESS CONTROL

RISK – BASED APPROACH

* PREPARATION* RESOURCE APPRECIATION* AUDIT OF EXISTING SECURITY

STRATEGIES* THREAT ASSESSMENT* IDENTIFICATION OF VULNERABILITIES* FORMULATION OF STRATEGIES

AND RECOMMENDATION

CONSIDERATIONS* Safety First* Support business misson* Adopt risk – based approach* Integrate with business operations* Aim at achieving the objective of

deterrenct, detection, delay and response* Plan for business continuity* Comply with rules and regulations* Establish policies and procedures* Raise staff awareness* Periodic review and continuous

improvement

COMMON MISTAKES * Putting security before lives* Not knowing what is at risk* Not achieving the objective* No policies and procedures* Not integrated with business operations* Low staff awareness of policies and procedures* No information classification* Not compliant with local rules and regulations

relevant to physical security* No business continuity planning

GOOD PRACTICE

TARGET

THREAT

CHARACTERISTICS

PLAN DEVELOP

DETECTION

DETERRENCE

RESPONSE

DELAY

COST / BENEFIT

FEASIBILITY

EVALUATE FINAL DESIGN

ASSESSMENT

QUESTIONS?

END OF PRESENTATION...Thank you for your time...

7.19.2011

Recommended