Upload
be-nette-revidad
View
1.247
Download
0
Tags:
Embed Size (px)
Citation preview
BE-NETTE C. REVIDAD, CST
At the end of the session, the trainees must be able to
Define the Physical Security System; Identify correctly the objectives of
Physical Security and It’s importance in the Security Industry
The physical measures designed to safeguard personnel, property, and information, to prevent unauthorize access to equipment, installations, materail and documents and to safeguard them against espionage, sabotage, damage, and theft.
ARCHITECTURAL FEATURESLOCATION / LAY OUTBARRIER / DOORSLOCKS and BOLTSLIGHTINGS
STAFF and PROCEDURESDEPLOYMENTPOLICIES and PROCEDURESCOMMUNICATIONTRAINING
ELECTRONIC SYSTEMACCESS CONTROL SYSTEMALARM SYSTEMCCTV SYSTEMSCOMMUNICATIONS
The type of access necessary will depend on a number of variable factors and therefore may be achieve in a number of ways.
There is no impenetrable barrier Defence in depth – barrier after barrier Delay provided against surreptitious and
non–surreptitious entry. Each installation is different
DETERRENCE DETECTION DELAY RESPONSE
PROTECTION IN DEPTH CPTED RISKED – BASED APPROACH
EXTERIOR PERIMETERS
BUILDING PERIMETERS
INTERIOR BARRIERS
INTERVENTION ZONE
“The proper design and effective use of the built environment can lead to a reduction in fear of crime and te incidence of crime and to an improvement in the quality of life”
Dr. Jeffery, CPTED
Natural access control utilises walkways, fences, lighting, signage and landscape to clearly guide people and vehicles to and from the proper entrances.
Image and maintenance ensure that a building or area is clean, well kept and free of graffiti or litter. If a property is untidy and littered with trash and graffiti, it sends the message that no one cares for the property and undesirable behaviour will be tolerated.
Territoriality allows for the feeling of pride or ownership of a place while also creating a welcoming environment. It is important to project the image that a property is well cared for and those responsible for it will protect it.
Natural surveillance maximises the ability to spot suspicious people or activities. Clear sight lines and visible entranceways are helpful while dimly lit or isolated areas create a more comfortable location for criminals to act.
Activity support encourages the intended use of public space by residents. An unsafe area may see a loss of business or a lack of people on the street, for example. An area active with legitimate users deters criminal activity.
Hierarchy of space identifies ownership of an area by clearly delineating private from public space with boundaries such as decorative sidewalks, lawns, and hedges.
Proper allocation of space features a design or location decision that takes into account the surrounding environment and minimises the use of space by conflicting groups. In addition to creating an environment in which criminals feel uncomfortable, the goal of these design principals is also to foster an environment in which law-abiding citizens do feel comfortable and secure.
NATURAL SURVALLAN
CE
TERRITORIALITY
DEFENSIVE SPACE
ACTIVITY PROGRAMM
E
FORMAL ORGANIZED SURVAILLAN
CE
ACCESS CONTROL
TARGET HARDENING
PREPARATION RESOURCE APPRECIATION AUDIT OF EXISTING SECURITY
STRATEGIES THREAT ASSESSMENT IDENTIFICATION OF VULNERABILITIES FORMULATION OF STRATEGIES
AND RECOMMENDATION
Safety First Support business misson Adopt risk – based approach Integrate with business operations Aim at achieving the objective of deterrenct,
detection, delay and response Plan for business continuity Comply with rules and regulations Establish policies and procedures Raise staff awareness Periodic review and continuous improvement
Putting security before lives Not knowing what is at risk Not achieving the objective No policies and procedures Not integrated with business operations Low staff awareness of policies and
procedures No information classification Not compliant with local rules and
regulations relevant to physical security No business continuity planning
TARGET
THREAT
CHARACTERISTICS
PLANDEVELOP
DETECTION
DETERRENCE
RESPONSE
DELAY
COST / BENEFIT
FEASIBILITY
EVALUATEFINAL
DESIGN
ASSESSMENT
Thank you for your time...
7.19.2011