Upload
be-nette-revidad
View
225
Download
0
Tags:
Embed Size (px)
Citation preview
PHYSICAL SECURITY SYSTEM
OBJECTIVE
At the end of the session, the trainees must be able to
* Define the Physical Security System;* Identify correctly the objectives of
Physical Security and It’s importance in the Security Industry
PHYSICAL SECURITY SYSTEM
The physical measures designed to safeguard personnel, property, and information, to prevent unauthorize access to equipment, installations, material and documents and to safeguard them against espionage, sabotage, damage, and theft.
PRINCIPLES OF PHYSICAL SECURITY SYSTEM
* The type of access necessary will depend on a number of variable factors and therefore may be achieve in a number of ways.
* There is no impenetrable barrier* Defence in depth – barrier after barrier * Delay provided against surreptitious
and non–surreptitious entry. * Each installation is different
BARRIERSARCHITECTURAL FEATURESLOCATION / LAY OUTBARRIER / DOORSLOCKS and BOLTSLIGHTINGS
STAFF and PROCEDURESDEPLOYMENTPOLICIES and PROCEDURESCOMMUNICATIONTRAINING
ELECTRONIC SYSTEMACCESS CONTROL SYSTEMALARM SYSTEMCCTV SYSTEMSCOMMUNICATIONS
WHAT ARE THE OBJECTIVES?
* DETERRENCE* DETECTION* DELAY* RESPONSE
HOW TO ACHIEVE THE OBJECTIVES?
* PROTECTION IN DEPTH* CPTED* RISKED – BASED APPROACH
PROTECTION IN DEPTHEXTERIOR PERIMETERS
BUILDING PERIMETERS
INTERIOR BARRIERS
INTERVENTION ZONE
CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN - CPTED
CPTED - is the proper design and effective use of the built environment which may lead to a reduction in the fear and incidence of crime, and an improvement of the quality of life.
TARGET HARDENING
SEVEN COMPONENTS OF CPTED
NATURAL SURVALLANC
E
TERRITORIALITY
DEFENSIVE SPACE
ACTIVITY PROGRAMME
FORMAL ORGANIZED
SURVAILLANCE
ACCESS CONTROL
RISK – BASED APPROACH
* PREPARATION* RESOURCE APPRECIATION* AUDIT OF EXISTING SECURITY
STRATEGIES* THREAT ASSESSMENT* IDENTIFICATION OF VULNERABILITIES* FORMULATION OF STRATEGIES
AND RECOMMENDATION
CONSIDERATIONS* Safety First* Support business misson* Adopt risk – based approach* Integrate with business operations* Aim at achieving the objective of
deterrenct, detection, delay and response* Plan for business continuity* Comply with rules and regulations* Establish policies and procedures* Raise staff awareness* Periodic review and continuous
improvement
COMMON MISTAKES * Putting security before lives* Not knowing what is at risk* Not achieving the objective* No policies and procedures* Not integrated with business operations* Low staff awareness of policies and procedures* No information classification* Not compliant with local rules and regulations
relevant to physical security* No business continuity planning
GOOD PRACTICE
TARGET
THREAT
CHARACTERISTICS
PLAN DEVELOP
DETECTION
DETERRENCE
RESPONSE
DELAY
COST / BENEFIT
FEASIBILITY
EVALUATE FINAL DESIGN
ASSESSMENT
QUESTIONS?
END OF PRESENTATION...Thank you for your time...
7.19.2011