SlideShare une entreprise Scribd logo
1  sur  10
Physical security describes security measures that are designed to deny unauthorized
access to facilities, equipment and resources and to protect personnel and property from
damage or harm (such as espionage, theft, or terrorist attacks).[1] Physical security
involves the use of multiple layers of interdependent systems that can
include CCTV surveillance, security guards, protective barriers, locks, access
control, perimeter intrusion detection, deterrent systems, fire protection, and other
systems designed to protect persons, property and information.
Contents
1 Overview
2 Elements and design
2.1Deterrence methods
2.1.1 Physical barriers
2.1.1.1 Combination barriers
2.1.2 Natural surveillance
2.1.3 Security lighting
2.2 Intrusion detection and electronic surveillance
2.2.1 Alarm systems and sensors
2.2.2 Video surveillance
2.3 Access control
2.3.1 Mechanical access control systems
2.3.2 Electronic access control systems
2.3.3 Identification systems and access policies
2.4 Security personnel
3 References
Overview
Physical security systems for protected facilities are generally intended to
 Deter potential intruders (e.g. warning signs, security lighting and perimeter
markings);
 Detect intrusions and monitor/record intruders (e.g. intruder alarms and CCTV
systems); and
 Trigger appropriate incident responses (e.g. by security guards and Security officers).
It is up to security designers, architects and analysts to balance security controls against
risks, taking into account the costs of specifying, developing, testing, implementing, using,
managing, monitoring and maintaining the controls, along with perimeter/broader issues.
2. Elements and design
2.1 Deterrence methods
The goal of deterrence methods is to convince potential attackers that a successful attack
is unlikely due to strong defenses.
The initial layer of security for a campus, building, office, or other physical space
uses crime prevention through environmental design to deter threats. Some of the most
common examples are also the most basic: warning signs or window stickers, fences,
vehicle barriers, vehicle height-restrictors, restricted access points, security lighting and
trenches.
Physical barriers
Spikes atop a barrier wall act as a deterrent to people trying to climb over the wall
Physical barriers such as fences, walls, and vehicle barriers act as the outermost layer of
security. They serve to prevent, or at least delay, attacks, and also act as a psychological
deterrent by defining the perimeter of the facility and making intrusions seem more
difficult. Tall fencing, topped with barbed wire, razor wire or metal spikes are often
emplaced on the perimeter of a property, generally with some type of signage that warns
people not to attempt entry.
Natural surveillance
Another major form of deterrence that can be incorporated into the design of facilities
is natural surveillance, whereby architects seek to build spaces that are more open and
visible to security personnel and authorized users, so that intruders/attackers are unable
to perform unauthorized activity without being seen. An example would be decreasing the
amount of dense, tall vegetation in the landscaping so that attackers cannot conceal
themselves within it, or placing critical resources in areas where intruders would have to
cross over a wide, open space to reach them (making it likely that someone would notice
them).
Security lighting
Security lighting is another effective form of deterrence. Intruders are less likely to enter
well-lit areas for fear of being seen. Doors, gates, and other entrances, in particular,
should be well lit to allow close observation of people entering and exiting. When lighting
the grounds of a facility, widely distributed low-intensity lighting is generally superior to
small patches of high-intensity lighting, because the latter can have a tendency to create
blind spots for security personnel and CCTV cameras.
Intrusion detection and electronic surveillance
Surveillance is the monitoring of behavior, activities, or information for the purpose of
information gathering, influencing, managing or directing. This can include observation
from a distance by means of electronic equipment, such as closed-circuit
television (CCTV), or interception of electronically transmitted information, such
as Internet traffic. It can also include simple technical methods, such as human
intelligence gathering and postal interception.
CCTV
Surveillance cameras can be a deterrent when placed in highly visible locations and are
useful for incident assessment and historical analysis. For example, if alarms are being
generated and there is a camera in place, security personnel assess the situation via the
camera feed. In instances when an attack has already occurred and a camera is in place
at the point of attack, the recorded video can be reviewed. Although the term closed-
circuit television (CCTV) is common, it is quickly becoming outdated as more video
systems lose the closed circuit for signal transmission and are instead transmitting on IP
camera networks.
Video monitoring does not necessarily guarantee a human response. A human must be
monitoring the situation in real time in order to respond in a timely manner; otherwise,
video monitoring is simply a means to gather evidence for later analysis. However,
technological advances like video analytics are reducing the amount of work required for
video monitoring as security personnel can be automatically notified of potential security
events.
Alarm systems and sensors
Alarm systems can be installed to alert security personnel when unauthorized access is
attempted. Alarm systems work in tandem with physical barriers, mechanical systems,
and security guards, serving to trigger a response when these other forms of security
have been breached. They consist of sensors including perimeter sensors, motion
sensors, contact sensors, and glass break detectors.
Video surveillance[edit]
Closed-circuit television cameras
Main article: CCTV
: Access control
Access control methods are used to monitor and control traffic through specific access
points and areas of the secure facility. This is done using a variety of systems
including CCTV surveillance, identification cards, security guards, biometric readers,
and electronic/mechanical control systems such as locks, doors, turnstiles and gates.
Mechanical access control systems
A drop arm optical turnstile
An electronic access control system, controlling entry through a door.
Lock (security device)
Mechanical access control systems include turnstiles, gates, doors, and locks. Key
control of the locks becomes a problem with large user populations and any user
turnover. Keys quickly become unmanageable, often forcing the adoption of electronic
access control.
Electronic access control systems
Electronic access control manages large user populations, controlling for user life cycles
times, dates, and individual access points. For example, a user's access rights could
allow access from 0700h to 1900h Monday through Friday and expire in 90 days.[citation
needed] These access control systems are often interfaced with turnstiles for entry control
in buildings to prevent unauthorized access. The use of turnstiles also reduces the need
for additional security personnel to monitor each individual entering the building allowing
faster throughput.
An additional sub-layer of mechanical/electronic access control protection is reached by
integrating a key management system to manage the possession and usage of
mechanical keys to locks or property within a building or campus.[citation needed]
Identification systems and access policies[edit]
Another form of access control (procedural) includes the use of policies, processes and
procedures to manage the ingress into the restricted area. An example of this is the
deployment of security personnel conducting checks for authorized entry at
predetermined points of entry. This form of access control is usually supplemented by
the earlier forms of access control (i.e. mechanical and electronic access control), or
simple devices such as physical passes.
Security personnel[edit]
Main article: Security guard
Private factory guard
Security personnel play a central role in all layers of security. All of the technological
systems that are employed to enhance physical security are useless without a security
force that is trained in their use and maintenance, and which knows how to properly
respond to breaches in security. Security personnel perform many functions: patrolling
facilities, administering electronic access control, responding to alarms, and monitoring
and analyzing video footage.
Alarm management is the application of human factors (or 'ergonomics') along
with instrumentation engineering and systems thinking to manage the design of
an alarm system to increase its usability. Most often the major usability problem is that
there are too many alarms annunciated in a plant upset, commonly referred to as alarm
flood (similar to an interrupt storm), since it is so similar to a flood caused by excessive
rainfall input with a basically fixed drainage output capacity.
Artificial intelligence for video surveillance utilizes computer software programs that
analyze the audio and images from video surveillance cameras in order to recognize
humans, vehicles, objects and events. Security program is the software to define
restricted areas within the camera's view (such as a fenced off area, a parking lot but not
the sidewalk or public street outside the lot) and program for times of day (such as after
the close of business) for the property being protected by the camera surveillance.
The artificial intelligence ("A.I.") sends an alert if it detects a trespasser breaking the "rule"
set that no person is allowed in that area during that time of day.
A biometric device is a security identification and authentication device. Such devices
use automated methods of verifying or recognizing the identity of a living person based
on a physiological or behavioral characteristic. These characteristics include
fingerprints, facial images, iris and voice recognition.
Biometrics are body measurements and calculations related to human characteristics.
Biometric authentication (or realistic authentication) is used in computer science as a
form of identification and access control. It is also used to identify individuals in groups
that are under surveillance.
Biometric identifiers are the distinctive, measurable characteristics used to label and
describe individuals. Biometric identifiers are often categorized as physiological
characteristics, which are related to the shape of the body. Examples include, but are
not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand
geometry, iris recognition, retina and odor/scent. Behavioral characteristics are related
to the pattern of behavior of a person, including but not limited to typing
rhythm, gait, keystroke, signature, behavioral profiling, and voice. Some researchers
have coined the term 'behaviometrics' to describe the latter class of biometrics.[1]
Computer security, cybersecurity or information technology security (IT security)
is the protection of computer systems and networks from information disclosure, theft of
or damage to their hardware, software, or electronic data, as well as from
the disruption or misdirection of the services they provide.[1]
The field is becoming increasingly significant due to the increased reliance on computer
systems, the Internet[2] and wireless network standards such as Bluetooth and Wi-Fi,
and due to the growth of "smart" devices, including smartphones, televisions, and the
various devices that constitute the "Internet of things". Owing to its complexity, both in
terms of politics and technology, cybersecurity is also one of the major challenges in the
contemporary world.[3]
The term door security or door security gate may refer to any of a range of measures
used to strengthen doors against door breaching, ram-raiding and lock picking, and
prevent crimes such as burglary and home invasions. Door security is used in
commercial and government buildings, as well as in residential settings.
Some strengthened doors function as fire doors to prevent or inhibit the spread of fire.
A guard tour patrol system is a system for logging the rounds of employees in a
variety of situations such as security guards patrolling property, technicians monitoring
climate-controlled environments, and correctional officers[1] checking prisoner living
areas. It helps ensure that the employee makes his or her appointed rounds at the
correct intervals and can offer a record for legal or insurance reasons
Executive protection (EP), also known as close protection, refers to security and risk
mitigation measures taken to ensure the safety of VIPs or other individuals who may be
exposed to elevated personal risk because of their employment, high-profile status, net
worth, affiliations or geographical location.[1]
Protective measures may include home security systems, bodyguards, armored
vehicles and vehicle scramble plans, mail screening, private jet travel, background
checks for other employees, and other precautions.[2] Executive protection may also
provide security for immediate and/or extended family members to
prevent kidnapping and extortion.
Executive protection is its own highly specialized field within the private security
industry. Elite executive protection professionals will have specialized training in
executive protection, driving, first aid, and marksmanship.[1]
A perimeter intrusion detection system (PIDS) is a device or sensor that detects the
presence of an intruder attempting to breach the physical perimeter of a property,
building, or other secured area.[1][2] A PIDS is typically deployed as part of an
overall security system and is often found in high-security environments such as
correctional facilities, airports,[3] military bases, and nuclear plants.[4]
A perimeter intrusion detection system (PIDS) is a device or sensor that detects the
presence of an intruder attempting to breach the physical perimeter of a property,
building, or other secured area.[1][2] A PIDS is typically deployed as part of an
overall security system and is often found in high-security environments such as
correctional facilities, airports,[3] military bases, and nuclear plants.[4]
Security convergence refers to the convergence of two historically distinct security
functions – physical security and information security – within enterprises; both are
integral parts of a coherent risk management program. Security convergence is
motivated by the recognition that corporate assets are increasingly information-based.
In the past, physical assets demanded the bulk of protection efforts, whereas
information assets are demanding increasing attention. Although generally used in
relation to cyber-physical convergence, security convergence can also refer to the
convergence of security with related risk and resilience disciplines, including business
continuity planning and emergency management. Security convergence is often
referred to as 'converged security'.
Surveillance is the monitoring of behavior, activities, or information for the purpose of
information gathering, influencing, managing or directing.[1][2] This can include
observation from a distance by means of electronic equipment, such as closed-circuit
television (CCTV), or interception of electronically transmitted information, such
as Internet traffic. It can also include simple technical methods, such as human
intelligence gathering and postal interception.
Surveillance is used by governments for intelligence gathering, prevention of crime, the
protection of a process, person, group or object, or the investigation of crime. It is also
used by criminal organizations to plan and commit crimes, and by businesses to gather
intelligence on criminals, their competitors, suppliers or
customers. Religious organisations charged with detecting heresy and heterodoxy may
also carry out surveillance.[3] Auditors carry out a form of surveillance.[4]

Contenu connexe

Similaire à Physical security.docx

4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf
arvindarora20042013
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
Paul Andrews
 
When a traffic camera is installed in a designated community, dr.docx
When a traffic camera is installed in a designated community, dr.docxWhen a traffic camera is installed in a designated community, dr.docx
When a traffic camera is installed in a designated community, dr.docx
eubanksnefen
 
When a traffic camera is installed in a designated community, driv.docx
When a traffic camera is installed in a designated community, driv.docxWhen a traffic camera is installed in a designated community, driv.docx
When a traffic camera is installed in a designated community, driv.docx
helzerpatrina
 
When a traffic camera is installed in a designated community, driv.docx
When a traffic camera is installed in a designated community, driv.docxWhen a traffic camera is installed in a designated community, driv.docx
When a traffic camera is installed in a designated community, driv.docx
eubanksnefen
 
When  a traffic camera is installed in a designated community, d.docx
When  a traffic camera is installed in a designated community, d.docxWhen  a traffic camera is installed in a designated community, d.docx
When  a traffic camera is installed in a designated community, d.docx
jolleybendicty
 

Similaire à Physical security.docx (20)

To design low
To design lowTo design low
To design low
 
Importance of.pdf
Importance of.pdfImportance of.pdf
Importance of.pdf
 
Physical access control
Physical access controlPhysical access control
Physical access control
 
403 10
403 10403 10
403 10
 
Access Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptxAccess Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptx
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to Security
 
4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf
 
Commercial Building Security Systems - www.indoteq.net
Commercial Building Security Systems - www.indoteq.netCommercial Building Security Systems - www.indoteq.net
Commercial Building Security Systems - www.indoteq.net
 
The Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docxThe Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docx
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
CiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical SecurityCiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical Security
 
When a traffic camera is installed in a designated community, dr.docx
When a traffic camera is installed in a designated community, dr.docxWhen a traffic camera is installed in a designated community, dr.docx
When a traffic camera is installed in a designated community, dr.docx
 
When a traffic camera is installed in a designated community, driv.docx
When a traffic camera is installed in a designated community, driv.docxWhen a traffic camera is installed in a designated community, driv.docx
When a traffic camera is installed in a designated community, driv.docx
 
When a traffic camera is installed in a designated community, driv.docx
When a traffic camera is installed in a designated community, driv.docxWhen a traffic camera is installed in a designated community, driv.docx
When a traffic camera is installed in a designated community, driv.docx
 
When  a traffic camera is installed in a designated community, d.docx
When  a traffic camera is installed in a designated community, d.docxWhen  a traffic camera is installed in a designated community, d.docx
When  a traffic camera is installed in a designated community, d.docx
 
SECURITY CONTROLS
SECURITY CONTROLSSECURITY CONTROLS
SECURITY CONTROLS
 
Commercial Building Security Systems - www.indoteq.net
Commercial Building Security Systems - www.indoteq.netCommercial Building Security Systems - www.indoteq.net
Commercial Building Security Systems - www.indoteq.net
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 

Plus de MVNVKUMAR

Plus de MVNVKUMAR (11)

Priorities and Time Management-Short-KimberlyWiefling.ppt
Priorities and Time Management-Short-KimberlyWiefling.pptPriorities and Time Management-Short-KimberlyWiefling.ppt
Priorities and Time Management-Short-KimberlyWiefling.ppt
 
IOTS-Train-slides-w-audio.pptx
IOTS-Train-slides-w-audio.pptxIOTS-Train-slides-w-audio.pptx
IOTS-Train-slides-w-audio.pptx
 
DISCIPLINE.ppt
DISCIPLINE.pptDISCIPLINE.ppt
DISCIPLINE.ppt
 
DISCIPLINE.ppt
DISCIPLINE.pptDISCIPLINE.ppt
DISCIPLINE.ppt
 
KRA.s setting.ppt
KRA.s setting.pptKRA.s setting.ppt
KRA.s setting.ppt
 
HUMAN RIGHTS - latest.pptx
HUMAN RIGHTS - latest.pptxHUMAN RIGHTS - latest.pptx
HUMAN RIGHTS - latest.pptx
 
HUMAN RIGHTS.pptx
HUMAN RIGHTS.pptxHUMAN RIGHTS.pptx
HUMAN RIGHTS.pptx
 
3 employeediscipline-
3 employeediscipline-3 employeediscipline-
3 employeediscipline-
 
9435150
94351509435150
9435150
 
9435150
94351509435150
9435150
 
Constructionmaterialmanagement 140920032237-phpapp01
Constructionmaterialmanagement 140920032237-phpapp01Constructionmaterialmanagement 140920032237-phpapp01
Constructionmaterialmanagement 140920032237-phpapp01
 

Dernier

➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men 🔝narsinghpur🔝 ...
➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men  🔝narsinghpur🔝  ...➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men  🔝narsinghpur🔝  ...
➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men 🔝narsinghpur🔝 ...
nirzagarg
 
Top Rated Call Girls Navi Mumbai : 9920725232 We offer Beautiful and sexy Cal...
Top Rated Call Girls Navi Mumbai : 9920725232 We offer Beautiful and sexy Cal...Top Rated Call Girls Navi Mumbai : 9920725232 We offer Beautiful and sexy Cal...
Top Rated Call Girls Navi Mumbai : 9920725232 We offer Beautiful and sexy Cal...
amitlee9823
 
Majestic Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Majestic Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...Majestic Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Majestic Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
amitlee9823
 
FULL NIGHT — 9999894380 Call Girls In Jagat Puri | Delhi
FULL NIGHT — 9999894380 Call Girls In Jagat Puri | DelhiFULL NIGHT — 9999894380 Call Girls In Jagat Puri | Delhi
FULL NIGHT — 9999894380 Call Girls In Jagat Puri | Delhi
SaketCallGirlsCallUs
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...
Health
 
➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men 🔝Bhiwandi🔝 Escor...
➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men  🔝Bhiwandi🔝   Escor...➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men  🔝Bhiwandi🔝   Escor...
➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men 🔝Bhiwandi🔝 Escor...
amitlee9823
 
ELECTRICITÉ TMT 55.pdf electrick diagram manitout
ELECTRICITÉ TMT 55.pdf electrick diagram manitoutELECTRICITÉ TMT 55.pdf electrick diagram manitout
ELECTRICITÉ TMT 55.pdf electrick diagram manitout
ssjews46
 
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
nirzagarg
 
Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
amitlee9823
 
如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一
如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一
如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一
ozave
 
Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...
Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...
Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...
amitlee9823
 
Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
amitlee9823
 
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 

Dernier (20)

8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available
8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available
8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available
 
➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men 🔝narsinghpur🔝 ...
➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men  🔝narsinghpur🔝  ...➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men  🔝narsinghpur🔝  ...
➥🔝 7737669865 🔝▻ narsinghpur Call-girls in Women Seeking Men 🔝narsinghpur🔝 ...
 
Top Rated Call Girls Navi Mumbai : 9920725232 We offer Beautiful and sexy Cal...
Top Rated Call Girls Navi Mumbai : 9920725232 We offer Beautiful and sexy Cal...Top Rated Call Girls Navi Mumbai : 9920725232 We offer Beautiful and sexy Cal...
Top Rated Call Girls Navi Mumbai : 9920725232 We offer Beautiful and sexy Cal...
 
Majestic Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Majestic Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...Majestic Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Majestic Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
 
FULL NIGHT — 9999894380 Call Girls In Jagat Puri | Delhi
FULL NIGHT — 9999894380 Call Girls In Jagat Puri | DelhiFULL NIGHT — 9999894380 Call Girls In Jagat Puri | Delhi
FULL NIGHT — 9999894380 Call Girls In Jagat Puri | Delhi
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...
 
➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men 🔝Bhiwandi🔝 Escor...
➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men  🔝Bhiwandi🔝   Escor...➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men  🔝Bhiwandi🔝   Escor...
➥🔝 7737669865 🔝▻ Bhiwandi Call-girls in Women Seeking Men 🔝Bhiwandi🔝 Escor...
 
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
 
(INDIRA) Call Girl Nashik Call Now 8617697112 Nashik Escorts 24x7
(INDIRA) Call Girl Nashik Call Now 8617697112 Nashik Escorts 24x7(INDIRA) Call Girl Nashik Call Now 8617697112 Nashik Escorts 24x7
(INDIRA) Call Girl Nashik Call Now 8617697112 Nashik Escorts 24x7
 
ELECTRICITÉ TMT 55.pdf electrick diagram manitout
ELECTRICITÉ TMT 55.pdf electrick diagram manitoutELECTRICITÉ TMT 55.pdf electrick diagram manitout
ELECTRICITÉ TMT 55.pdf electrick diagram manitout
 
BOOK FARIDABAD CALL GIRL(VIP Sunny Leone) @8168257667 BOOK 24/7
BOOK FARIDABAD CALL GIRL(VIP Sunny Leone) @8168257667 BOOK  24/7BOOK FARIDABAD CALL GIRL(VIP Sunny Leone) @8168257667 BOOK  24/7
BOOK FARIDABAD CALL GIRL(VIP Sunny Leone) @8168257667 BOOK 24/7
 
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
 
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
 
Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一
如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一
如何办理麦考瑞大学毕业证(MQU毕业证书)成绩单原版一比一
 
Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...
Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...
Bangalore Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore E...
 
Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
 
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
 
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 

Physical security.docx

  • 1. Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks).[1] Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons, property and information. Contents 1 Overview 2 Elements and design 2.1Deterrence methods 2.1.1 Physical barriers 2.1.1.1 Combination barriers 2.1.2 Natural surveillance 2.1.3 Security lighting 2.2 Intrusion detection and electronic surveillance 2.2.1 Alarm systems and sensors 2.2.2 Video surveillance 2.3 Access control 2.3.1 Mechanical access control systems 2.3.2 Electronic access control systems 2.3.3 Identification systems and access policies 2.4 Security personnel 3 References
  • 2. Overview Physical security systems for protected facilities are generally intended to  Deter potential intruders (e.g. warning signs, security lighting and perimeter markings);  Detect intrusions and monitor/record intruders (e.g. intruder alarms and CCTV systems); and  Trigger appropriate incident responses (e.g. by security guards and Security officers). It is up to security designers, architects and analysts to balance security controls against risks, taking into account the costs of specifying, developing, testing, implementing, using, managing, monitoring and maintaining the controls, along with perimeter/broader issues. 2. Elements and design 2.1 Deterrence methods The goal of deterrence methods is to convince potential attackers that a successful attack is unlikely due to strong defenses. The initial layer of security for a campus, building, office, or other physical space uses crime prevention through environmental design to deter threats. Some of the most common examples are also the most basic: warning signs or window stickers, fences, vehicle barriers, vehicle height-restrictors, restricted access points, security lighting and trenches. Physical barriers Spikes atop a barrier wall act as a deterrent to people trying to climb over the wall
  • 3. Physical barriers such as fences, walls, and vehicle barriers act as the outermost layer of security. They serve to prevent, or at least delay, attacks, and also act as a psychological deterrent by defining the perimeter of the facility and making intrusions seem more difficult. Tall fencing, topped with barbed wire, razor wire or metal spikes are often emplaced on the perimeter of a property, generally with some type of signage that warns people not to attempt entry. Natural surveillance Another major form of deterrence that can be incorporated into the design of facilities is natural surveillance, whereby architects seek to build spaces that are more open and visible to security personnel and authorized users, so that intruders/attackers are unable to perform unauthorized activity without being seen. An example would be decreasing the amount of dense, tall vegetation in the landscaping so that attackers cannot conceal themselves within it, or placing critical resources in areas where intruders would have to cross over a wide, open space to reach them (making it likely that someone would notice them). Security lighting Security lighting is another effective form of deterrence. Intruders are less likely to enter well-lit areas for fear of being seen. Doors, gates, and other entrances, in particular, should be well lit to allow close observation of people entering and exiting. When lighting the grounds of a facility, widely distributed low-intensity lighting is generally superior to small patches of high-intensity lighting, because the latter can have a tendency to create blind spots for security personnel and CCTV cameras. Intrusion detection and electronic surveillance Surveillance is the monitoring of behavior, activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information, such
  • 4. as Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception. CCTV Surveillance cameras can be a deterrent when placed in highly visible locations and are useful for incident assessment and historical analysis. For example, if alarms are being generated and there is a camera in place, security personnel assess the situation via the camera feed. In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed. Although the term closed- circuit television (CCTV) is common, it is quickly becoming outdated as more video systems lose the closed circuit for signal transmission and are instead transmitting on IP camera networks. Video monitoring does not necessarily guarantee a human response. A human must be monitoring the situation in real time in order to respond in a timely manner; otherwise, video monitoring is simply a means to gather evidence for later analysis. However, technological advances like video analytics are reducing the amount of work required for video monitoring as security personnel can be automatically notified of potential security events. Alarm systems and sensors Alarm systems can be installed to alert security personnel when unauthorized access is attempted. Alarm systems work in tandem with physical barriers, mechanical systems, and security guards, serving to trigger a response when these other forms of security have been breached. They consist of sensors including perimeter sensors, motion sensors, contact sensors, and glass break detectors.
  • 5. Video surveillance[edit] Closed-circuit television cameras Main article: CCTV : Access control Access control methods are used to monitor and control traffic through specific access points and areas of the secure facility. This is done using a variety of systems including CCTV surveillance, identification cards, security guards, biometric readers, and electronic/mechanical control systems such as locks, doors, turnstiles and gates. Mechanical access control systems A drop arm optical turnstile
  • 6. An electronic access control system, controlling entry through a door. Lock (security device) Mechanical access control systems include turnstiles, gates, doors, and locks. Key control of the locks becomes a problem with large user populations and any user turnover. Keys quickly become unmanageable, often forcing the adoption of electronic access control. Electronic access control systems Electronic access control manages large user populations, controlling for user life cycles times, dates, and individual access points. For example, a user's access rights could allow access from 0700h to 1900h Monday through Friday and expire in 90 days.[citation needed] These access control systems are often interfaced with turnstiles for entry control in buildings to prevent unauthorized access. The use of turnstiles also reduces the need for additional security personnel to monitor each individual entering the building allowing faster throughput. An additional sub-layer of mechanical/electronic access control protection is reached by integrating a key management system to manage the possession and usage of mechanical keys to locks or property within a building or campus.[citation needed] Identification systems and access policies[edit] Another form of access control (procedural) includes the use of policies, processes and procedures to manage the ingress into the restricted area. An example of this is the deployment of security personnel conducting checks for authorized entry at predetermined points of entry. This form of access control is usually supplemented by the earlier forms of access control (i.e. mechanical and electronic access control), or simple devices such as physical passes. Security personnel[edit] Main article: Security guard
  • 7. Private factory guard Security personnel play a central role in all layers of security. All of the technological systems that are employed to enhance physical security are useless without a security force that is trained in their use and maintenance, and which knows how to properly respond to breaches in security. Security personnel perform many functions: patrolling facilities, administering electronic access control, responding to alarms, and monitoring and analyzing video footage. Alarm management is the application of human factors (or 'ergonomics') along with instrumentation engineering and systems thinking to manage the design of an alarm system to increase its usability. Most often the major usability problem is that there are too many alarms annunciated in a plant upset, commonly referred to as alarm flood (similar to an interrupt storm), since it is so similar to a flood caused by excessive rainfall input with a basically fixed drainage output capacity. Artificial intelligence for video surveillance utilizes computer software programs that analyze the audio and images from video surveillance cameras in order to recognize humans, vehicles, objects and events. Security program is the software to define restricted areas within the camera's view (such as a fenced off area, a parking lot but not the sidewalk or public street outside the lot) and program for times of day (such as after the close of business) for the property being protected by the camera surveillance. The artificial intelligence ("A.I.") sends an alert if it detects a trespasser breaking the "rule" set that no person is allowed in that area during that time of day. A biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognizing the identity of a living person based on a physiological or behavioral characteristic. These characteristics include fingerprints, facial images, iris and voice recognition.
  • 8. Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological characteristics, which are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odor/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, keystroke, signature, behavioral profiling, and voice. Some researchers have coined the term 'behaviometrics' to describe the latter class of biometrics.[1] Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1] The field is becoming increasingly significant due to the increased reliance on computer systems, the Internet[2] and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.[3] The term door security or door security gate may refer to any of a range of measures used to strengthen doors against door breaching, ram-raiding and lock picking, and prevent crimes such as burglary and home invasions. Door security is used in commercial and government buildings, as well as in residential settings. Some strengthened doors function as fire doors to prevent or inhibit the spread of fire. A guard tour patrol system is a system for logging the rounds of employees in a variety of situations such as security guards patrolling property, technicians monitoring climate-controlled environments, and correctional officers[1] checking prisoner living areas. It helps ensure that the employee makes his or her appointed rounds at the correct intervals and can offer a record for legal or insurance reasons Executive protection (EP), also known as close protection, refers to security and risk mitigation measures taken to ensure the safety of VIPs or other individuals who may be exposed to elevated personal risk because of their employment, high-profile status, net worth, affiliations or geographical location.[1]
  • 9. Protective measures may include home security systems, bodyguards, armored vehicles and vehicle scramble plans, mail screening, private jet travel, background checks for other employees, and other precautions.[2] Executive protection may also provide security for immediate and/or extended family members to prevent kidnapping and extortion. Executive protection is its own highly specialized field within the private security industry. Elite executive protection professionals will have specialized training in executive protection, driving, first aid, and marksmanship.[1] A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter of a property, building, or other secured area.[1][2] A PIDS is typically deployed as part of an overall security system and is often found in high-security environments such as correctional facilities, airports,[3] military bases, and nuclear plants.[4] A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter of a property, building, or other secured area.[1][2] A PIDS is typically deployed as part of an overall security system and is often found in high-security environments such as correctional facilities, airports,[3] military bases, and nuclear plants.[4] Security convergence refers to the convergence of two historically distinct security functions – physical security and information security – within enterprises; both are integral parts of a coherent risk management program. Security convergence is motivated by the recognition that corporate assets are increasingly information-based. In the past, physical assets demanded the bulk of protection efforts, whereas information assets are demanding increasing attention. Although generally used in relation to cyber-physical convergence, security convergence can also refer to the convergence of security with related risk and resilience disciplines, including business continuity planning and emergency management. Security convergence is often referred to as 'converged security'. Surveillance is the monitoring of behavior, activities, or information for the purpose of information gathering, influencing, managing or directing.[1][2] This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information, such as Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception. Surveillance is used by governments for intelligence gathering, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to gather
  • 10. intelligence on criminals, their competitors, suppliers or customers. Religious organisations charged with detecting heresy and heterodoxy may also carry out surveillance.[3] Auditors carry out a form of surveillance.[4]