SlideShare une entreprise Scribd logo
1  sur  24
IN THE NAME OF
ALLAH THE MERCIFUL
AND THE BENEFICENT
CONCEPT OF
PHYSICAL
PROTECTION AND ITS
PRINCIPALS
Socrates once said and I quote
People don’t know
what they don’t know
I know one thing I know nothing
Before proceeding any further let us
understand what is PHYSICAL PROTECTION
It is the protection of personnel, hardware,
software, networks and data from physical
actions and events that could cause serious
loss or damage to an enterprise, agency or
institution. This includes protection from fire,
flood, natural disasters, burglary, theft,
vandalism and terrorism.
Why is security important in life?
Individual safety and security is important
because both safety and security affect an
individual's well-being. Threats to safety and
security come in many forms, ranging from
deliberate violence to accidental injury.
Violence and injury, at their most extreme,
threaten life itself.
What are the primary threats to physical security?
The primary threats to physical security include
the following: inadvertent acts, potential acts of
human error or failure, potential deviations in
quality of service by service providers, power
irregularities; deliberate acts of espionage or
trespass, acts of information extortion, acts of
sabotage etc
Objectives
• Identify PPS design strategies
• List basic PPS functions
• Describe process, components, and performance
measures of each PPS function
• Draw timelines for adversary and PPS response
• Explain principle of timely detection
• Characterize effective PPS design concepts
Basic Functions of PPS
Detection
• Intrusion
sensing
• Alarm
communication
• Alarm
assessment
• Entry control
Delay
• Passive Barriers
• Dispensable
Barriers
Response
• Guards
• Response
Force
Principle of Timely Detection
To interrupt the adversary before he
completes his theft or sabotage task, the
PPS response time must be less than the
adversary task time remaining after
detection
Detection Process
Sensor
Activated
Alarm
Initiated
Alarm
Reported
Alarm
Assessed
GuardsTechnologies
Performance measures:
 Probability of sensor alarm (PS)
 Communication and Assessment Time (TC)
 Probability of Assessment (PA)
 Nuisance Alarm Rate (NAR)
 Assessed detection PD = F (PS, TC, PA , NAR)
Protection in Depth
Interior Sensor ApplicationsExterior Sensor Applications
Motion (Audio)
Proximity
(Point)
Boundary Penetration
(Wall, window, door)
Motion (Audio)
Boundary Penetration (Fence)
Line Detection (Buried, beam break)
Delay Process
Delay provides
obstacles to
Increase the
adversary
task time
Passive Barriers
Dispensable Barriers
 Performance measures
 Time to penetrate or bypass obstacles
 Time to travel across areas
Access delay
Role of Delay
• System detection and response time must be less
than adversary task time after first alarm
• To increase system success probability
• Detect intrusion earlier
• Reduce assessment time
• Reduce response time
• Increase adversary task time
Adversary Task Time
Detect
CT
First
Alarm
T0
Alarm
Assessed
AT
Respond
Adversary
Interrupted
TI
PPS Time Required
Delay
Attack
Begins
Elements of Delay
Effective Delay Systems
Passive Barriers Dispensable BarriersGuards
Flexible
Continuous
Operational
Cost
Sensitive to
Numbers
Subject to
Compromise
Guards
In Place:
Fail Secure
Commercially
Available
Weak Against
Explosives
Operational:
Aesthetic
Limits
Barriers
Compact:
Rapidly
Deployed
Maximize Delay
at Target
‘Somewhat’
Threat
Independent
Spurious
Activation:
Safety
Concerns
Dispensable
Barriers
Response Process
Communicate
to response
force
Deploy
response
force
Interrupt and
neutralize
adversary
 Performance measures
 Probability of communication to response force
 Communication time
 Probability of deployment to adversary location
 Deployment time
 Response force effectiveness
Response
• Guards perform routine duties whereas response force is
responsible for defeating adversaries
• Protection planning should address: “What am I
protecting, and where and from whom am I protecting
it?”
• Response planning addresses how to respond
(responder number, positioning, armament, tactics, etc.)
• Higher communication security levels demand higher
complexity and cost
• Response force equipment must be adequate to address
adversary capabilities
• Training and testing of responders is essential for
effective response
• Interaction with outside agencies should be carefully
planned and documented
Two Competing Timelines
• Adversary Timeline
• Cross areas
• Penetrate or bypass barriers
• Remove or sabotage target
• PPS Timeline
• Detection process
• Delay process
• Response process
• Overlay of two timelines illustrates PPS effectiveness
Effective PPS Design Practices
•Defence in depth
•Protection-in-depth
•Balanced protection
•Reliability
Defence in Depth
The concept of physical protection
requires a designed mixture of hardware
(security devices), procedures (including
the organization of guards and the
performance of their duties) and facility
design (including layout).”
Protection-in-Depth
• Adversary must defeat or avoid a number of
protective devices in sequence
• Protection-in-depth should
• Increase adversary’s uncertainty about the
system
• Require more extensive preparations and
equipment by adversary prior to attacking the
system
• Create additional steps where the adversary
may fail or abort his mission
Balanced Protection
• Many unique physical paths to target
• System only as effective as weakest path
• Provide adequate protection against all threats
along all adversary paths
Reliability
• Redundant equipment
• Multiple complementary sensors
• Central Alarm System (CAS) and
Secondary Alarm Stations (SAS)
• Multiple response force locations
• Contingency plans
• Spare parts supply
• Compensatory measures
• External assistance
Summary
• Fundamental design strategies
• Deter adversary – impossible to measure
• Defeat adversary – PPS requirement
• Basic PPS functions
• Detection, Delay, Response
• Performances measures
• Probability of Detection
• Delay Time
• Response Time
• Interruption
• Neutralization
Summary
• Principle of timely detection
• To interrupt the adversary before he completes his theft or sabotage
task, the PPS response time must be less than the adversary task time
remaining after detection
• Effective design practices
• Balanced protection
• Protection-in-depth
• Reliability

Contenu connexe

Similaire à Concept of physical protection and its principals

Information and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesInformation and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesVaibhav Khanna
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Crew
 
ABC of cyber security 20180830.pptx
ABC of cyber security 20180830.pptxABC of cyber security 20180830.pptx
ABC of cyber security 20180830.pptxssusere08ebd
 
Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwgJohn M. Kennedy
 
ICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfasdfg hjkl
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxJanani S
 
Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptxAwais725629
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptxAwais725629
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Knoldus Inc.
 
The TTPs of hard hat incident response
The TTPs of hard hat incident responseThe TTPs of hard hat incident response
The TTPs of hard hat incident responseHinne Hettema
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewdr_edw777
 

Similaire à Concept of physical protection and its principals (20)

Information and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesInformation and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and services
 
computer security .ppt
computer security .pptcomputer security .ppt
computer security .ppt
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response Programme
 
ABC of cyber security 20180830.pptx
ABC of cyber security 20180830.pptxABC of cyber security 20180830.pptx
ABC of cyber security 20180830.pptx
 
Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwg
 
ICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdf
 
abc.pptx
abc.pptxabc.pptx
abc.pptx
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
Ch01 NetSec5e.pdf
Ch01 NetSec5e.pdfCh01 NetSec5e.pdf
Ch01 NetSec5e.pdf
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptx
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptx
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Zero Trust.pptx
Zero Trust.pptxZero Trust.pptx
Zero Trust.pptx
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Networks
NetworksNetworks
Networks
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
 
The TTPs of hard hat incident response
The TTPs of hard hat incident responseThe TTPs of hard hat incident response
The TTPs of hard hat incident response
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
CS_Tuto.ppt
CS_Tuto.pptCS_Tuto.ppt
CS_Tuto.ppt
 

Dernier

Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 

Dernier (20)

Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 

Concept of physical protection and its principals

  • 1. IN THE NAME OF ALLAH THE MERCIFUL AND THE BENEFICENT
  • 3. Socrates once said and I quote People don’t know what they don’t know I know one thing I know nothing
  • 4. Before proceeding any further let us understand what is PHYSICAL PROTECTION It is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.
  • 5. Why is security important in life? Individual safety and security is important because both safety and security affect an individual's well-being. Threats to safety and security come in many forms, ranging from deliberate violence to accidental injury. Violence and injury, at their most extreme, threaten life itself.
  • 6. What are the primary threats to physical security? The primary threats to physical security include the following: inadvertent acts, potential acts of human error or failure, potential deviations in quality of service by service providers, power irregularities; deliberate acts of espionage or trespass, acts of information extortion, acts of sabotage etc
  • 7. Objectives • Identify PPS design strategies • List basic PPS functions • Describe process, components, and performance measures of each PPS function • Draw timelines for adversary and PPS response • Explain principle of timely detection • Characterize effective PPS design concepts
  • 8. Basic Functions of PPS Detection • Intrusion sensing • Alarm communication • Alarm assessment • Entry control Delay • Passive Barriers • Dispensable Barriers Response • Guards • Response Force
  • 9. Principle of Timely Detection To interrupt the adversary before he completes his theft or sabotage task, the PPS response time must be less than the adversary task time remaining after detection
  • 10. Detection Process Sensor Activated Alarm Initiated Alarm Reported Alarm Assessed GuardsTechnologies Performance measures:  Probability of sensor alarm (PS)  Communication and Assessment Time (TC)  Probability of Assessment (PA)  Nuisance Alarm Rate (NAR)  Assessed detection PD = F (PS, TC, PA , NAR)
  • 11. Protection in Depth Interior Sensor ApplicationsExterior Sensor Applications Motion (Audio) Proximity (Point) Boundary Penetration (Wall, window, door) Motion (Audio) Boundary Penetration (Fence) Line Detection (Buried, beam break)
  • 12. Delay Process Delay provides obstacles to Increase the adversary task time Passive Barriers Dispensable Barriers  Performance measures  Time to penetrate or bypass obstacles  Time to travel across areas Access delay
  • 13. Role of Delay • System detection and response time must be less than adversary task time after first alarm • To increase system success probability • Detect intrusion earlier • Reduce assessment time • Reduce response time • Increase adversary task time Adversary Task Time Detect CT First Alarm T0 Alarm Assessed AT Respond Adversary Interrupted TI PPS Time Required Delay Attack Begins
  • 14. Elements of Delay Effective Delay Systems Passive Barriers Dispensable BarriersGuards Flexible Continuous Operational Cost Sensitive to Numbers Subject to Compromise Guards In Place: Fail Secure Commercially Available Weak Against Explosives Operational: Aesthetic Limits Barriers Compact: Rapidly Deployed Maximize Delay at Target ‘Somewhat’ Threat Independent Spurious Activation: Safety Concerns Dispensable Barriers
  • 15. Response Process Communicate to response force Deploy response force Interrupt and neutralize adversary  Performance measures  Probability of communication to response force  Communication time  Probability of deployment to adversary location  Deployment time  Response force effectiveness
  • 16. Response • Guards perform routine duties whereas response force is responsible for defeating adversaries • Protection planning should address: “What am I protecting, and where and from whom am I protecting it?” • Response planning addresses how to respond (responder number, positioning, armament, tactics, etc.) • Higher communication security levels demand higher complexity and cost • Response force equipment must be adequate to address adversary capabilities • Training and testing of responders is essential for effective response • Interaction with outside agencies should be carefully planned and documented
  • 17. Two Competing Timelines • Adversary Timeline • Cross areas • Penetrate or bypass barriers • Remove or sabotage target • PPS Timeline • Detection process • Delay process • Response process • Overlay of two timelines illustrates PPS effectiveness
  • 18. Effective PPS Design Practices •Defence in depth •Protection-in-depth •Balanced protection •Reliability
  • 19. Defence in Depth The concept of physical protection requires a designed mixture of hardware (security devices), procedures (including the organization of guards and the performance of their duties) and facility design (including layout).”
  • 20. Protection-in-Depth • Adversary must defeat or avoid a number of protective devices in sequence • Protection-in-depth should • Increase adversary’s uncertainty about the system • Require more extensive preparations and equipment by adversary prior to attacking the system • Create additional steps where the adversary may fail or abort his mission
  • 21. Balanced Protection • Many unique physical paths to target • System only as effective as weakest path • Provide adequate protection against all threats along all adversary paths
  • 22. Reliability • Redundant equipment • Multiple complementary sensors • Central Alarm System (CAS) and Secondary Alarm Stations (SAS) • Multiple response force locations • Contingency plans • Spare parts supply • Compensatory measures • External assistance
  • 23. Summary • Fundamental design strategies • Deter adversary – impossible to measure • Defeat adversary – PPS requirement • Basic PPS functions • Detection, Delay, Response • Performances measures • Probability of Detection • Delay Time • Response Time • Interruption • Neutralization
  • 24. Summary • Principle of timely detection • To interrupt the adversary before he completes his theft or sabotage task, the PPS response time must be less than the adversary task time remaining after detection • Effective design practices • Balanced protection • Protection-in-depth • Reliability

Notes de l'éditeur

  1. RTC on Physical Protection of Nuclear Materials and Facilities, Beijing 2010
  2. RTC on Physical Protection of Nuclear Materials and FAcilities, Beijing 2010
  3. RTC on Physical Protection of Nuclear Materials and FAcilities, Beijing 2010
  4. RTC on Physical Protection of Nuclear Materials and Facilities, Beijing 2010