Sabtu, 16 Juni 2018

Sponsored Links

Physical Security - www.nxt.ro
src: www.nxt.ro

Physical security describes security measures designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physical security involves the use of multiple layers of interdependent systems that include CCTV surveillance, security guards, protective barriers, locks, access control protocols, and many other techniques.


Video Physical security



Overview

Physical security systems for protected facilities are generally intended to:

  • keep potential intruders (eg warning signs and perimeter marks);
  • detect intrusions and monitor/record intruders (eg intruder alarms and CCTV systems); and
  • triggering an appropriate incident response (eg by security guards and police).

It is up to the security designers, architects and analysts to balance security risk control, taking into account the costs of setting, developing, testing, implementing, using, managing, monitoring and maintaining control, along with broader issues such as aesthetics, human rights, health and safety , and social norms or conventions. Appropriate physical access security measures for high security prisons or military sites may be inappropriate in offices, homes or vehicles, although the principle is similar.

Maps Physical security



Elements and design

Prevention methods

The purpose of the deterrence method is to convince a potential attacker that a successful attack is unlikely due to a strong defense.

The initial security layer for campus, building, office, or other physical space uses crime prevention through environmental design to prevent threats. Some of the most common examples are also most basic: warning signs or window stickers, fences, roadblocks, vehicle height limits, restricted access points, security lighting and trenches.

Physical obstacles

Physical obstacles such as fences, walls, and barriers act as the outermost layer of security. They serve to prevent, or at least delay, attack, and also act as a psychological deterrent by defining the perimeter of the facility and making the disorder seem more difficult. High fences, topped with barbed wire, barbed wire or metal nails are often superimposed around a property, generally with some kind of mark that warns people not to try to get in. However, in some facilities which impose a perimeter wall/fence will not be possible (eg city office buildings adjacent to public sidewalks) or may be aesthetically unacceptable (eg surround a shopping center with a high fence on which a barbed wire is placed); in this case, the outer perimeter of security will be defined as the wall/window/door of the structure itself.

Constraint barrier

Obstacles are usually designed to defeat a specified threat. This is part of the building code as well as the fire code. In addition to external threats, there are threats of internal fires, smoke migration and sabotage. The National Building Code of Canada, for example, demonstrates the need to defeat an external explosion with building envelopes, where they may be, such as where a large electrical transformer lies close to the building. The high voltage transformer fire barrier can be an example of a wall designed to simultaneously defeat fire, ballistics and fragmentation as a result of the breakup of the transformer, as well as the small firearm firing that enters. Similarly, buildings may have internal barriers to defeat weapons as well as fire and heat. An example is a counter at a police station or embassy, ​​where the public can access the room but speak through the safety glass to the employee behind. If the barrier is parallel to the fire compartment as part of building code compliance, then some threats must be defeated simultaneously, which should be considered in the design.

Nature surveillance

Another major form of prevention that can be incorporated into the facility's design is natural supervision, where architects strive to build more open space and visible to security personnel and authorized users, so that intruders/attackers can not perform unauthorized activity without being seen. An example is to reduce the amount of dense and high vegetation in the landscape so that attackers can not hide in it, or place important resources in areas where intruders have to cross wide open spaces to reach them (so someone will probably notice them).

Security lighting

Lighting security is another form of effective prevention. Intruders tend not to enter the bright areas for fear of being seen. Doors, gates, and other entrances, in particular, should be well lit to allow close observation of the incoming and outgoing persons. When illuminating basic facilities, low intensity distributed lighting is generally superior to small patches with high intensity lighting, as the latter can have a tendency to create blind spots for security personnel and CCTV cameras. It is important to place the lighting in a way that makes it difficult to tamper (such as suspending lamps from high poles), and to ensure that there is a backup power supply so that the security light will not go off if the power goes off.

Intrusion detection and electronic surveillance

Alarm and sensor systems

An alarm system can be installed to alert security personnel when unauthorized access has been attempted. The alarm system works in conjunction with physical barriers, mechanical systems, and security guards, serves to trigger a response when this other form of security has been violated. They consist of sensors including motion sensors, contact sensors, and break glass detectors.

However, alarms are only useful if there is a quick response when triggered. In the reconnaissance phase before the actual attack, some intruders will test the security personnel's response time to a deliberately tripped alarm system. By measuring the length of time that the security team needs (if they arrive), the attacker can determine whether the attack can succeed before the authorities arrive to neutralize the threat. A loud audible alarm can also act as a psychological deterrent, by letting the intruder know that their existence has been detected. In some jurisdictions, law enforcement will not respond to an alarm from an intrusion detection system unless activation has been verified by eyewitness or video. Policies like these have been made to combat the 94-99 percent level of false alarm activation in the United States.

Video surveillance

Surveillance Camera can be a barrier when placed in a highly visible location, and is also useful for incident verification and historical analysis. For example, if an alarm is made and there is a camera in place, the camera can be seen to verify the alarm. In case when an attack has occurred and the camera is at the point of attack, the video recording can be reviewed. Although the term closed-circuit television (CCTV) is common, it is quickly becoming obsolete as more video systems lose closed circuits for signal transmission and instead transmit on IP camera networks.

Video monitoring does not necessarily guarantee that a human response is made to interference. A human must monitor the situation in real time to respond in a timely manner. Otherwise, video monitoring is only a means of collecting evidence to be analyzed at a later time. However, advances in information technology reduce the amount of work required for video monitoring, through automated video analysis.

Access control

Access control methods are used to monitor and control traffic through special access points and secure facility areas. This is done by using various systems including CCTV surveillance, identification cards, security guards, and electronic/mechanical control systems such as locks, doors, turnstiles and gates.

Mechanical access control system

Mechanical access control systems include turnstiles, gates, doors, and locks. The key control of the lock becomes a problem with a large user population and every user turn. Keys quickly become uncontrollable, often forcing the adoption of electronic access controls.

Electronic access control system

Electronic access control manages a large user population, which controls the user's lifecycle time, date, and individual access point. For example, user permissions may allow access from 0700h to 1900h Monday through Friday and end in 90 days. This access control system is often associated with a revolving door for Entrance control in buildings to prevent unauthorized access. The use of a revolving door also reduces the need for additional security personnel to monitor every individual entering the building that allows faster throughput.

Additional sub-layer of mechanical/electronic access control protection is achieved by integrating a key management system to manage ownership and use of mechanical locks for locking or properties within a building or campus.

System identification and access policies

Other forms of access control ( procedural ) include the use of policies, processes and procedures for managing their entry into restricted areas. An example is the placement of security personnel who conduct checks to enter officially at a designated entry point. This form of access control is usually equipped with an earlier form of access control (ie, mechanical and electronic access control), or simple physical devices.

Security personnel

security personnel plays a central role in all layers of security. All technological systems used to enhance physical security are useless without the security forces being trained in their use and maintenance, and who know how to respond to security breaches correctly. Security personnel perform many functions: as patrols and at checkpoints, to manage electronic access controls, to respond to alarms, and to monitor and analyze video.

EDS - Physical Security
src: www.eds.mu


See also

  • Alarm management
  • Artificial intelligence for video surveillance
  • Biometric devices
  • Biometrics
  • Security Report Limits
  • Computer security
  • Security door
  • Executive protection
  • Guard patrol system
  • Information security
  • Logical security
  • Physical Security Professional
  • Security alarm
  • Security techniques
  • Supervision
  • High voltage transformer limiter

Secure-M: Physical Security Information Management (PSIM) Platform ...
src: i.ytimg.com


References

Source of the article : Wikipedia

Comments
0 Comments