Module 7 physical security system

1,629 views

Published on

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,629
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
101
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Module 7 physical security system

  1. 1. BE-NETTE C. REVIDAD, CST
  2. 2. <ul><li>At the end of the session, the trainees must be able to </li></ul><ul><li>Define the Physical Security System; </li></ul><ul><li>Identify correctly the objectives of Physical Security and It’s importance in the Security Industry </li></ul>
  3. 3. <ul><li>The physical measures designed to safeguard personnel, property, and information, to prevent unauthorize access to equipment, installations, materail and documents and to safeguard them against espionage, sabotage, damage, and theft. </li></ul>
  4. 4. ARCHITECTURAL FEATURES LOCATION / LAY OUT BARRIER / DOORS LOCKS and BOLTS LIGHTINGS STAFF and PROCEDURES DEPLOYMENT POLICIES and PROCEDURES COMMUNICATION TRAINING ELECTRONIC SYSTEM ACCESS CONTROL SYSTEM ALARM SYSTEM CCTV SYSTEMS COMMUNICATIONS
  5. 5. <ul><li>The type of access necessary will depend on a number of variable factors and therefore may be achieve in a number of ways. </li></ul><ul><li>There is no impenetrable barrier </li></ul><ul><li>Defence in depth – barrier after barrier </li></ul><ul><li>Delay provided against surreptitious and non–surreptitious entry. </li></ul><ul><li>Each installation is different </li></ul>
  6. 6. <ul><li>DETERRENCE </li></ul><ul><li>DETECTION </li></ul><ul><li>DELAY </li></ul><ul><li>RESPONSE </li></ul>
  7. 7. <ul><li>PROTECTION IN DEPTH </li></ul><ul><li>CPTED </li></ul><ul><li>RISKED – BASED APPROACH </li></ul>
  8. 8. EXTERIOR PERIMETERS BUILDING PERIMETERS INTERIOR BARRIERS INTERVENTION ZONE
  9. 9. <ul><li>“ The proper design and effective use of the built environment can lead to a reduction in fear of crime and te incidence of crime and to an improvement in the quality of life” </li></ul><ul><li>Dr. Jeffery, CPTED </li></ul>
  10. 10. <ul><li>Natural access control  utilises walkways, fences, lighting, signage and landscape to clearly guide people and vehicles to and from the proper entrances.  </li></ul><ul><li>Image and maintenance  ensure that a building or area is clean, well kept and free of graffiti or litter. If a property is untidy and littered with trash and graffiti, it sends the message that no one cares for the property and undesirable behaviour will be tolerated.  </li></ul>
  11. 11. <ul><li>Territoriality  allows for the feeling of pride or ownership of a place while also creating a welcoming environment. It is important to project the image that a property is well cared for and those responsible for it will protect it.  </li></ul><ul><li>Natural surveillance  maximises the ability to spot suspicious people or activities. Clear sight lines and visible entranceways are helpful while dimly lit or isolated areas create a more comfortable location for criminals to act.  </li></ul>
  12. 12. <ul><li>Activity support  encourages the intended use of public space by residents. An unsafe area may see a loss of business or a lack of people on the street, for example. An area active with legitimate users deters criminal activity.  </li></ul><ul><li>Hierarchy of space  identifies ownership of an area by clearly delineating private from public space with boundaries such as decorative sidewalks, lawns, and hedges. </li></ul>
  13. 13. <ul><li>Proper allocation of space  features a design or location decision that takes into account the surrounding environment and minimises the use of space by conflicting groups.   In addition to creating an environment in which criminals feel uncomfortable, the goal of these design principals is also to foster an environment in which law-abiding citizens do feel comfortable and secure.  </li></ul>
  14. 14. NATURAL SURVALLANCE TERRITORIALITY DEFENSIVE SPACE ACTIVITY PROGRAMME FORMAL ORGANIZED SURVAILLANCE ACCESS CONTROL TARGET HARDENING
  15. 15. <ul><li>PREPARATION </li></ul><ul><li>RESOURCE APPRECIATION </li></ul><ul><li>AUDIT OF EXISTING SECURITY STRATEGIES </li></ul><ul><li>THREAT ASSESSMENT </li></ul><ul><li>IDENTIFICATION OF VULNERABILITIES </li></ul><ul><li>FORMULATION OF STRATEGIES AND RECOMMENDATION </li></ul>
  16. 16. <ul><li>Safety First </li></ul><ul><li>Support business misson </li></ul><ul><li>Adopt risk – based approach </li></ul><ul><li>Integrate with business operations </li></ul><ul><li>Aim at achieving the objective of deterrenct, detection, delay and response </li></ul><ul><li>Plan for business continuity </li></ul><ul><li>Comply with rules and regulations </li></ul><ul><li>Establish policies and procedures </li></ul><ul><li>Raise staff awareness </li></ul><ul><li>Periodic review and continuous improvement </li></ul>
  17. 17. <ul><li>Putting security before lives </li></ul><ul><li>Not knowing what is at risk </li></ul><ul><li>Not achieving the objective </li></ul><ul><li>No policies and procedures </li></ul><ul><li>Not integrated with business operations </li></ul><ul><li>Low staff awareness of policies and procedures </li></ul><ul><li>No information classification </li></ul><ul><li>Not compliant with local rules and regulations relevant to physical security </li></ul><ul><li>No business continuity planning </li></ul>
  18. 18. TARGET THREAT CHARACTERISTICS PLAN DEVELOP DETECTION DETERRENCE RESPONSE DELAY COST / BENEFIT FEASIBILITY EVALUATE FINAL DESIGN ASSESSMENT
  19. 20. <ul><li>Thank you for your time... </li></ul>7.19.2011

×