SlideShare a Scribd company logo
1 of 22
Module Overview
This Course seeks to give everyday workers, travelers, and adventurers the building blocks to
help anticipate, avoid and respond to danger.
We’ll cover:
● Risk Assessment
● Exterior Intrusion Sensors
● Entry Control
● Access Delay
My Story...
While it is better to detect dangerous situations before they fully develop sometimes
we are presented with situations that require us to react quickly in self defense.
My Story...
While it is better to detect dangerous situations before they fully develop sometimes
we are presented with situations that require us to react quickly in self defense.
My Story...
While it is better to detect dangerous situations before they fully develop sometimes
we are presented with situations that require us to react quickly in self defense.
My Story...
While it is better to detect dangerous situations before they fully develop sometimes
we are presented with situations that require us to react quickly in self defense.
Self-Defense?
De-escalation of potential violence. Using multiple strategies to keep yourself safe
from physical and to some degree, emotional and mental harm.
Physical Protection Systems
Sources
Physical Protection Systems
Physical Protection Systems
A physical protection system (PPS)
integrates people, procedures, and
equipment for the protection of
assets or facilities against theft,
sabotage, or other malevolent
intruder attacks.
Physical Protection Systems
The physical protection components
(detection, delay, and response)
within a facility interact with each
other and their locations significantly
affects the effectiveness of PPS.
Risk Assessment
A method to identify precisely, the risks and all the
probableeffects that those risks will have on the
person(s) and/or organization being protected to
minimize that risk to an acceptable level, and the
the proper implementation of measures to deal
with the remaining elements associatedwith that
risk.
Entry Control
Entry control fall under the Detection
element.
Detection can include:
Exterior/In
Entry Control
Entry control refers to the technology
used to restrict entry or exit at a
facility.
Entry Control
An effective entry control system
permits only authorized persons to
enter and exit, detects and prevents
the entry of contraband materials,
provides information to the
protective force to facilitate
assessment and response.
Entry Control
Entry control technology falls into
one of three classes
Access Delay
Access delay follows detection in an
effective physical protection system.
Access Delay
The performance measure for access
delay elements is TIME.
Delay time for the adversary will
depend on the barrier to be breached
and the tools that are used.
Access Delay
Delay elements include passive
barriers, guards, and dispensable
barriers.
Risk Assessment
End of Part 4-Self Defense
Personal Security Series
Part 1-Developing A Security Mindset
Part 2-Situational Awareness
Part 3-Travel Security
Part 4-Self Defense

More Related Content

What's hot

What's hot (12)

LindaParsons-CV-July2016
LindaParsons-CV-July2016LindaParsons-CV-July2016
LindaParsons-CV-July2016
 
HSAP TEAM FOR SENATE (2)
HSAP TEAM FOR SENATE (2)HSAP TEAM FOR SENATE (2)
HSAP TEAM FOR SENATE (2)
 
Avoidance
AvoidanceAvoidance
Avoidance
 
HSE & Security Seminar ESI
HSE & Security Seminar ESIHSE & Security Seminar ESI
HSE & Security Seminar ESI
 
Close protection CV Mat Sumner 33
Close protection CV Mat Sumner 33Close protection CV Mat Sumner 33
Close protection CV Mat Sumner 33
 
Lecture1 intro to cs
Lecture1 intro to csLecture1 intro to cs
Lecture1 intro to cs
 
EACT STRATEGIC OVERVIEW
EACT STRATEGIC OVERVIEWEACT STRATEGIC OVERVIEW
EACT STRATEGIC OVERVIEW
 
Crisis Action Planning for VIP Bodyguards
Crisis Action Planning for VIP BodyguardsCrisis Action Planning for VIP Bodyguards
Crisis Action Planning for VIP Bodyguards
 
Western University’s Safe Campus Initiative
Western University’s Safe Campus InitiativeWestern University’s Safe Campus Initiative
Western University’s Safe Campus Initiative
 
Risk management and risk avoidance
Risk management and risk avoidanceRisk management and risk avoidance
Risk management and risk avoidance
 
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
 
Cv Ricardo Moll (3)
Cv Ricardo Moll (3)Cv Ricardo Moll (3)
Cv Ricardo Moll (3)
 

Similar to Physical Protection Systems

IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec SysMicheal Isreal
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical SecurityMajor K. Subramaniam Kmaravehlu
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfMax Secure Ltd
 
Deterrence is designated to dissuade potential violators from la.docx
Deterrence is designated to dissuade potential violators from la.docxDeterrence is designated to dissuade potential violators from la.docx
Deterrence is designated to dissuade potential violators from la.docxkhenry4
 
Deterrence is designated to dissuade potential violators from .docx
Deterrence is designated to dissuade potential violators from .docxDeterrence is designated to dissuade potential violators from .docx
Deterrence is designated to dissuade potential violators from .docxkhenry4
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management IIzapp0
 
This is assignment is a two part questions. Each question needs to b.docx
This is assignment is a two part questions. Each question needs to b.docxThis is assignment is a two part questions. Each question needs to b.docx
This is assignment is a two part questions. Each question needs to b.docxkenth16
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Riskphanleson
 
Describe two methods for communicating the material in an Informatio.pdf
Describe two methods for communicating the material in an Informatio.pdfDescribe two methods for communicating the material in an Informatio.pdf
Describe two methods for communicating the material in an Informatio.pdfarchgeetsenterprises
 
AssignmentDeterrence is designated to dissuade potential vio.docx
AssignmentDeterrence is designated to dissuade potential vio.docxAssignmentDeterrence is designated to dissuade potential vio.docx
AssignmentDeterrence is designated to dissuade potential vio.docxedmondpburgess27164
 
AssignmentDeterrence is designated to dissuade potential v.docx
AssignmentDeterrence is designated to dissuade potential v.docxAssignmentDeterrence is designated to dissuade potential v.docx
AssignmentDeterrence is designated to dissuade potential v.docxedmondpburgess27164
 
CSMP Certified Practitioner Statement of Capabilities
CSMP Certified Practitioner Statement of CapabilitiesCSMP Certified Practitioner Statement of Capabilities
CSMP Certified Practitioner Statement of CapabilitiesFastFranky
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to SecurityNateBrown60
 

Similar to Physical Protection Systems (20)

IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical Security
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
Deterrence is designated to dissuade potential violators from la.docx
Deterrence is designated to dissuade potential violators from la.docxDeterrence is designated to dissuade potential violators from la.docx
Deterrence is designated to dissuade potential violators from la.docx
 
Deterrence is designated to dissuade potential violators from .docx
Deterrence is designated to dissuade potential violators from .docxDeterrence is designated to dissuade potential violators from .docx
Deterrence is designated to dissuade potential violators from .docx
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
This is assignment is a two part questions. Each question needs to b.docx
This is assignment is a two part questions. Each question needs to b.docxThis is assignment is a two part questions. Each question needs to b.docx
This is assignment is a two part questions. Each question needs to b.docx
 
Hotel security
Hotel securityHotel security
Hotel security
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Risk
 
How and why accident happen
How and why accident happenHow and why accident happen
How and why accident happen
 
Describe two methods for communicating the material in an Informatio.pdf
Describe two methods for communicating the material in an Informatio.pdfDescribe two methods for communicating the material in an Informatio.pdf
Describe two methods for communicating the material in an Informatio.pdf
 
AssignmentDeterrence is designated to dissuade potential vio.docx
AssignmentDeterrence is designated to dissuade potential vio.docxAssignmentDeterrence is designated to dissuade potential vio.docx
AssignmentDeterrence is designated to dissuade potential vio.docx
 
AssignmentDeterrence is designated to dissuade potential v.docx
AssignmentDeterrence is designated to dissuade potential v.docxAssignmentDeterrence is designated to dissuade potential v.docx
AssignmentDeterrence is designated to dissuade potential v.docx
 
Hotel security hand book
Hotel security hand bookHotel security hand book
Hotel security hand book
 
CSMP Certified Practitioner Statement of Capabilities
CSMP Certified Practitioner Statement of CapabilitiesCSMP Certified Practitioner Statement of Capabilities
CSMP Certified Practitioner Statement of Capabilities
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to Security
 

More from David Santiago

AI Tools for Security Marketing
AI Tools for Security MarketingAI Tools for Security Marketing
AI Tools for Security MarketingDavid Santiago
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1David Santiago
 
EXPATOUS: Hotel security in tunisia
EXPATOUS:  Hotel security in tunisiaEXPATOUS:  Hotel security in tunisia
EXPATOUS: Hotel security in tunisiaDavid Santiago
 
Analysis of Fitch's Report on Tunisia.pptx
Analysis of Fitch's Report on Tunisia.pptxAnalysis of Fitch's Report on Tunisia.pptx
Analysis of Fitch's Report on Tunisia.pptxDavid Santiago
 
Tunisia Crime & Safety 2015
Tunisia Crime & Safety 2015Tunisia Crime & Safety 2015
Tunisia Crime & Safety 2015David Santiago
 
Tunisia 7-actions taken to strengthen security
Tunisia 7-actions taken to strengthen securityTunisia 7-actions taken to strengthen security
Tunisia 7-actions taken to strengthen securityDavid Santiago
 
TSU-After Sousse (Security Brief)
TSU-After Sousse (Security Brief)TSU-After Sousse (Security Brief)
TSU-After Sousse (Security Brief)David Santiago
 
OSAC-April 23rd meeting
OSAC-April 23rd meetingOSAC-April 23rd meeting
OSAC-April 23rd meetingDavid Santiago
 
Traveling to Tunisia-Spring 2015
Traveling to Tunisia-Spring 2015Traveling to Tunisia-Spring 2015
Traveling to Tunisia-Spring 2015David Santiago
 
Bardo Museum Attack-Analysis
Bardo Museum Attack-AnalysisBardo Museum Attack-Analysis
Bardo Museum Attack-AnalysisDavid Santiago
 
Expat Personal Security Workshop Presentation
Expat Personal Security Workshop PresentationExpat Personal Security Workshop Presentation
Expat Personal Security Workshop PresentationDavid Santiago
 
Tunisia 2014 Crime & Safety Review
Tunisia 2014 Crime & Safety Review Tunisia 2014 Crime & Safety Review
Tunisia 2014 Crime & Safety Review David Santiago
 
Tunisia Security Brief-Feb 2014
Tunisia Security Brief-Feb 2014Tunisia Security Brief-Feb 2014
Tunisia Security Brief-Feb 2014David Santiago
 

More from David Santiago (14)

AI Tools for Security Marketing
AI Tools for Security MarketingAI Tools for Security Marketing
AI Tools for Security Marketing
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1
 
EXPATOUS: Hotel security in tunisia
EXPATOUS:  Hotel security in tunisiaEXPATOUS:  Hotel security in tunisia
EXPATOUS: Hotel security in tunisia
 
Analysis of Fitch's Report on Tunisia.pptx
Analysis of Fitch's Report on Tunisia.pptxAnalysis of Fitch's Report on Tunisia.pptx
Analysis of Fitch's Report on Tunisia.pptx
 
Tunisia Crime & Safety 2015
Tunisia Crime & Safety 2015Tunisia Crime & Safety 2015
Tunisia Crime & Safety 2015
 
Tunisia 7-actions taken to strengthen security
Tunisia 7-actions taken to strengthen securityTunisia 7-actions taken to strengthen security
Tunisia 7-actions taken to strengthen security
 
TSU-After Sousse (Security Brief)
TSU-After Sousse (Security Brief)TSU-After Sousse (Security Brief)
TSU-After Sousse (Security Brief)
 
OSAC-April 23rd meeting
OSAC-April 23rd meetingOSAC-April 23rd meeting
OSAC-April 23rd meeting
 
Traveling to Tunisia-Spring 2015
Traveling to Tunisia-Spring 2015Traveling to Tunisia-Spring 2015
Traveling to Tunisia-Spring 2015
 
Bardo Museum Attack-Analysis
Bardo Museum Attack-AnalysisBardo Museum Attack-Analysis
Bardo Museum Attack-Analysis
 
Expat Personal Security Workshop Presentation
Expat Personal Security Workshop PresentationExpat Personal Security Workshop Presentation
Expat Personal Security Workshop Presentation
 
Tunisia 2014 Crime & Safety Review
Tunisia 2014 Crime & Safety Review Tunisia 2014 Crime & Safety Review
Tunisia 2014 Crime & Safety Review
 
Tunisia Security Brief-Feb 2014
Tunisia Security Brief-Feb 2014Tunisia Security Brief-Feb 2014
Tunisia Security Brief-Feb 2014
 
Mais presentation
Mais presentation Mais presentation
Mais presentation
 

Recently uploaded

The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸mathanramanathan2005
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationNathan Young
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxaryanv1753
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 

Recently uploaded (20)

The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 

Physical Protection Systems

  • 1.
  • 2. Module Overview This Course seeks to give everyday workers, travelers, and adventurers the building blocks to help anticipate, avoid and respond to danger. We’ll cover: ● Risk Assessment ● Exterior Intrusion Sensors ● Entry Control ● Access Delay
  • 3. My Story... While it is better to detect dangerous situations before they fully develop sometimes we are presented with situations that require us to react quickly in self defense.
  • 4. My Story... While it is better to detect dangerous situations before they fully develop sometimes we are presented with situations that require us to react quickly in self defense.
  • 5. My Story... While it is better to detect dangerous situations before they fully develop sometimes we are presented with situations that require us to react quickly in self defense.
  • 6. My Story... While it is better to detect dangerous situations before they fully develop sometimes we are presented with situations that require us to react quickly in self defense.
  • 7. Self-Defense? De-escalation of potential violence. Using multiple strategies to keep yourself safe from physical and to some degree, emotional and mental harm.
  • 10. Physical Protection Systems A physical protection system (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage, or other malevolent intruder attacks.
  • 11. Physical Protection Systems The physical protection components (detection, delay, and response) within a facility interact with each other and their locations significantly affects the effectiveness of PPS.
  • 12. Risk Assessment A method to identify precisely, the risks and all the probableeffects that those risks will have on the person(s) and/or organization being protected to minimize that risk to an acceptable level, and the the proper implementation of measures to deal with the remaining elements associatedwith that risk.
  • 13. Entry Control Entry control fall under the Detection element. Detection can include: Exterior/In
  • 14. Entry Control Entry control refers to the technology used to restrict entry or exit at a facility.
  • 15. Entry Control An effective entry control system permits only authorized persons to enter and exit, detects and prevents the entry of contraband materials, provides information to the protective force to facilitate assessment and response.
  • 16. Entry Control Entry control technology falls into one of three classes
  • 17. Access Delay Access delay follows detection in an effective physical protection system.
  • 18. Access Delay The performance measure for access delay elements is TIME. Delay time for the adversary will depend on the barrier to be breached and the tools that are used.
  • 19. Access Delay Delay elements include passive barriers, guards, and dispensable barriers.
  • 21.
  • 22. End of Part 4-Self Defense Personal Security Series Part 1-Developing A Security Mindset Part 2-Situational Awareness Part 3-Travel Security Part 4-Self Defense