2. Based on the current situation around the world,
the demand for security systems is rapidly
increasing. As a result, most organizations are ill-
equipped to determine which systems are most
suited for their requirements.
4. Perspectives
The security situation in organizations is bound to change,
and has changed in major aspects, for numerous reasons:
• violence measured in costs as well as frequency of
incidents, will continue at its current rate of increase
over the short-term future
• violence will involve extensive use, or threatened
use of explosive devises;
• terrorism will continue to increase throughout the
world;
• racial and ethnic minorities will increase legitimate
pressures and demands for equality of treatment;
• hostilities and violence in relations will be
experienced within organizations having mixed racial
and ethnic populations, as well as in public places;
5. Perspectives
• Ethical standards, as restraints against criminal or
anti-social behaviour by individuals and groups, will
be less effective (drug and alcohol problems);
• some organizations do not resort to tight systematic
control programmes for security and prevention, but
rely quite extensively upon people's good will.
Continuation of that approach will extend, as well as
increase, security exposure and negative
experiences places;
8. The Security Management Process
Assign Responsibility
Diagnostics
Define Security
Level & planning
Assess Security
risk
Develop Security
Procedure
Define technical
Standards for
equipment
Provide Security
Training
System
Integration
Implement Security
Evaluate results vs
objectives
Monitor Security
Quality Control
Implementation
Supervision
Security Audit
9. Integrated Security Systems
There are various types of integrated security
systems, each applicable to specific requirements.
Selection of the appropriate security system for a
particular application is based on the:
• Risk evaluation
• Security level to be achieved
• Balance between equipment, systems and human
resources.
The philosophy and aims of such integrated
security systems are the same. Their functions are
similar but their configurations are different as a result of
specific needs, as well as the quality and complexity of
the security equipment
10. Methodological Approach
The starting point of security management is the
diagnostic study. It includes :
• The risk analysis, which consists in
"systematically conceiving all situations
susceptible to constitute a danger or a risk
which could affect the organization, thus
become a source of losses"
• The determination of desired security levels;
• The definition of a security programme
11. The Organization and its Risk Analysis
Risks generally related to security are considered pure risks. They
constitute solely a chance of loss and never a chance of gain.
They are divided into the following two categories
• human risks (dishonesty, theft, fraud, terrorism, lack of
ethics, sabotage accidents, incidents)
• physical or technical risks (fires, explosions, water
damages, incidents, equipment failure, environmental
catastrophes) ;
12. Define security
Level & planning
Internal factors
• Land – Buildings
• Equipment
• Financial Resources
• Personnel
• Know-How
• Trade Secrets
Human Risks
Accidental Risks
Activity related Risks
Physical / technical Risks
Political events
Administrative decisions
Third party
Accidental risks
Sub contractor
Competition
Economic
Climate
Pressure groups
Social factors
Labour unions
Organisation
and its Risks
13. The required security level
General description of level
A security protection level is defined as a condition which
results from the establishment of minimal to exceptional
measures to protect personnel, to safeguard assets and to
maintain operations against hostile persons, acts or influences
14. 1 - MINIMUM
2 - LOW LEVEL
3 - MEDIUM
4 - HIGH LEVEL
5 - MAXIMUM
Levels of Physical Security
15. FIVE LEVELS OF PHYSICAL
SECURITY
• LEVEL-I : MINIMUM SECURITY
– SIMPLE PHYSICAL BARRIERS
– SIMPLE LOCKS
• LEVEL-II : LOW-LEVEL SECURITY
– BASIC LOCAL ALARM SYSTEMS
– SIMPLE SECURITY LIGHTING
– BASIC SECURITY / PHYSICAL BARRIERS
– HIGH SECURITY LOCKS
16. FIVE LEVELS OF PHYSICAL
SECURITY
• LEVEL-III : MEDIUM SECURITY
– ADVANCED REMOTE ALARM SYSTEM
– HIGH SECURITY PHYSICAL BARRIERS AT PERIMETER
– WATCHMEN WITH BASIC COMMUNICATION
• LEVEL-IV : HIGH-LEVEL SECURITY
– CCTV
– PERIMETER ALARM SYSTEM
– HIGHLY TRAINED GUARDS WITH ADVANCED
COMMUNICATION
– ACCESS CONTROLS
– HIGH-SECURITY LIGHTING
– LAW ENFORCEMENT COORDINATION
• LEVEL-V : MAXIMUM SECURITY
– ONSITE, ARMED RESPONSE FORCE, SOPHISTICATED
ALARM SYSTEM
17. PERIMETER
PROTECTION
SYSTEM
ACCESS CONTROL PARKING
CONTROL
& BARRIER GATE
-
SEARCH OF PERSONNEL
AND BAGS FOR
UNAUTHORIZED MATERIAL
CCTV
SURVEILLANCE
INTRUSION
DETECTION
AND ALARM
SYSTEM
LEVEL 5 : MAXIMUM SECURITY
DESIGN –
To impede, detect, assess & neutralise all
unauthorised external & internal activity
ON-SITE
RESPONSE
FORCE
18. General principles of Security
Physical security safeguards must deter, delay and announce
unauthorized intrusions, bearing in mind the following:
• physical security safeguards by themselves are not sufficient to
prevent intrusions; the intended objective is to delay an intruder
long enough to ensure detection and to provide adequate
intervention by security personnel;
• costs must be commensurate with the importance of facilities to
be protected
In order to adequately protect installations, physical security
safeguards must be established according to the following criteria:
• identifying and surrounding all strategic areas to be protected.
and providing adequate obstructions through the use of physical
safeguards including fences, gates and/or building walls, with
electronic perimeter detection devices;
• establishing a minimum number of authorized access control
points, and installing sufficient security equipment detection
devices;
• limiting entry to persons and vehicles on a requirement basis only;
vehicles and pedestrians must all be controlled
19. • restricting access for all service and operational vehicles through
controlled, access points where adequate verifications can be
exercised;
• implementing an identification card system for all employees and
a temporary pass system for all other groups concerned;
• controlling entries and exits by designated personnel through
techniques ranging from cursory surveillance to close inspection
of passes, credentials, vehicles and personnel;
• identifying specific sectors of "a site which can only be accessed
by selected personnel; additional protection and control must be
provided to those areas;
• establishing effective surveillance of restricted zones, vital areas
and critical installations;
• establishing adequate deterrence through proper lighting;
• implementing sufficient patrols to adequately control the areas
and provide effective intervention.
20. An entity of conceived measures planned and applied to ensure
the protection of assets, of persons linked to the organization
and its environment, and of installations against all types of risks
Definition of security
21. Areas of Application
Security takes various forms which apply to several areas, such as
• personal security, which relies on body guards to protect VIPs
and their family, as well as key personnel of organizations;
• physical security; protection of sites and buildings, access
control, guard operations;
• internal security; policies and procedures related to the
protection of information, pre-employment verifications, control
of material;
• fire protection; detection, extinction and warning systems,
equipment, procedures and training;
• computer security; site and equipment protection, management
of data banks and operations, access to information;
• emergency planning; intervention and evacuation plans, plans
for recovery and resumption of activities
22. The most effective security consists of an appropriate
amalgamation of physical security safeguards
strategically located, complemented by properly trained
and equipped personnel, guided and supported by
policies, security procedures and operational instructions
approved and monitored by top management.
23. Categories of measures
After diagnostic study & determination of security level, it is crucial to
identify the main control measures which will allow the organisation to
protect itself against likely risks. In order to implement a valid security
programme, three categories of measures must be addressed. These
categories are
• the judicious selection of protective and surveillance equipment, as
dictated by the needs and risk of evaluation
• the effective use of human resources in the application of control
and preventive measures.
• The preparation of adequate policies, control procedures and
prevention regulations, as well as the establishment of means to
inform and to train personnel.
24. Elements of Security
• Protection and surveillance equipment
• Policies , control procedures etc
• Human resources
Only the integration and inter-relation of those three categories of
measures are likely to ensure the efficiency of the security
programme on sites and within installations
26. Types of measures : static and dynamic
Static measures are related to tangibles , such as :-
• Perimeter protection
• Intrusion detection systems
• Video monitoring systems
• Fire protection systems
• Other support systems, such as shredders, safes,
vaults, secure filing cabinets etc
27. Dynamic measures are related to human resources and
intangibles, such as:
• personnel allocated to control and surveillance;
• awareness, information and training of employees;
• general policies directly related to security and prevention;
• basic security procedures for the control of persons, material,
keys, or in the event of intrusion detection, work conflicts,
criminal activities;
• emergency procedures and resumption of activities;
• determination of personnel reliability, through pre-employment
verifications,
• positive identification, code of ethics, probation period, periodic
evaluation of performance;
• protection of critical information, thorough filing, storage and
secure destruction and IT security management systems;
• control procedures and periodic checks, safes, vaults, secure
filing cabinets etc
28. Integrated security system
Operational Security Concept
Operational security concept depends on three activities
• Prevention
• Detection
• Intervention
Operational planning aims to ensure that resources, equipment, systems as
well as procedures are designed and integrated in an efficient manner . It is
important to realize how the various protection means must be inter-related,
and how the three basic activities (prevention, detection, intervention) are
carried out.
29. Integrated security system
Consolidation of elements and sub systems which
assure the reception and transmission, through one
control centre, of all alarms and other conditions, of
all commands and other controls necessary to the
efficient performance of predefined functions related
to security
30. Based on this general security approach, the security concept must rely on
a logical progression of measures, such as
• perimeter protection;
• perimeter detection;
• control of entry and exit points;
• general surveillance of site and installations;
• protection of strategic areas;
• detection of intrusion and control of access at strategic locations;
• patrols of areas of jurisdiction;
• intervention during normal security posture;
• intervention during emergency situations
Logical Progression of Measures
31. Objectives of the system
To assist users in their duties of security operations and management.
Its implementation meets the following objectives, which are :-
• establish a controlled security system which encompasses all
security facets on a routine basis, with the built-in flexibility to
increase security levels with only minor modifications
• provide a secure environment for the site, installations and
activities, through perimeter detection, surveillance and protection
• ensure prompt detection of all unusual or abnormal activities and a
better coordination of the response intervention by identifying the
appropriate procedures to be followed in different situations
• automation, whenever possible of all controls, zone surveillance
and equipment supervision in order to efficiently utilize human
resources and assure an adequate level of intervention.
32. Security
It permits constant supervision of the premises. it
controls access to the site and vital installations and it provides
command over the response apparatus;
Assistance
It informs its users of the status of each supervised point
and suggests intervention possibilities. To do so, the system
must integrate all data originating from the sub-systems with a
security function;
Efficiency
It permits a better use of human resources committed to
security and therefore achieves the best possible
cost/performance return.
Integrated security system has three main
purposes
33. COST EFFECTIVENESS OF
SECURITY
• Maximization of results.
• Minimization of resources.
CONCEPT OF COST-BENEFIT RATIO:
Proportion between
• The cost of establishing & maintaining
security measures and a security system.
and
• The probable cost of losses which might
occur without security.
34. SECURITY CONTROL &
CRISIS RESPONSE
• Integrated Control Room
• Quick Reaction Teams (QRT) with
– Commando trained personnel
– Wireless fitted dedicated vehicles
– Bullet proof vests/helmets
• Bomb disposal unit
• Contingency Plan & Disaster
Management
35. MANAGEMENT
• Getting things done from others
• Process of conversion of resources into
result.
• Optimal utilization of resources for
achieving organizational objectives.
• Releasing and realizing human potential.
36. Conclusion
• The implementation of an integrated security system is either the
starting point or the result of the security management planning
process.
• In order to benefit from all advantages brought about by such systems
their definition must not be left to improvisation as it is often the case.
• All senior Security Managers and heads of organizations must realize
that it is not only a question of interfacing various equipments with
each other, but rather of judiciously inter-relating the overall resources
committed to security.
• Therefore, security management must always place appropriate
emphasis on each activity (prevention, detection, intervention) of the
dynamic function which forms the security cycle, in relation to the risks
facing the organization