SlideShare a Scribd company logo
1 of 37
Based on the current situation around the world,
the demand for security systems is rapidly
increasing. As a result, most organizations are ill-
equipped to determine which systems are most
suited for their requirements.
Aim
To outline important factors while
integrating the systems
Perspectives
The security situation in organizations is bound to change,
and has changed in major aspects, for numerous reasons:
• violence measured in costs as well as frequency of
incidents, will continue at its current rate of increase
over the short-term future
• violence will involve extensive use, or threatened
use of explosive devises;
• terrorism will continue to increase throughout the
world;
• racial and ethnic minorities will increase legitimate
pressures and demands for equality of treatment;
• hostilities and violence in relations will be
experienced within organizations having mixed racial
and ethnic populations, as well as in public places;
Perspectives
• Ethical standards, as restraints against criminal or
anti-social behaviour by individuals and groups, will
be less effective (drug and alcohol problems);
• some organizations do not resort to tight systematic
control programmes for security and prevention, but
rely quite extensively upon people's good will.
Continuation of that approach will extend, as well as
increase, security exposure and negative
experiences places;
SECURITY MANAGEMENT
Detection Intervention
Prevention
A dynamic process involving
three major activities
Planning Considerations
THREAT PERCEPTION
HOW IMPORTANT IS IT?
WHAT IS BEING PROTECTED? Value of Asset
Corporate Commitment
Damage Potential
VALUE OF
ASSET
COST OF
PROTECTION
The Security Management Process
Assign Responsibility
Diagnostics
Define Security
Level & planning
Assess Security
risk
Develop Security
Procedure
Define technical
Standards for
equipment
Provide Security
Training
System
Integration
Implement Security
Evaluate results vs
objectives
Monitor Security
Quality Control
Implementation
Supervision
Security Audit
Integrated Security Systems
There are various types of integrated security
systems, each applicable to specific requirements.
Selection of the appropriate security system for a
particular application is based on the:
• Risk evaluation
• Security level to be achieved
• Balance between equipment, systems and human
resources.
The philosophy and aims of such integrated
security systems are the same. Their functions are
similar but their configurations are different as a result of
specific needs, as well as the quality and complexity of
the security equipment
Methodological Approach
The starting point of security management is the
diagnostic study. It includes :
• The risk analysis, which consists in
"systematically conceiving all situations
susceptible to constitute a danger or a risk
which could affect the organization, thus
become a source of losses"
• The determination of desired security levels;
• The definition of a security programme
The Organization and its Risk Analysis
Risks generally related to security are considered pure risks. They
constitute solely a chance of loss and never a chance of gain.
They are divided into the following two categories
• human risks (dishonesty, theft, fraud, terrorism, lack of
ethics, sabotage accidents, incidents)
• physical or technical risks (fires, explosions, water
damages, incidents, equipment failure, environmental
catastrophes) ;
Define security
Level & planning
Internal factors
• Land – Buildings
• Equipment
• Financial Resources
• Personnel
• Know-How
• Trade Secrets
Human Risks
Accidental Risks
Activity related Risks
Physical / technical Risks
Political events
Administrative decisions
Third party
Accidental risks
Sub contractor
Competition
Economic
Climate
Pressure groups
Social factors
Labour unions
Organisation
and its Risks
The required security level
General description of level
A security protection level is defined as a condition which
results from the establishment of minimal to exceptional
measures to protect personnel, to safeguard assets and to
maintain operations against hostile persons, acts or influences
 1 - MINIMUM
 2 - LOW LEVEL
 3 - MEDIUM
 4 - HIGH LEVEL
 5 - MAXIMUM
Levels of Physical Security
FIVE LEVELS OF PHYSICAL
SECURITY
• LEVEL-I : MINIMUM SECURITY
– SIMPLE PHYSICAL BARRIERS
– SIMPLE LOCKS
• LEVEL-II : LOW-LEVEL SECURITY
– BASIC LOCAL ALARM SYSTEMS
– SIMPLE SECURITY LIGHTING
– BASIC SECURITY / PHYSICAL BARRIERS
– HIGH SECURITY LOCKS
FIVE LEVELS OF PHYSICAL
SECURITY
• LEVEL-III : MEDIUM SECURITY
– ADVANCED REMOTE ALARM SYSTEM
– HIGH SECURITY PHYSICAL BARRIERS AT PERIMETER
– WATCHMEN WITH BASIC COMMUNICATION
• LEVEL-IV : HIGH-LEVEL SECURITY
– CCTV
– PERIMETER ALARM SYSTEM
– HIGHLY TRAINED GUARDS WITH ADVANCED
COMMUNICATION
– ACCESS CONTROLS
– HIGH-SECURITY LIGHTING
– LAW ENFORCEMENT COORDINATION
• LEVEL-V : MAXIMUM SECURITY
– ONSITE, ARMED RESPONSE FORCE, SOPHISTICATED
ALARM SYSTEM
PERIMETER
PROTECTION
SYSTEM
ACCESS CONTROL PARKING
CONTROL
& BARRIER GATE
-
SEARCH OF PERSONNEL
AND BAGS FOR
UNAUTHORIZED MATERIAL
CCTV
SURVEILLANCE
INTRUSION
DETECTION
AND ALARM
SYSTEM
LEVEL 5 : MAXIMUM SECURITY
DESIGN –
To impede, detect, assess & neutralise all
unauthorised external & internal activity
ON-SITE
RESPONSE
FORCE
General principles of Security
 Physical security safeguards must deter, delay and announce
unauthorized intrusions, bearing in mind the following:
• physical security safeguards by themselves are not sufficient to
prevent intrusions; the intended objective is to delay an intruder
long enough to ensure detection and to provide adequate
intervention by security personnel;
• costs must be commensurate with the importance of facilities to
be protected
 In order to adequately protect installations, physical security
safeguards must be established according to the following criteria:
• identifying and surrounding all strategic areas to be protected.
and providing adequate obstructions through the use of physical
safeguards including fences, gates and/or building walls, with
electronic perimeter detection devices;
• establishing a minimum number of authorized access control
points, and installing sufficient security equipment detection
devices;
• limiting entry to persons and vehicles on a requirement basis only;
vehicles and pedestrians must all be controlled
• restricting access for all service and operational vehicles through
controlled, access points where adequate verifications can be
exercised;
• implementing an identification card system for all employees and
a temporary pass system for all other groups concerned;
• controlling entries and exits by designated personnel through
techniques ranging from cursory surveillance to close inspection
of passes, credentials, vehicles and personnel;
• identifying specific sectors of "a site which can only be accessed
by selected personnel; additional protection and control must be
provided to those areas;
• establishing effective surveillance of restricted zones, vital areas
and critical installations;
• establishing adequate deterrence through proper lighting;
• implementing sufficient patrols to adequately control the areas
and provide effective intervention.
An entity of conceived measures planned and applied to ensure
the protection of assets, of persons linked to the organization
and its environment, and of installations against all types of risks
Definition of security
Areas of Application
Security takes various forms which apply to several areas, such as
• personal security, which relies on body guards to protect VIPs
and their family, as well as key personnel of organizations;
• physical security; protection of sites and buildings, access
control, guard operations;
• internal security; policies and procedures related to the
protection of information, pre-employment verifications, control
of material;
• fire protection; detection, extinction and warning systems,
equipment, procedures and training;
• computer security; site and equipment protection, management
of data banks and operations, access to information;
• emergency planning; intervention and evacuation plans, plans
for recovery and resumption of activities
The most effective security consists of an appropriate
amalgamation of physical security safeguards
strategically located, complemented by properly trained
and equipped personnel, guided and supported by
policies, security procedures and operational instructions
approved and monitored by top management.
Categories of measures
After diagnostic study & determination of security level, it is crucial to
identify the main control measures which will allow the organisation to
protect itself against likely risks. In order to implement a valid security
programme, three categories of measures must be addressed. These
categories are
• the judicious selection of protective and surveillance equipment, as
dictated by the needs and risk of evaluation
• the effective use of human resources in the application of control
and preventive measures.
• The preparation of adequate policies, control procedures and
prevention regulations, as well as the establishment of means to
inform and to train personnel.
Elements of Security
• Protection and surveillance equipment
• Policies , control procedures etc
• Human resources
Only the integration and inter-relation of those three categories of
measures are likely to ensure the efficiency of the security
programme on sites and within installations
The pillars of security
Personnel Material
Procedures
Types of measures : static and dynamic
Static measures are related to tangibles , such as :-
• Perimeter protection
• Intrusion detection systems
• Video monitoring systems
• Fire protection systems
• Other support systems, such as shredders, safes,
vaults, secure filing cabinets etc
Dynamic measures are related to human resources and
intangibles, such as:
• personnel allocated to control and surveillance;
• awareness, information and training of employees;
• general policies directly related to security and prevention;
• basic security procedures for the control of persons, material,
keys, or in the event of intrusion detection, work conflicts,
criminal activities;
• emergency procedures and resumption of activities;
• determination of personnel reliability, through pre-employment
verifications,
• positive identification, code of ethics, probation period, periodic
evaluation of performance;
• protection of critical information, thorough filing, storage and
secure destruction and IT security management systems;
• control procedures and periodic checks, safes, vaults, secure
filing cabinets etc
Integrated security system
Operational Security Concept
Operational security concept depends on three activities
• Prevention
• Detection
• Intervention
Operational planning aims to ensure that resources, equipment, systems as
well as procedures are designed and integrated in an efficient manner . It is
important to realize how the various protection means must be inter-related,
and how the three basic activities (prevention, detection, intervention) are
carried out.
Integrated security system
Consolidation of elements and sub systems which
assure the reception and transmission, through one
control centre, of all alarms and other conditions, of
all commands and other controls necessary to the
efficient performance of predefined functions related
to security
Based on this general security approach, the security concept must rely on
a logical progression of measures, such as
• perimeter protection;
• perimeter detection;
• control of entry and exit points;
• general surveillance of site and installations;
• protection of strategic areas;
• detection of intrusion and control of access at strategic locations;
• patrols of areas of jurisdiction;
• intervention during normal security posture;
• intervention during emergency situations
Logical Progression of Measures
Objectives of the system
To assist users in their duties of security operations and management.
Its implementation meets the following objectives, which are :-
• establish a controlled security system which encompasses all
security facets on a routine basis, with the built-in flexibility to
increase security levels with only minor modifications
• provide a secure environment for the site, installations and
activities, through perimeter detection, surveillance and protection
• ensure prompt detection of all unusual or abnormal activities and a
better coordination of the response intervention by identifying the
appropriate procedures to be followed in different situations
• automation, whenever possible of all controls, zone surveillance
and equipment supervision in order to efficiently utilize human
resources and assure an adequate level of intervention.
Security
It permits constant supervision of the premises. it
controls access to the site and vital installations and it provides
command over the response apparatus;
Assistance
It informs its users of the status of each supervised point
and suggests intervention possibilities. To do so, the system
must integrate all data originating from the sub-systems with a
security function;
 Efficiency
It permits a better use of human resources committed to
security and therefore achieves the best possible
cost/performance return.
Integrated security system has three main
purposes
COST EFFECTIVENESS OF
SECURITY
• Maximization of results.
• Minimization of resources.
CONCEPT OF COST-BENEFIT RATIO:
Proportion between
• The cost of establishing & maintaining
security measures and a security system.
and
• The probable cost of losses which might
occur without security.
SECURITY CONTROL &
CRISIS RESPONSE
• Integrated Control Room
• Quick Reaction Teams (QRT) with
– Commando trained personnel
– Wireless fitted dedicated vehicles
– Bullet proof vests/helmets
• Bomb disposal unit
• Contingency Plan & Disaster
Management
MANAGEMENT
• Getting things done from others
• Process of conversion of resources into
result.
• Optimal utilization of resources for
achieving organizational objectives.
• Releasing and realizing human potential.
Conclusion
• The implementation of an integrated security system is either the
starting point or the result of the security management planning
process.
• In order to benefit from all advantages brought about by such systems
their definition must not be left to improvisation as it is often the case.
• All senior Security Managers and heads of organizations must realize
that it is not only a question of interfacing various equipments with
each other, but rather of judiciously inter-relating the overall resources
committed to security.
• Therefore, security management must always place appropriate
emphasis on each activity (prevention, detection, intervention) of the
dynamic function which forms the security cycle, in relation to the risks
facing the organization
Integrated Security management final.ppt

More Related Content

What's hot

Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Security Presentation
Security PresentationSecurity Presentation
Security PresentationGerhard Peens
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1David Santiago
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Security Guard Services Best Practices by JMSupan 2019
Security Guard Services Best Practices by JMSupan 2019Security Guard Services Best Practices by JMSupan 2019
Security Guard Services Best Practices by JMSupan 2019JOEL JESUS SUPAN
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplacedougfarre
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organizationTejas Wasule
 
Integrated Physical Security
Integrated Physical SecurityIntegrated Physical Security
Integrated Physical SecurityJohn N. Motlagh
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 

What's hot (20)

Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Security Guard Services Best Practices by JMSupan 2019
Security Guard Services Best Practices by JMSupan 2019Security Guard Services Best Practices by JMSupan 2019
Security Guard Services Best Practices by JMSupan 2019
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Security training module
Security training moduleSecurity training module
Security training module
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
 
Access control at gates
Access control at gatesAccess control at gates
Access control at gates
 
Workplace Security practices
Workplace Security practicesWorkplace Security practices
Workplace Security practices
 
Integrated Physical Security
Integrated Physical SecurityIntegrated Physical Security
Integrated Physical Security
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar to Integrated Security management final.ppt

2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec SysMicheal Isreal
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical SecurityMajor K. Subramaniam Kmaravehlu
 
001_Cybersecurity Fundamentals Security Principles.pdf
001_Cybersecurity Fundamentals Security Principles.pdf001_Cybersecurity Fundamentals Security Principles.pdf
001_Cybersecurity Fundamentals Security Principles.pdfchandrabaguswinardi
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualDayo Olujekun
 
Lecture on Safety Management.pptx
Lecture on Safety Management.pptxLecture on Safety Management.pptx
Lecture on Safety Management.pptxatwine1
 
Chapter 1 Introduction to Safety, Security and First Aid (FASS)
Chapter 1 Introduction to Safety, Security and First Aid (FASS)Chapter 1 Introduction to Safety, Security and First Aid (FASS)
Chapter 1 Introduction to Safety, Security and First Aid (FASS)Md Shaifullar Rabbi
 
L1_Introduction.pptx
L1_Introduction.pptxL1_Introduction.pptx
L1_Introduction.pptxStevenTharp2
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Chinatu Uzuegbu
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Security Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOVSecurity Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOVEric Vanderburg
 
Introduction.137697294749987.OS
Introduction.137697294749987.OSIntroduction.137697294749987.OS
Introduction.137697294749987.OSEiyla Hamdan
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...stuimrozsm
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfssuserf98dd4
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptxcejobelle
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Information security
Information securityInformation security
Information securityPraveen Minz
 

Similar to Integrated Security management final.ppt (20)

2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical Security
 
001_Cybersecurity Fundamentals Security Principles.pdf
001_Cybersecurity Fundamentals Security Principles.pdf001_Cybersecurity Fundamentals Security Principles.pdf
001_Cybersecurity Fundamentals Security Principles.pdf
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government Individual
 
Lecture on Safety Management.pptx
Lecture on Safety Management.pptxLecture on Safety Management.pptx
Lecture on Safety Management.pptx
 
Chapter003
Chapter003Chapter003
Chapter003
 
HIPAA omnibus rule update
HIPAA omnibus rule updateHIPAA omnibus rule update
HIPAA omnibus rule update
 
Chapter 1 Introduction to Safety, Security and First Aid (FASS)
Chapter 1 Introduction to Safety, Security and First Aid (FASS)Chapter 1 Introduction to Safety, Security and First Aid (FASS)
Chapter 1 Introduction to Safety, Security and First Aid (FASS)
 
L1_Introduction.pptx
L1_Introduction.pptxL1_Introduction.pptx
L1_Introduction.pptx
 
403 9
403 9403 9
403 9
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Security Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOVSecurity Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOV
 
Introduction.137697294749987.OS
Introduction.137697294749987.OSIntroduction.137697294749987.OS
Introduction.137697294749987.OS
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
 
Safety and Health Inspection
Safety and Health InspectionSafety and Health Inspection
Safety and Health Inspection
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Information security
Information securityInformation security
Information security
 

Recently uploaded

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Integrated Security management final.ppt

  • 1.
  • 2. Based on the current situation around the world, the demand for security systems is rapidly increasing. As a result, most organizations are ill- equipped to determine which systems are most suited for their requirements.
  • 3. Aim To outline important factors while integrating the systems
  • 4. Perspectives The security situation in organizations is bound to change, and has changed in major aspects, for numerous reasons: • violence measured in costs as well as frequency of incidents, will continue at its current rate of increase over the short-term future • violence will involve extensive use, or threatened use of explosive devises; • terrorism will continue to increase throughout the world; • racial and ethnic minorities will increase legitimate pressures and demands for equality of treatment; • hostilities and violence in relations will be experienced within organizations having mixed racial and ethnic populations, as well as in public places;
  • 5. Perspectives • Ethical standards, as restraints against criminal or anti-social behaviour by individuals and groups, will be less effective (drug and alcohol problems); • some organizations do not resort to tight systematic control programmes for security and prevention, but rely quite extensively upon people's good will. Continuation of that approach will extend, as well as increase, security exposure and negative experiences places;
  • 6. SECURITY MANAGEMENT Detection Intervention Prevention A dynamic process involving three major activities
  • 7. Planning Considerations THREAT PERCEPTION HOW IMPORTANT IS IT? WHAT IS BEING PROTECTED? Value of Asset Corporate Commitment Damage Potential VALUE OF ASSET COST OF PROTECTION
  • 8. The Security Management Process Assign Responsibility Diagnostics Define Security Level & planning Assess Security risk Develop Security Procedure Define technical Standards for equipment Provide Security Training System Integration Implement Security Evaluate results vs objectives Monitor Security Quality Control Implementation Supervision Security Audit
  • 9. Integrated Security Systems There are various types of integrated security systems, each applicable to specific requirements. Selection of the appropriate security system for a particular application is based on the: • Risk evaluation • Security level to be achieved • Balance between equipment, systems and human resources. The philosophy and aims of such integrated security systems are the same. Their functions are similar but their configurations are different as a result of specific needs, as well as the quality and complexity of the security equipment
  • 10. Methodological Approach The starting point of security management is the diagnostic study. It includes : • The risk analysis, which consists in "systematically conceiving all situations susceptible to constitute a danger or a risk which could affect the organization, thus become a source of losses" • The determination of desired security levels; • The definition of a security programme
  • 11. The Organization and its Risk Analysis Risks generally related to security are considered pure risks. They constitute solely a chance of loss and never a chance of gain. They are divided into the following two categories • human risks (dishonesty, theft, fraud, terrorism, lack of ethics, sabotage accidents, incidents) • physical or technical risks (fires, explosions, water damages, incidents, equipment failure, environmental catastrophes) ;
  • 12. Define security Level & planning Internal factors • Land – Buildings • Equipment • Financial Resources • Personnel • Know-How • Trade Secrets Human Risks Accidental Risks Activity related Risks Physical / technical Risks Political events Administrative decisions Third party Accidental risks Sub contractor Competition Economic Climate Pressure groups Social factors Labour unions Organisation and its Risks
  • 13. The required security level General description of level A security protection level is defined as a condition which results from the establishment of minimal to exceptional measures to protect personnel, to safeguard assets and to maintain operations against hostile persons, acts or influences
  • 14.  1 - MINIMUM  2 - LOW LEVEL  3 - MEDIUM  4 - HIGH LEVEL  5 - MAXIMUM Levels of Physical Security
  • 15. FIVE LEVELS OF PHYSICAL SECURITY • LEVEL-I : MINIMUM SECURITY – SIMPLE PHYSICAL BARRIERS – SIMPLE LOCKS • LEVEL-II : LOW-LEVEL SECURITY – BASIC LOCAL ALARM SYSTEMS – SIMPLE SECURITY LIGHTING – BASIC SECURITY / PHYSICAL BARRIERS – HIGH SECURITY LOCKS
  • 16. FIVE LEVELS OF PHYSICAL SECURITY • LEVEL-III : MEDIUM SECURITY – ADVANCED REMOTE ALARM SYSTEM – HIGH SECURITY PHYSICAL BARRIERS AT PERIMETER – WATCHMEN WITH BASIC COMMUNICATION • LEVEL-IV : HIGH-LEVEL SECURITY – CCTV – PERIMETER ALARM SYSTEM – HIGHLY TRAINED GUARDS WITH ADVANCED COMMUNICATION – ACCESS CONTROLS – HIGH-SECURITY LIGHTING – LAW ENFORCEMENT COORDINATION • LEVEL-V : MAXIMUM SECURITY – ONSITE, ARMED RESPONSE FORCE, SOPHISTICATED ALARM SYSTEM
  • 17. PERIMETER PROTECTION SYSTEM ACCESS CONTROL PARKING CONTROL & BARRIER GATE - SEARCH OF PERSONNEL AND BAGS FOR UNAUTHORIZED MATERIAL CCTV SURVEILLANCE INTRUSION DETECTION AND ALARM SYSTEM LEVEL 5 : MAXIMUM SECURITY DESIGN – To impede, detect, assess & neutralise all unauthorised external & internal activity ON-SITE RESPONSE FORCE
  • 18. General principles of Security  Physical security safeguards must deter, delay and announce unauthorized intrusions, bearing in mind the following: • physical security safeguards by themselves are not sufficient to prevent intrusions; the intended objective is to delay an intruder long enough to ensure detection and to provide adequate intervention by security personnel; • costs must be commensurate with the importance of facilities to be protected  In order to adequately protect installations, physical security safeguards must be established according to the following criteria: • identifying and surrounding all strategic areas to be protected. and providing adequate obstructions through the use of physical safeguards including fences, gates and/or building walls, with electronic perimeter detection devices; • establishing a minimum number of authorized access control points, and installing sufficient security equipment detection devices; • limiting entry to persons and vehicles on a requirement basis only; vehicles and pedestrians must all be controlled
  • 19. • restricting access for all service and operational vehicles through controlled, access points where adequate verifications can be exercised; • implementing an identification card system for all employees and a temporary pass system for all other groups concerned; • controlling entries and exits by designated personnel through techniques ranging from cursory surveillance to close inspection of passes, credentials, vehicles and personnel; • identifying specific sectors of "a site which can only be accessed by selected personnel; additional protection and control must be provided to those areas; • establishing effective surveillance of restricted zones, vital areas and critical installations; • establishing adequate deterrence through proper lighting; • implementing sufficient patrols to adequately control the areas and provide effective intervention.
  • 20. An entity of conceived measures planned and applied to ensure the protection of assets, of persons linked to the organization and its environment, and of installations against all types of risks Definition of security
  • 21. Areas of Application Security takes various forms which apply to several areas, such as • personal security, which relies on body guards to protect VIPs and their family, as well as key personnel of organizations; • physical security; protection of sites and buildings, access control, guard operations; • internal security; policies and procedures related to the protection of information, pre-employment verifications, control of material; • fire protection; detection, extinction and warning systems, equipment, procedures and training; • computer security; site and equipment protection, management of data banks and operations, access to information; • emergency planning; intervention and evacuation plans, plans for recovery and resumption of activities
  • 22. The most effective security consists of an appropriate amalgamation of physical security safeguards strategically located, complemented by properly trained and equipped personnel, guided and supported by policies, security procedures and operational instructions approved and monitored by top management.
  • 23. Categories of measures After diagnostic study & determination of security level, it is crucial to identify the main control measures which will allow the organisation to protect itself against likely risks. In order to implement a valid security programme, three categories of measures must be addressed. These categories are • the judicious selection of protective and surveillance equipment, as dictated by the needs and risk of evaluation • the effective use of human resources in the application of control and preventive measures. • The preparation of adequate policies, control procedures and prevention regulations, as well as the establishment of means to inform and to train personnel.
  • 24. Elements of Security • Protection and surveillance equipment • Policies , control procedures etc • Human resources Only the integration and inter-relation of those three categories of measures are likely to ensure the efficiency of the security programme on sites and within installations
  • 25. The pillars of security Personnel Material Procedures
  • 26. Types of measures : static and dynamic Static measures are related to tangibles , such as :- • Perimeter protection • Intrusion detection systems • Video monitoring systems • Fire protection systems • Other support systems, such as shredders, safes, vaults, secure filing cabinets etc
  • 27. Dynamic measures are related to human resources and intangibles, such as: • personnel allocated to control and surveillance; • awareness, information and training of employees; • general policies directly related to security and prevention; • basic security procedures for the control of persons, material, keys, or in the event of intrusion detection, work conflicts, criminal activities; • emergency procedures and resumption of activities; • determination of personnel reliability, through pre-employment verifications, • positive identification, code of ethics, probation period, periodic evaluation of performance; • protection of critical information, thorough filing, storage and secure destruction and IT security management systems; • control procedures and periodic checks, safes, vaults, secure filing cabinets etc
  • 28. Integrated security system Operational Security Concept Operational security concept depends on three activities • Prevention • Detection • Intervention Operational planning aims to ensure that resources, equipment, systems as well as procedures are designed and integrated in an efficient manner . It is important to realize how the various protection means must be inter-related, and how the three basic activities (prevention, detection, intervention) are carried out.
  • 29. Integrated security system Consolidation of elements and sub systems which assure the reception and transmission, through one control centre, of all alarms and other conditions, of all commands and other controls necessary to the efficient performance of predefined functions related to security
  • 30. Based on this general security approach, the security concept must rely on a logical progression of measures, such as • perimeter protection; • perimeter detection; • control of entry and exit points; • general surveillance of site and installations; • protection of strategic areas; • detection of intrusion and control of access at strategic locations; • patrols of areas of jurisdiction; • intervention during normal security posture; • intervention during emergency situations Logical Progression of Measures
  • 31. Objectives of the system To assist users in their duties of security operations and management. Its implementation meets the following objectives, which are :- • establish a controlled security system which encompasses all security facets on a routine basis, with the built-in flexibility to increase security levels with only minor modifications • provide a secure environment for the site, installations and activities, through perimeter detection, surveillance and protection • ensure prompt detection of all unusual or abnormal activities and a better coordination of the response intervention by identifying the appropriate procedures to be followed in different situations • automation, whenever possible of all controls, zone surveillance and equipment supervision in order to efficiently utilize human resources and assure an adequate level of intervention.
  • 32. Security It permits constant supervision of the premises. it controls access to the site and vital installations and it provides command over the response apparatus; Assistance It informs its users of the status of each supervised point and suggests intervention possibilities. To do so, the system must integrate all data originating from the sub-systems with a security function;  Efficiency It permits a better use of human resources committed to security and therefore achieves the best possible cost/performance return. Integrated security system has three main purposes
  • 33. COST EFFECTIVENESS OF SECURITY • Maximization of results. • Minimization of resources. CONCEPT OF COST-BENEFIT RATIO: Proportion between • The cost of establishing & maintaining security measures and a security system. and • The probable cost of losses which might occur without security.
  • 34. SECURITY CONTROL & CRISIS RESPONSE • Integrated Control Room • Quick Reaction Teams (QRT) with – Commando trained personnel – Wireless fitted dedicated vehicles – Bullet proof vests/helmets • Bomb disposal unit • Contingency Plan & Disaster Management
  • 35. MANAGEMENT • Getting things done from others • Process of conversion of resources into result. • Optimal utilization of resources for achieving organizational objectives. • Releasing and realizing human potential.
  • 36. Conclusion • The implementation of an integrated security system is either the starting point or the result of the security management planning process. • In order to benefit from all advantages brought about by such systems their definition must not be left to improvisation as it is often the case. • All senior Security Managers and heads of organizations must realize that it is not only a question of interfacing various equipments with each other, but rather of judiciously inter-relating the overall resources committed to security. • Therefore, security management must always place appropriate emphasis on each activity (prevention, detection, intervention) of the dynamic function which forms the security cycle, in relation to the risks facing the organization