Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Physical security primer - JURINNOV - Eric Vanderburg

707 views

Published on

Physical security primer - JURINNOV - Eric Vanderburg

Published in: Technology
  • Uterine Fibroids Cure, Discover How To Eliminate Almost, All Uterine Fibroids Within 8 Weeks.. ♣♣♣ http://t.cn/Aig7c6mX
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Discover A Simple Holistic System For Curing uterine fibroids and PCOS Once And For All using 100% Guaranteed All-Natural Method. ●●● http://t.cn/Aig7c6mX
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Physical security primer - JURINNOV - Eric Vanderburg

  1. 1. Physical Security Primer Dr. Eric Vanderburg Director, Information Systems and Security JURINNOV LTD
  2. 2. Objectives • Explain physical security strategies • Describe physical security controls • Understand the role of physical security
  3. 3. 3 4 Key Strategies 1. Territoriality 2. Natural Surveillance 3. Activity Support 4. Access Control
  4. 4. 4 Territoriality Most people tend to protect area that they feel is their own, and have a certain amount of respect for other’s. Fences, pavement treatments, signs and landscaping all help to express ownership.
  5. 5. 5 Natural Surveillance • This is almost entirely based off of the fact that criminals do not want to be seen. • Place physical activities, features and people in a way that they can be observed • Remove trees, sheds, bushes and other sight obstructions
  6. 6. 6 Access Control • Properly located entrances/exits • Fencing • Lighting • Receptionist at a front desk • A neighbor sitting on their front porch
  7. 7. 7 An Overview of Physical Controls Concentric Zone Theory – based on the premise that the more valuable an asset is, the more protection it needs 3 Basic Lines of Physical Defense: 1. The perimeter of the facility 2. The building exterior 3. The interior
  8. 8. 8 Locks • Key, key card or smart card operated • Remains one of the oldest, most commonly used methods of access control
  9. 9. Biometrics The science of using individual physiological features or behavioral characteristics to positively identify a person 9 Examples: fingerprint, iris/retinal scans, hand geometry, voice, et al.
  10. 10. Lighting • Intruders want darkness to cover their actions • 3 out of 4 commercial burglaries are committed within buildings with little or no light • Types: 10 1. Continuous 2. Standby 3. Moveable 4. Emergency
  11. 11. 11 Lighting • Perimeter Lighting • Floodlights • Street lights • Fresnal units • Searchlights
  12. 12. 12 Alarm uses • Burglar • Fire • Temperature • Humidity •Water flow • Electrical power
  13. 13. 13 Alarm system types Local – sound on the premises only • Proprietary – a constantly-manned alarm panel operated by the owner • Central Station – similar to proprietary, except usually operated off premises by an alarm company • Police Connected – the alarm is directed via phone lines to the nearest police dept.
  14. 14. 14 Alarms – False Alarms • More than 90% of all intrusion alarms are false alarms, resulting in needless expense and risks on the part of responders. • Because of the high number of false alarms, many cities prohibit alarms connected directly to the police department.
  15. 15. 15 Closed Circuit Television (CCTV) • A generic term, generally meaning a system in which a number of video cameras are connected in a closed circuit or loop, where the images are sent to a central television monitor or recorded. • CCTV systems range from basic system to very complicated networks.
  16. 16. 16 Closed Circuit Television (CCTV) Cameras may be overt or covert, or semi-covert. • Overt – out in the open • Covert – hidden • Semi- Covert – cameras are in public view but behind a one-way transparent covering.
  17. 17. 17 CCTV other technology • Internet Protocol Video (IP) • Video can be sent across a company’s data network so that it can be viewed wherever the company chooses. • These can cause bandwidth and digital storage issues for a company’s network. • Thermal Imaging – operates on the principle that all objects emit infrared energy that can be seen using a thermal imager • Night Cameras – most popular kind use image intensification that amplifies available visible and near-infrared light to achieve better vision
  18. 18. Privacy concerns… • There is concern over the amount of, or rather lack of, privacy by private, non-criminal citizens through the extensive use of surveillance methods. • Some cities are passing legislation to govern these types of devices and their use. 18
  19. 19. 19 The Perimeter • Fences – 2 basic types • Ornamental • Chain Link – effectiveness can be increased by adding razor wire, barbed wire, etc.
  20. 20. 20 The Perimeter • Surveillance Cameras • Vehicle Barriers • Active – require some action by a person or equipment to be raised into place • Passive – a fixed device with no moving parts, such as guard rails, concrete poles, etc.
  21. 21. 21 The Perimeter • Patrols • Security Officers • Patrol or Guard Dog units – roam alone inside a perimeter or building to deter intruders
  22. 22. 22 The Perimeter • Signs • Physical Layout When possible, we should always try to maintain a clear zone of 20 feet on either side of the perimeter
  23. 23. 23 Building Exterior controls • For some facilities, the exterior is the first line of defense. • Panic or Crash Bars A device located on the inside of a door only. It allows the door to opened in case of a fire, but has no hardware on the outside that can be used to open the door.
  24. 24. 24 The Building Exterior • Keys for effective security: • Strong, locked doors • Limited number of entrances • Secured openings (>96 sq. inches) • Alarms • Surveillance • Lighting
  25. 25. The Building Interior • Internal physical controls are usually required along with external controls. • Secure areas should be separated from non-secure areas if possible. 25
  26. 26. The Building Interior - Safeguards: • Locks • Alarms • Mirrors • Document shredders • Vaults/ safes • Bolt down large, moveable equipment • Lock down devices on office equipment • Surveillance systems 26
  27. 27. 27 The Command Center • Should be linked to the security control center • Should be in a tightly controlled area • Can also monitor access • Increasingly, staff members of the command center can also handle computer network issues if need be.
  28. 28. 28 The Physical Security System • The goal is to provide the amount of security needed - neither too much nor too little. • This is a balancing act between aesthetic, operational, safety and security needs.
  29. 29. The Physical Security System • Physical Security Users: a group comprised of the people who own the property being protected, the people who work at or visit the facility, and the security forces themselves. • Physical security footprint – the mark left during or after a security action that the public sees and lets them know security is present. 29
  30. 30. For assistance or additional information • Phone: 216-664-1100 • Web: www.jurinnov.com • Email: Eric.Vanderburg@jurinnov.com JurInnov Ltd. The Idea Center 1375 Euclid Avenue, Suite 400 Cleveland, Ohio 44115

×