16
Chapter 1. Encompassing Effective CPTED
Solution
s in 2017 and
Beyond: Concepts and Strategies.
CPTED is long established and used across the globe but not problem free operations.
CPTED is a preferred model to provide background information relative to the integration of
CPTED as conduit to enhance the creation of viable community growth, collaborative
partnerships, and reduction of risk management, complication, and diversity and irrelevance
concepts. CPTED often contribute to the development of wider planning goals considering the
development and maintenance of sustainable communities. Understanding and managing this
potentially new direction enables clear links with development and maintenance of sustainable
communities through urban planning to be profitable and impactful. Effective CPTED policies
aimed at reducing private violence against vulnerable innocent citizens and the community,
attempt must be executed to outline the obvious limitations, creating interconnected community is
an important component,
Consider, too, that many of the social interactions between men in these impoverished
communities do not include designing plans to lower crime rates. they are unemployed, these men
spend much of their time together drinking and taking illicit drugs, and lamenting about patriarchal
authority threatened by the disappearance of manufacturing jobs, The most reliable and proven
approach to accomplish the goal of combining security with design decisions is commonly known
as the environmental design model called CPTED. The environmental design approach to security
recognizes the designated space, which defines CPTED solution compatible for associated
activities often help to prevents crime. The embedded goals and objective of CPTED rest on design
and use of space, culture deviating from the traditional targeting pathway to prevent crime.
Traditionally. The focus rest predominantly on denying access to a crime target through physical
facility such as locks, alarms, fences, and gates. Apparently, modern approach tends to overlook
opportunities for natural access control and surveillance, which It can also make environments
sterile, unsightly, and unfriendly. The most reliable and proven approach to accomplish the goal
of combining security with design decisions is commonly known as the environmental design
model called CPTED. The environmental design approach to security recognizes the designated
space that defines CPTED solution compatible for associated activities often help to prevents
crime. The embedded goals and objective of CPTED rest on design and use of space, culture
17
deviating from the traditional targeting pathway to prevent crime. Traditionally. The focus rest
predominantly on denying access to a crime target through physical facility such as locks, alarms,
fences, and gates. Apparently, modern approach tends to overlook opportunities for.
1. 16
Chapter 1. Encompassing Effective CPTED
Solution
s in 2017 and
Beyond: Concepts and Strategies.
CPTED is long established and used across the globe but not
problem free operations.
CPTED is a preferred model to provide background information
relative to the integration of
CPTED as conduit to enhance the creation of viable community
growth, collaborative
partnerships, and reduction of risk management, complication,
2. and diversity and irrelevance
concepts. CPTED often contribute to the development of wider
planning goals considering the
development and maintenance of sustainable communities.
Understanding and managing this
potentially new direction enables clear links with development
and maintenance of sustainable
communities through urban planning to be profitable and
impactful. Effective CPTED policies
aimed at reducing private violence against vulnerable innocent
citizens and the community,
attempt must be executed to outline the obvious limitations,
creating interconnected community is
an important component,
Consider, too, that many of the social interactions between men
in these impoverished
3. communities do not include designing plans to lower crime
rates. they are unemployed, these men
spend much of their time together drinking and taking illicit
drugs, and lamenting about patriarchal
authority threatened by the disappearance of manufacturing
jobs, The most reliable and proven
approach to accomplish the goal of combining security with
design decisions is commonly known
as the environmental design model called CPTED. The
environmental design approach to security
recognizes the designated space, which defines CPTED solution
compatible for associated
activities often help to prevents crime. The embedded goals and
objective of CPTED rest on design
and use of space, culture deviating from the traditional targeting
pathway to prevent crime.
Traditionally. The focus rest predominantly on denying access
4. to a crime target through physical
facility such as locks, alarms, fences, and gates. Apparently,
modern approach tends to overlook
opportunities for natural access control and surveillance, which
It can also make environments
sterile, unsightly, and unfriendly. The most reliable and proven
approach to accomplish the goal
of combining security with design decisions is commonly
known as the environmental design
model called CPTED. The environmental design approach to
security recognizes the designated
space that defines CPTED solution compatible for associated
activities often help to prevents
crime. The embedded goals and objective of CPTED rest on
design and use of space, culture
5. 17
deviating from the traditional targeting pathway to prevent
crime. Traditionally. The focus rest
predominantly on denying access to a crime target through
physical facility such as locks, alarms,
fences, and gates. Apparently, modern approach tends to
overlook opportunities for natural access
control and surveillance, which it can also make environments
sterile, unsightly, and unfriendly.
Chapter 2. Introduction Vulnerability Assessment.
Vulnerability assessment (VA) is a well-projected logical
evaluation with quantitative and
qualitative components often used to predict physical protection
system (PPS), system
effectiveness, weakness and threats and attacks.VA supports
organization management decision
6. in three dimensions including short-long range planning,
steering vulnerability assessment,
reporting and using the assessment results to strengthen the
organization. Vulnerabilities are
weaknesses, physical appearance, environments ready for
manipulative schemes by perpetrators
to gain unauthorized access organization assets. Vulnerability is
the most explosive, volatile,
unpredictable component of cybersecurity operations, if left
unattended, may result in the squalor,
misery, loss of human lives, damaged to mission-essential
resources. I must admit, vulnerabilities
are often influenced by a variety of factors, such as the
buildings were erected, location of
community members, equipment, operational policy and
procedures practices and lack of social
7. engineering education. Per Fennelly (2017), quantitative
approaches are strongly recommended
for facilities with high magnitude of loss assets and damages to
vital data, whereas, qualitative
techniques are utilized in the absence of lower value of asset.
In addition, Vulnerability assessment
often help to identify the area of weakness in organization, play
a key role in determining asset
periodization width organization and community facilities. A
comprehensive vulnerability
assessment is a vital component of risk management process.
Chapter 3. Influence of Physical Design.
Physical Security is entrenched with concepts, external and
internal roles, physical security
planning and implementation, physical security countermeasures
to deter, delay, detect, and
8. prevent cyber-threats and cyber-attacks. Crime prevention
through environment design (CPTED)
presents layers of conflicts and solutions. As certified member
of cybersecurity profession with
concentration in physical security I strongly subscribe to my
colleague’s assertion that the
commanding levels of crime rates in the rural community can
eliminated. Crime Prevention
through Environmental Design (CPTED) a long-established
operation used across the globe.
18
CPTED is a preferred model designated to provide acceptable
background information relative to
the incorporation of CPTED as viable channel for the creation
of cohesive community growth,
9. collaborative partnerships to help in reduction risk management
complication, diversity and
irrelevance concepts. Collaborative partnership with CPTED
will contribute to the development
of wider planning goals, growth, and maintenance of sustainable
community. Acceptance of such
potential will provide new direction and enable interrelated
links through urban planning to
measurable growth and achievement. Effective CPTED policies
aimed at reducing internal and
private violence against vulnerable innocent citizens and the
community can be eradicated through
the creation of interconnected community partnership.
Collaborative social interactions in a
penurious, disadvantaged, and underprivileged is comfortable
podium for cyber-crime,
10. cyberthreat, and cyber-attack. Members of the community
referred to in this book do not have
structured short and long range plans to lower crime rates, are
unemployed, and spend their
productive time in drinking, taking illicit drugs, and lamenting
about those in authority and
threatened by the disappearance job opportunities.
Chapter 4. Approaches to Physical Security-Levels of Physical
Security.
Physical security (PS) is imperative for public and private
organizations to protect and defend
assets, data, resources, personnel, facility, and infrastructures.
Per chapter four of the course
materials, emphasis will be on five echelons of physical
security systems such as minimum, low
level, medium, high level and maximum-security operations.
11. • Minimum-security system (MSS-1) developing to obstruct
unauthorized external traffic
into the system and tends to interface with basic physical
security operations like doors and
windows and regular locks.
• Low-level system (LLS) designing to barricade unauthorized
external activities such as
reinforcement of doors, gates, high security locks, window bars
and regular alarm systems.
• Medium security system (MSS-2) creating to obstruct, detect
and assess Most MSS-2 point
of reference includes developing perimeter fence to protect
against unauthorized intrusion
and unarmed security armed.
12. • High-level security system (HLSS) creating to obstruct, detect
and evaluation most
unauthorized internal and unauthorized external activities.
HLSS point of reference
includes highly trained armed guard, two-way radio links to
police unit, duress alarms, use
of access control and biometric control.
19
• Maximum-security system (MSS-3) developing to impede,
detect, access and neutralize
external and internal activities.
Types Physical Security
13. Approaches to physical security is a measurable technique to
protect buildings, property,
assets, and resources against intruders. Effective execution of
physical security program
on organization and facilities includes multiple levels of
protection such as outer perimeter,
inner perimeter, and interior of the facility.
1. Outer Perimeter Security
The outer perimeter often controls persons who walk and drive
onto the grounds on the
facility and out perimeter security include high-security fence,
high-security doors, high
security windows, high-security gate, remotely operated
garaged; whereas, barbed wire
fence with a guarded gate is appropriate in most extreme
conditions.
14. 2. Natural Access Control
Natural access control utilizes the building and landscaping
features to guide people
entering and exiting the property, lessened perpetrator’s
unnoticed access into the facility.
Natural access control measures often interfere, and lowered
sense of risk prevent
intruders’ willingness to come closer to the property.
3. Territorial Reinforcement
Territorial reinforcement differentiates private property from
public facility to prevent
unauthorized access into the facility. The prime objectives of
territorial reinforcement is to
protect and keeping intruders off the private end public
property.
15. 4. Inner Perimeter Security
Perimeter security provides extra measures to secure the
facility’s doors, windows, walls,
locks, keys, alarm systems, access control, electronic visitor
management systems, and key
controls to keep intruders from entry and exit the property.
5. Interior Security
Interior security’s emphasis is on interior spaces, employee
office locations, security data
center, organization assets, security cameras and motion
detectors for effective monitoring
of interior spaces.
6. Electronic access control systems (EACS)
Electronic access control systems (EACS) continue to feature as
important component of
16. physical security with ability sojourn unauthorized companies at
the door and control
incoming and outgoing traffic into the facility.
Chapter 5. Security Lighting.
Phase 1 of process, 1assignment and discussion will focus on
level one through 5 and phase
2 physical security will concentrate on Background check of
security protection. Physical security
is designed to protect personnel, hardware, software,
networking and communication systems and
data from natural occurrences meant to cause serious loss of
data, damages to private and public
organizations and higher education institutions including
protection from fire, flood, natural
disasters, burglary, theft, vandalism and terrorism activities.
Advantages of security lighting
17. system displayed in institution library, cafeteria, classroom and
chapel, commercial, industrial,
multi-family residences, and retail facility can generate
enduring rewards Scope of benefits of
security lighting on private and public organizations institution
of higher learning include
20
enhancement chances, delineation of the facility, increase
resident morale, decreased liabilities,
reduction of insurance premiums where applicable, increase real
and perceived safety, deter theft,
vandalism, and physical assault and the properties, monitor
vehicle and pedestrian incoming and
outgoing traffic into the facility.
18. Additional benefits of security lighting making the facility to
become less hazardous, less
likely to become a target for theft and vandalism, confidence,
and trust that and other multi-family
residential sites will become the safe dwellings desired by
residence. Increase, in space, confidence
and trust by current residents will inspire new residents,
benefit, increase public traffic and enlarge
revenues for titleholders. Narratives in the course materials
supports the premise that a security
lighting system and relative to security lighting must involve
professional designer in order to
avoid damages to the facility because, only experience
professional security lighting can be able
to make selections based upon the location, residents and the
space of the facility.
It is worth noting that in the beginning of the computer epoch,
19. protection of properties was
easy. Hugh computer system such as mainframe, supercomputer
and embedded computer systems
weighed thousands of pounds were locked away in the command
center and only select few were
granted access confined facility.
Today, in our generation, computing devices are unescapable,
and organizations are
charged with protecting devices range from massive cloud-
based multiplex systems to tiny
handheld devices such as mobile phones. Physical security
defense layers to prevent intruders must
include multiple models. The first model to deter and close all
angle against intruder and the next
layer will further monitor controls and provide additional
detection and protective capabilities.
20. Physical layer of defense comprises physical, psychological
activities and response systems
including locking the facility gates and doors, on-site and
remote security notification system, and
direct communication with local, county, or state police.
Increase, in space, confidence and trust by current residents will
inspire new residents,
added value, increase public traffic, and enlarge revenues for
titleholders. Narratives in the course
materials supports the premise that a security lighting system
and relative to security lighting must
involve professional designer in order to avoid damages to the
facility because, only experience
professional security lighting can be able to make selections
based upon the location, residents and
the space of the facility.
21. 21
Background Checks
Private and public organization and higher education enterprise
is obliged to establish
official policies and procedures delineating standards for logical
and physical access to facility and
infrastructure focusing on key demographic factors such as
conducting criminal background
checks, as permitted by law, as part of pre-employment
screening practices for employees and
identification for staff, faculty and administration physical
access into the facility during working
hours, after hours, weaken and protection from fire, flood,
natural disasters, burglary, theft,
22. vandalism and terrorism activities.
Chapter 6. Electronic Elements: Detailed Discussion
Entire process including assignment and discussion will
concentrate on physical security
on multiple levels stages of security protection.
The emphasis of chapter 6 is on designing modern electronic
components to select well-matched
components such as alarm, access control systems, access
control system, server, system server
file servers, workstations, advance elements, closed conduit
television, (CCTV), digital video
system, wireless digital video, security command system,
consoles guard function and
communication systems. The following components are among
the most common found in
electronic devices:
23. Microcomputers, magnetic stripe cards, Wiegand card-keys,
barcode cards, barium ferrite
cards, Hollerith, rare-earth magnets, photo identification
elements, Multi-technology, card readers,
transportation security agency (TSA), transportation worker
identification credential (TWIC),
electrified strikes and panic hardware, duress switches, digital
transmission through protocol
transport control protocol (TCP), user datagram protocol (UDP)
and developments of ARPANET
through applied research protocol agency (ARPA), wireless
digital operations such as workstation,
central processing unit (CPU), communication system
Microcomputers, fourth-generation systems developed in 1971
are small computers used
to control a multitude of devices, such as power tools, remote
24. controls, and medical equipment and
office machines. Batteries convert chemical energy to electrical
energy. The two different cells of
a battery are anode (+) and cathode (-). Fuses help preserve
components from overloading with
excessive current. A fuse consists of connection body, support,
contacts and metal-fuse material
such as Zinc or copper. As a protective device, a circuit breaker
can be controlled with a remote
switch. It is designed to protect the circuit from overloading or
a short circuit.
22
Switches interrupt current. The four types of switches are:
single pole single throw (SPST), single
25. pole double throw (SPDT), double pole single throw (DPST)
and double pole double throw
(DPDT). Relays are electromechanical switches that shut power
on or off. A relay includes an
electromagnet, an armature, a series of electrical contacts, and a
spring.
• Active components of electronic elements are designed to
cover the development of
transistors
• Passive components are designated transformers, inductors,
resistors, capacitors.
• Transformers are commonly used to step up and step-down
power.
• Resistor restricts the flow of current. It is used in thermistors
and potentiometers.
• In a low capacity battery, a capacitor allows delays to occur in
circuits and inductors are
26. used to control frequencies.
• Electronic components are closely related resistors,
capacitors, diodes, transistors,
inductors, and integrated circuits.
• Resistor are embedded integrated circuit and often resists the
flow of current. Often
measured in ohms with electronic symbol of 0 unit
• Capacitors must store electric charge temporarily and the
capacity of a component
measured in microfarads.
• Diodes designed to allow electric current to flow in a single
direction only. Each diode has
two terminals known as the anode and cathode. When the anode
is charged with positive
voltage and the cathode with a negative one, electric current can
27. flow. Reversing these
voltages will prevent the current from flowing.
• Transistors an easily to recognize through three terminals and
control current flow in the
multiple terminals.
• Inductors and passive components store energy in form of a
magnetic field and consists of
a coil of wire wound around the core
• Integrated Circuits: singular device that has all the
components required in an electronic
circuit and microcomputers.
• Microcontrollers designated to control multitude devices
including power tools, remote
controls, medical equipment, and office machines.
• Transformers Assembled with two coils of wire, transformers
28. are commonly used to step
up or step-down power.
• Batteries convert chemical energy to electrical energy using
two different cells of a battery
are anode (+) and cathode (-).
• Fuses use to preserve components from overloading with
excessive current.
• Relays these electromechanical switches shut power on or off.
• Switches designed to interrupt current four types of switches
include single pole single
throw (SPST), single pole double throw (SPDT), double pole
single throw (DPST), and
double pole double throw (DPDT).
• Motors converts electrical energy into mechanical energy.
• Circuit Breakers a protective device often controlled with a
29. remote switch.
• CCTV is an analog video camera designated to transmit
signals through coaxial cable to a
single central location for monitoring, recording, and video
analysis.
23
Switch is a device that provides a central connection point for
cables from workstations,
servers, and peripherals. In a star topology, twisted-pair wire is
run from each workstation to a
central switch and hub. Most switches are active, that is they
electrically amplify the signal as
it moves from one device to another. The predecessor of the
switch was the hub, which
broadcasted all inbound packets out all ports of the device,
30. creating huge amounts of
unnecessary network traffic. Per our course materials focus on
four types of switches are: single
pole single throw (SPST), single pole double throw (SPDT),
double pole single throw (DPST)
and double pole double throw (DPDT). Relays are
electromechanical switches that shut power
on or off. A relay includes an electromagnet, an armature, and a
series of electrical contacts.
Active components of electronic elements are designed to cover
the development of transistors
and passive components is designated transformers, inductors,
resistors, capacitors. Door
switches are installed on the door to guarantee that if an
intruder open the door it will cause a
magnet to move away a contact switch and trigger active alarm.
As a protective device within
31. a circuit breaker can be controlled with a remote switch.
Chapter 7. Use of Locks in Physical Security Crime Prevention.
It is noting that the use of locks in physical crime prevention is
to enumerate available
procedures needed to implement and enforce using locks as
active components of security
operations. Keys and lock are the most widely used security
apparatus to support individuals and
organization determination attempts to protect their facility and
assets against intruders and
perpetrators. Notably, there are different types of locking
devices available to the public, but
importance and efficiency of implementation of keys and
locking system depends solely on the
combination of interrelated factors such as designing,
manufacturing, installation, upgrading and
32. maintenance activities. Individuals, facility manager and
organization must include the all
parameters of defensive, offensive, strength and weakness,
advantages, and disadvantages. The
projected procedures must include the danger of doing nothing
and lacking behind.
Chapter 8. Internal Threats and Countermeasures
Old-fashioned strategies to battle, prevent, and reduce criminal
maneuvering can accomplished
by changing illegitimate tendencies. Defensive focuses on
preventing instantaneous ability to
promptly prevention cyber-attack, reduce the magnitude
damages caused by criminals in the
environments where crime occurs.
24
33. Joyce Owens was in the office alone by herself to complete
employee’s payroll and
she heard strange noise outside the building, perpetrators broke
into the facility
through one of the side-windows maltreated her; you are soon to
be an expert in
cybersecurity with concentration physical security at University
of the
Cumberlands:
a. What defensive and offensive measures” should Joyce Owen
adopt in this
unsurmountable condition to remain calm, keep herself safe, in
conjunction
with calling 911?
b. For Joyce Owen safety, which phone can she use to call 911,
her personal
34. mobile device, or her office phone?
c. What must organization security planning team insert in the
five years long-
range plan to protect Joyce Owen and employees from such
cyber-attack in the
future?
Per Fennelly (2017-139-166), operative use of locks in physical
security crime prevention
must include three measures combination locks: Luck Bodies
(bolts, latch bolt, dead bolt); Door
Lock Types Mortise, (rim mounted, tubular, cylindrical lockset,
unit locks, cylinders, padlocks);
and Attacks and Countermeasures (surreptitious attacks, Illicit
keys, maintain reasonable key
security, recombination and replaced compromised lock,
circumvention of the internal barriers of
35. the lock, manipulation and picking.
Offensive Culture on the use of locks in physical security crime
prevention.
When a traffic camera is installed in as designated community,
drivers who operates in that
neighborhood where traffic cameras are deployed and proven to
successful limit alarming rate of
traffic accidents, wrongful death must be willing to accept,
comply and obey the role.
a. Countermeasures
Countermeasures the key components of physical security
operations. Associated steps to
execute countermeasures in at risk facility must include
vulnerability assessment, risk
management and advantages. Likely counter security instrument
against intruder must
36. include demographic factors such as risk management and
submitting accurate results,
measurable policies, and procedures to assist in the process.
25
b. Vulnerability
Vulnerability is the weakness in any organization, which often
lead to cyber-attacks,
cyberthreats, unbending risk, data damages, interruption of
communication vital
communication channel. Data damages often occurs when
hardware and software are
attacked by malicious cyber-criminals, unauthorized users have
access to data command
37. center and disclose the confidential information such as logon
name and password.
• A vulnerability assessment is a direct responsibility of
individuals, private and public
organizations to identify advantages and disadvantages.
• A vulnerability creates more than enough opening for
organization to accept the likelihood
of unforeseeable circumstances and formulate solutions to
remedy any projected impasse
relative to vulnerability
• Advantages and disadvantages are considered determined
factors for affordable, feasible,
and practical while countermeasures are added values to reduce
and eliminate the
deficiencies such as hardware (fencing and locks), software
(electronic access control),
38. and people (security officers and employees) recognized in the
vulnerability assessment
process.
• Effective security process must contain assortment of physical
security items such as
electronic security, trained personnel with assigned security
privileges, active security
policies and procedures, structured fence around the facility,
security officers on patrol,
exterior lighting, steel doors, high-quality mechanical locks, an
intrusion detection system,
and video surveillance to detect intruders
Chapter 9. External Threats and Countermeasures.
Cyber-attacks offer the ability to obliterate and interrupt
organization communication channels,
39. security data center and facility remotely. Indeed, private, and
public organizations are often
interlinked; hence, data breaches disparaging with damaging
influence organization, confidence
on economy and innocent citizens. Organizations inability to
resolve the age-old problem on how
to authorize official trusted to logon onto system, turn around to
betray by committing cybercrimes.
Vulnerability stem from interactions and communications
among several system components and
categorized as deficiency, weakness, and security cavity on
network data center.
8. To what extent are internal threats constitute a key factor
against organization ability to
battle insider threats which abuses assigned privilege?
40. 26
9. What is the most effective mechanism for organization to
combat internal threats?
10. Disgruntled employees must be trained on the danger of
throwing wastepaper and
electronic media in a bin within and outside the facility.
Internal threats and countermeasures are an isolated occurrence
where most activities involve
direct connection to the Internet for global interaction, digital
communication, and transmission.
The preeminent method to mitigate internals threats is to equip
users with ready-to-act traditional
approach. The result of the sophistication of our modern-day
culprits, over-all reliance on
employees, increasing credo that authorized users are
41. predictable agent in the fight against internal
threats. Internal threats operators often use psychological
moralities and procedures to sail around
security restrictions through persuasion and psychosomatic
principles, and crafty manipulation
techniques to sway users into divulging confidential
information, such as, user names, passwords,
bank information, house and offices’ alarm code to take control
over organizations’ security
centers. Historic channel to internal threats and
countermeasures is categorized into employee’s
theft, pilferage, embezzlement, fraud, stealing, peculation, and
defalcation. Most organizations
often ignore to establish and adopt on-board ecological waste
management action plans to deal
with discarded materials, shredded left-over documents,
magnetic media and placing fragments in
42. isolated location as countermeasure process. Per Fennelly
(2017-182), “Why do Employees steal?”
In addition, employee stealing is a multiple part operation.
• Most organizations are often intolerant and impatient to verify
employee’s identity,
background and establish trust due to time-consuming nature of
daily assignment.
• Most organizations often ignore to establish and adopt on-
board ecological waste
management action plans to deal with discarded materials,
shredded left-over documents
and magnetic media and placing fragments in isolated location.
Nonetheless, organizations must learn to support and train
employers who are assigned to work
and protect the organization data center, facility, and resources.
Large segments of organizations’
43. facility managers are often, none-aggressive and choose short
cuts in discharging assigned services
by posting passwords on the screen and leaving confidential
documents lying out on the table and
…