SlideShare a Scribd company logo
1 of 6
An Introduction to
Physical Security
BY ROBIN GH PATRAS
Physical security
This section has information and tools to help your
organisation set up effective physical security
measures to protect your people, information, and
assets.
Why Physical Security Matters?
 Physical security is a key component of your health and safety
regime.
 Physical security combines physical and procedural
measures. These measures are designed to prevent or
reduce threats to your people, information, and assets.
Why Physical Security Matters? (cont.)
 Keep your people, customers, and the public safe
 Prevent unauthorized people accessing your
premises, information, or assets
 Maintain the trust and confidence of the people and
organization's you serve or work with
 Deliver services without disruption in the event of a
heightened threat level or disaster
Why Physical Security Matter? (Cont.)
Physical security threats can come from your own people or from outside
your organisation (for example, visitors, contractors, the public, external
groups).
Threats can apply to people working in your office or normal place of
business. Different threats can be present when your people are working
away from the office, particularly when they are working alone.
Why Physical Security Matters?
(Cont.)
 Crime, including personal and property crime
 Workplace violence, such as assaults, harassment, and revenge attacks, from both insiders and
external parties
 Civil disturbances, such as protests and riots
 Natural disasters, such as floods, earthquakes, and pandemics
 Industrial disasters, such as explosions, building fires, and structural collapses
 Terrorist acts, such as bombings, extortion, ‘white powder’ incidents, and kidnappings
 Other risks, such as disturbed people and traffic accidents.
 Within your organisation, physical security breaches can be accidental. For example, if your people
aren’t alert to the risk of tailgating, they might allow unauthorized people access to your secure
areas.

More Related Content

What's hot

ID IGF 2016 - Hukum 1 - Perlindungan Data Pribadi Menghadirkan Negara
ID IGF 2016 - Hukum 1 - Perlindungan Data Pribadi Menghadirkan NegaraID IGF 2016 - Hukum 1 - Perlindungan Data Pribadi Menghadirkan Negara
ID IGF 2016 - Hukum 1 - Perlindungan Data Pribadi Menghadirkan NegaraIGF Indonesia
 
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaAtlantic Training, LLC.
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1Tanmay Shinde
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoMatt Frowert
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 

What's hot (20)

Close protection
Close protectionClose protection
Close protection
 
ID IGF 2016 - Hukum 1 - Perlindungan Data Pribadi Menghadirkan Negara
ID IGF 2016 - Hukum 1 - Perlindungan Data Pribadi Menghadirkan NegaraID IGF 2016 - Hukum 1 - Perlindungan Data Pribadi Menghadirkan Negara
ID IGF 2016 - Hukum 1 - Perlindungan Data Pribadi Menghadirkan Negara
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Security training for sis
Security training for sisSecurity training for sis
Security training for sis
 
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by Pedraza
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
 
working within the private security industry
working within the private security industryworking within the private security industry
working within the private security industry
 
Security training module
Security training moduleSecurity training module
Security training module
 
Physical security
Physical securityPhysical security
Physical security
 
PSARA 2005
PSARA 2005PSARA 2005
PSARA 2005
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Corporate security
Corporate securityCorporate security
Corporate security
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_Tyco
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 

Similar to An introduction to physical security

COMMON PHYSICAL SECURITY THREATS
COMMON PHYSICAL SECURITY THREATSCOMMON PHYSICAL SECURITY THREATS
COMMON PHYSICAL SECURITY THREATSsuccessdsp
 
PHYSICAL SECURITY THREATS
PHYSICAL SECURITY THREATSPHYSICAL SECURITY THREATS
PHYSICAL SECURITY THREATSsuccessdsp
 
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docxBCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docxJASS44
 
Health, Safety and Welfare for CBE
Health, Safety and Welfare for CBEHealth, Safety and Welfare for CBE
Health, Safety and Welfare for CBESahl Buhary
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfMax Secure Ltd
 
12Threat and Vulnerability Assessment(Transportation Sec.docx
12Threat and Vulnerability Assessment(Transportation Sec.docx12Threat and Vulnerability Assessment(Transportation Sec.docx
12Threat and Vulnerability Assessment(Transportation Sec.docxmoggdede
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to SecurityNateBrown60
 
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMBLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMMajor K. Subramaniam Kmaravehlu
 
Question 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxQuestion 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxIRESH3
 
Norman critical thinking 1
Norman critical thinking 1 Norman critical thinking 1
Norman critical thinking 1 qnorman
 
Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptxSecurity Guards
 
UNIT 2 - SAFETY ENGINEERING & MANAGEMENT.pdf
UNIT 2 - SAFETY ENGINEERING & MANAGEMENT.pdfUNIT 2 - SAFETY ENGINEERING & MANAGEMENT.pdf
UNIT 2 - SAFETY ENGINEERING & MANAGEMENT.pdfPinakRay1
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docxeugeniadean34240
 
Introduction Safety and hazard management
Introduction Safety and hazard managementIntroduction Safety and hazard management
Introduction Safety and hazard managementAregahegnMelkea1
 
Jupiter physical security ppt 2016
Jupiter physical security ppt 2016Jupiter physical security ppt 2016
Jupiter physical security ppt 2016Maxpromotion
 
Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Maxpromotion
 
Important Role of Protective Services Company.pdf
Important Role of Protective Services Company.pdfImportant Role of Protective Services Company.pdf
Important Role of Protective Services Company.pdfETS Risk Management
 

Similar to An introduction to physical security (20)

COMMON PHYSICAL SECURITY THREATS
COMMON PHYSICAL SECURITY THREATSCOMMON PHYSICAL SECURITY THREATS
COMMON PHYSICAL SECURITY THREATS
 
PHYSICAL SECURITY THREATS
PHYSICAL SECURITY THREATSPHYSICAL SECURITY THREATS
PHYSICAL SECURITY THREATS
 
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docxBCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
 
Health, Safety and Welfare for CBE
Health, Safety and Welfare for CBEHealth, Safety and Welfare for CBE
Health, Safety and Welfare for CBE
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
12Threat and Vulnerability Assessment(Transportation Sec.docx
12Threat and Vulnerability Assessment(Transportation Sec.docx12Threat and Vulnerability Assessment(Transportation Sec.docx
12Threat and Vulnerability Assessment(Transportation Sec.docx
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to Security
 
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMBLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
 
Question 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxQuestion 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docx
 
Norman critical thinking 1
Norman critical thinking 1 Norman critical thinking 1
Norman critical thinking 1
 
Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptx
 
Safety lec1
Safety lec1Safety lec1
Safety lec1
 
Whistleblower
WhistleblowerWhistleblower
Whistleblower
 
Information security
Information securityInformation security
Information security
 
UNIT 2 - SAFETY ENGINEERING & MANAGEMENT.pdf
UNIT 2 - SAFETY ENGINEERING & MANAGEMENT.pdfUNIT 2 - SAFETY ENGINEERING & MANAGEMENT.pdf
UNIT 2 - SAFETY ENGINEERING & MANAGEMENT.pdf
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
 
Introduction Safety and hazard management
Introduction Safety and hazard managementIntroduction Safety and hazard management
Introduction Safety and hazard management
 
Jupiter physical security ppt 2016
Jupiter physical security ppt 2016Jupiter physical security ppt 2016
Jupiter physical security ppt 2016
 
Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1
 
Important Role of Protective Services Company.pdf
Important Role of Protective Services Company.pdfImportant Role of Protective Services Company.pdf
Important Role of Protective Services Company.pdf
 

More from Robin Patras

OutdoorElectricalSafety.pdf
OutdoorElectricalSafety.pdfOutdoorElectricalSafety.pdf
OutdoorElectricalSafety.pdfRobin Patras
 
Electrical_Safety_Tips.pdf
Electrical_Safety_Tips.pdfElectrical_Safety_Tips.pdf
Electrical_Safety_Tips.pdfRobin Patras
 
Creating a security culture 4
Creating a security culture 4Creating a security culture 4
Creating a security culture 4Robin Patras
 
Risk based approach
Risk based approach Risk based approach
Risk based approach Robin Patras
 
Mandatory requirements for physical security 2
Mandatory requirements for  physical security 2Mandatory requirements for  physical security 2
Mandatory requirements for physical security 2Robin Patras
 
Fire prevention & use of fire extinguishers
Fire prevention & use of fire extinguishersFire prevention & use of fire extinguishers
Fire prevention & use of fire extinguishersRobin Patras
 
Five common reasons for the road accident
Five common reasons for the road accidentFive common reasons for the road accident
Five common reasons for the road accidentRobin Patras
 
Security awareness by robin
Security awareness by robinSecurity awareness by robin
Security awareness by robinRobin Patras
 
Untold story of karachi
Untold story of karachiUntold story of karachi
Untold story of karachiRobin Patras
 
Security presentation
Security presentationSecurity presentation
Security presentationRobin Patras
 
Defensive drivers training
Defensive drivers trainingDefensive drivers training
Defensive drivers trainingRobin Patras
 

More from Robin Patras (12)

OutdoorElectricalSafety.pdf
OutdoorElectricalSafety.pdfOutdoorElectricalSafety.pdf
OutdoorElectricalSafety.pdf
 
Electrical_Safety_Tips.pdf
Electrical_Safety_Tips.pdfElectrical_Safety_Tips.pdf
Electrical_Safety_Tips.pdf
 
Creating a security culture 4
Creating a security culture 4Creating a security culture 4
Creating a security culture 4
 
Risk based approach
Risk based approach Risk based approach
Risk based approach
 
Mandatory requirements for physical security 2
Mandatory requirements for  physical security 2Mandatory requirements for  physical security 2
Mandatory requirements for physical security 2
 
Fire prevention & use of fire extinguishers
Fire prevention & use of fire extinguishersFire prevention & use of fire extinguishers
Fire prevention & use of fire extinguishers
 
Congo virus alert
Congo virus alertCongo virus alert
Congo virus alert
 
Five common reasons for the road accident
Five common reasons for the road accidentFive common reasons for the road accident
Five common reasons for the road accident
 
Security awareness by robin
Security awareness by robinSecurity awareness by robin
Security awareness by robin
 
Untold story of karachi
Untold story of karachiUntold story of karachi
Untold story of karachi
 
Security presentation
Security presentationSecurity presentation
Security presentation
 
Defensive drivers training
Defensive drivers trainingDefensive drivers training
Defensive drivers training
 

Recently uploaded

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Recently uploaded (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 

An introduction to physical security

  • 1. An Introduction to Physical Security BY ROBIN GH PATRAS
  • 2. Physical security This section has information and tools to help your organisation set up effective physical security measures to protect your people, information, and assets.
  • 3. Why Physical Security Matters?  Physical security is a key component of your health and safety regime.  Physical security combines physical and procedural measures. These measures are designed to prevent or reduce threats to your people, information, and assets.
  • 4. Why Physical Security Matters? (cont.)  Keep your people, customers, and the public safe  Prevent unauthorized people accessing your premises, information, or assets  Maintain the trust and confidence of the people and organization's you serve or work with  Deliver services without disruption in the event of a heightened threat level or disaster
  • 5. Why Physical Security Matter? (Cont.) Physical security threats can come from your own people or from outside your organisation (for example, visitors, contractors, the public, external groups). Threats can apply to people working in your office or normal place of business. Different threats can be present when your people are working away from the office, particularly when they are working alone.
  • 6. Why Physical Security Matters? (Cont.)  Crime, including personal and property crime  Workplace violence, such as assaults, harassment, and revenge attacks, from both insiders and external parties  Civil disturbances, such as protests and riots  Natural disasters, such as floods, earthquakes, and pandemics  Industrial disasters, such as explosions, building fires, and structural collapses  Terrorist acts, such as bombings, extortion, ‘white powder’ incidents, and kidnappings  Other risks, such as disturbed people and traffic accidents.  Within your organisation, physical security breaches can be accidental. For example, if your people aren’t alert to the risk of tailgating, they might allow unauthorized people access to your secure areas.