SlideShare a Scribd company logo
What is Physical Security?
There are three domains of security:
1.Cyber (e.g., computer, network and information security; important tasks:
encryption, data backups).
2.Human (e.g., employees, consultants, suppliers, partners and anyone in
contact with your company, important tasks: prevention of social
engineering scams).
3.Physical (e.g., the wires, silicon, glass, and structures; important tasks:
locked doors, clean desks, situational awareness, shredding).
https://fastercapital.com/keyword/physical-security-physical-
security-measures.html
https://fastercapital.com/startup-topic/Physical-security-
measures.html
SOLUTION SCENARIO
The Physical Security Training Program at fletc.gov covers a wide range of topics, including:
•Security legal considerations
•Access control
•Perimeter security
•Security design
•Guard force
•Protective lighting
•Video monitoring systems
•Intrusion detection systems
•Improvised explosive devices (IED)
•Computer vulnerabilities and countermeasures
https://www.pelco.com/blog/physical-security-
guide#:~:text=Access%20control%20technology%20is%20another%20cornerstone%20of,pe
ople%20out%20and%20authorize%20people%20to%20enter.
Physical security systems use technology and control systems to monitor and secure an
environment, and to detect intrusion. Some components of physical security systems include:
•Access control
•Systems that provide an overview of who is entering and exiting a premises, and allow physical
controls to keep some people out and authorize others to enter
•Security lighting
•Well-lit areas are less likely to attract intruders, so entrances should be well lit to allow close
observation of people entering and exiting
•Alarms and intrusion detection systems
•Can connect to alert and response systems that inform and activate emergency services if there's
an issue
•Authentication
•Most sites use passwords to distinguish between legitimate and unauthorized users
•Cloud-based security
•Solutions that provide an added layer of security for physical access control and digital information
What is physical security?
Before getting into specifics, let’s start with a physical security definition. Simply put, physical security is the
protection of your people, property and assets. This includes the physical protection of equipment and tech,
including data storage, servers and employee computers.
Physical security is often jokingly referred to as just being ​“guards and gates”, but modern physical security
systems consist of multiple elements and measures, for example:
•Site layout and security configuration: where are your weak points? What needs the most protection?
•Visibility of critical areas: including lighting and video cameras
•Access control: from simple locks through to keypads and biometric access
•Perimeter protection: the ​“guards and gates” aspect of physical security
•Intrusion detection: including motion sensors, cameras and tripwire alarms
•Infrastructure protection: including power, fire, network connectivity and water
•Staff training and incident response: do your employees know how to handle an incident, and do you have
an emergency response process in place?
Each business’ individual physical security risks will be different, but there are some common types of
physical security threats to be aware of.
•Unauthorized entry: this includes tailgating, social engineering, or access via stolen passes or codes. The
earliest physical security breaches are, logically, at the first point of entry to your site. If unwanted visitors
manage to gain access, then it is only a matter of time before other physical security threats can occur.
•Theft and burglary: businesses own many valuable assets, from equipment, to documents and employee
IDs. Some businesses are extremely exposed to physical security risks like theft because of what they store
on their premises – for example, jewelry or tech stores. Other businesses store extremely valuable
information, like a wealth management firm. Both businesses are prime targets for thieves, even though their
assets are very different.
•Vandalism: some businesses are at risk of their property being destroyed or tampered with. This can be
linked to a company’s location — for example, if your business is next door to a bar or nightclub, alcohol-
related vandalism could be a frequent problem. Vandalism can also be ideologically motivated: for example,
when activists cause physical damage to a business’ premises, such as smashing windows or throwing paint.
These are a few high-level types of physical security threats. As you conduct a risk assessment of your own
business, you will discover physical security risks specific to your industry and location.
Physical security measures and methods
There are all kinds of physical security measures, but the main types of physical security fall into
four broad categories: Deter, Detect, Delay and Respond.
As the diagram shows, the different physical security methods work together in stages. These levels
of physical security begin with Deter at the outermost level, working inwards until finally, if all other
levels are breached, a Response is needed.
Levels of physical security
Deter – Deterrence physical security measures are focused on keeping intruders out of the secured
area. Common methods include tall perimeter fences, barbed wire, clear signs stating that the site has
active security, commercial video cameras and access controls. All of these are designed to give
a clear message to criminals that trespassing is not only difficult, it is also highly likely that they will
be caught.
Detect – Detection works to catch any intruders if they manage to get past the deterrence measures
mentioned above. Some criminals might slip in behind an employee — known as tailgating — or they
might find a way of scaling barriers. In these cases, a physical security measure that can detect their
presence quickly is crucial. These include many types of physical security system that you are
probably familiar with. Physical security controls examples include CCTV cameras, motion sensors,
intruder alarms and smart alerting technology like AI analytics. If an intruder is spotted quickly, it
makes it much easier for security staff to delay them getting any further, and to contact law
enforcement if needed.
Delay – You will notice that several physical security systems have multiple roles: they can
deter as well as detect. Many of the physical security measures above also effectively delay
intruders. Access control systems require credentials to open a locked door, slowing an
intruder down and making it easier to apprehend them.
Respond – Having the technology and processes to respond to intruders and take action is
crucial for physical security, yet often overlooked. Response physical security measures
include communication systems, security guards, designated first responders and
processes for locking down a site and alerting law enforcement.
Physical security controls come in a variety of forms — from perimeter fences, to guards
and security camera system recorders. Many physical security components have more than
one function, and when several methods are combined, they are very effective at preventing
or intercepting intruders and criminal activity.
Physical security control technology
Within the four main types of physical security control categories is an enormous range of physical
security tools and cutting-edge technology.
Physical security technologies have evolved in leaps and bounds in recent years, offering
advanced protection at accessible price points. Physical security devices now use cloud
technology and artificial intelligence for even smarter processing in real time.
Automated physical security components can perform a number of different functions in your
overall physical security system. For physical controls, you might want to verify entry and exits with
access control technology. You can carry out proactive intrusion detection with video security and
access controls that work together as a unified system.
One of the great things about physical security technology is that it is scalable, so you can implement
it flexibly. If you are testing physical security technology out, you might start with a small number of
cameras, locks, sensors or keypads, and see how they perform. However, for a more robust plan
required for properties like municipalities, extensive government cameras, access control and
security technology are most likely necessary and should be planned accordingly. When connected to
the cloud or a secure network, physical security technology can also collect useful data for audit trails
and analysis. It is also useful for demonstrating the merits of your physical security plan to
stakeholders.
When scoping out your physical security investment plan, consider how different types of physical
security tools will work together. Choosing physical security devices that seamlessly integrate
together will make things much easier, especially in the soak testing phase. Many physical security
companies now observe universal standards like ONVIF, which enables devices from different
manufacturers to integrate much more smoothly than in the past. Other specific standards such
as FIPS certified technology should also be taken into account when reviewing your investment plan.
Video security
Video surveillance technology is a core element of many physical security plans today. CCTV has
moved on significantly from the days of recording analog signal to tape. So too has internet
connectivity – thanks to fast network connections and the cloud, transmitting high-quality video is
faster than ever before.
Video security is primarily a Detect form of physical security control. Using a live connection and
smart cameras, it is possible to spot suspicious activity in real time. They can also be used to Deter
intruders, since the sight of cameras around a premises can discourage criminals from attempting to
break in.
There are many different types of security cameras to suit all kinds of requirements and
environments, such as city surveillance cameras used for poor lighting conditions. Or, for targeting
specific small spaces in a business setting, varifocal lens cameras are best for such environment.
Analog cameras are still a cost-effective option for many physical security plans, and whilst the
technology is older, in some cases they have advantages over their more current
counterparts. HD analog security cameras are a popular choice that offers the best of both worlds:
cheaper hardware with high-quality footage.
Internet protocol (IP) cameras use the latest technology to transmit high-quality video over an
internet connection via ethernet security camera cables. These cameras have many smart
features, such as motion detection and anti-tampering. This means that you not only receive data
about what is going on around your site, you also have information about the cameras
themselves. IP cameras come in many different models, depending on the footage you need
to record.
As the name suggests, fixed IP cameras have a fixed viewpoint. This might sound limiting, but
most cameras only need to focus on one key area at a time. Fixed IP cameras are a great choice
for indoor and outdoor use, and there are models for both. These cameras can handle a range of
lighting conditions. Available in both bullet cameras or dome camera formats, these cameras can
handle wall-to-wall and floor-to-ceiling coverage. This also makes them suitable security choices
as elevator cameras. Some models are specifically designed to be vandal-resistant, if this is
a physical security risk.
If 360-degree views are what you need, then pan-tilt-zoom (PTZ) security cameras are the perfect
choice. These give you ultimate control over what you can see in a certain area. They are made to
be versatile in a range of lighting conditions, with long-distance views. Look for low latency
cameras, which deliver footage with minimal delays.
If you want 360-degree views around the clock, panoramic IP cameras are a great option. They
constantly record from all angles. If there are areas where you need maximum visibility, these
could be a great choice for your physical security plan.
Some environments are more challenging and require a specialized solution. For industries such
as oil and gas plants, there are ruggedized cameras which can resist blasts and extreme
temperatures. Ruggedized cameras are also useful in extreme outdoor conditions, for example at
busy ports where water and humidity can affect equipment.
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY

More Related Content

Similar to PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY

How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
NeilStark1
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
NeilStark1
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
NeilStark1
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios
 
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Aladdin Dandis
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
moggdede
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
MVNVKUMAR
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
Surendhar57
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
Shawn Tuma
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
rabeetkashif
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
techtutorus
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
cyberprosocial
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
SecureCurve
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
Dimitris Chalambalis
 
Building security into the internetofthings
Building security into the internetofthingsBuilding security into the internetofthings
Building security into the internetofthings
Prayukth K V
 
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
GQ Research
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
 
Types of Security in Industrial Security
Types of Security in Industrial SecurityTypes of Security in Industrial Security
Types of Security in Industrial Security
RJCubillo
 

Similar to PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY (20)

How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
 
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Building security into the internetofthings
Building security into the internetofthingsBuilding security into the internetofthings
Building security into the internetofthings
 
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
Types of Security in Industrial Security
Types of Security in Industrial SecurityTypes of Security in Industrial Security
Types of Security in Industrial Security
 

More from Major K. Subramaniam Kmaravehlu

PRISON Bincang (1)SUN.pptx. Prison Security measures
PRISON Bincang (1)SUN.pptx. Prison Security measuresPRISON Bincang (1)SUN.pptx. Prison Security measures
PRISON Bincang (1)SUN.pptx. Prison Security measures
Major K. Subramaniam Kmaravehlu
 
BENTANG 1 -CDM APR 22 ahmad.pptx. Crisis and Disaster management presntation
BENTANG 1 -CDM APR 22 ahmad.pptx. Crisis and Disaster  management presntationBENTANG 1 -CDM APR 22 ahmad.pptx. Crisis and Disaster  management presntation
BENTANG 1 -CDM APR 22 ahmad.pptx. Crisis and Disaster management presntation
Major K. Subramaniam Kmaravehlu
 
BENTANG 2 -CDM MAY 22.pptx Crisis and Disaster Management
BENTANG 2 -CDM MAY 22.pptx Crisis and Disaster ManagementBENTANG 2 -CDM MAY 22.pptx Crisis and Disaster Management
BENTANG 2 -CDM MAY 22.pptx Crisis and Disaster Management
Major K. Subramaniam Kmaravehlu
 
BENTANG 1 -PI APR 22.pptx- Private Investigation Services
BENTANG 1 -PI APR 22.pptx- Private Investigation ServicesBENTANG 1 -PI APR 22.pptx- Private Investigation Services
BENTANG 1 -PI APR 22.pptx- Private Investigation Services
Major K. Subramaniam Kmaravehlu
 
PRISON Bincang (2)SUN.pptx. Presentation and group Discussion .
PRISON Bincang (2)SUN.pptx. Presentation and group Discussion .PRISON Bincang (2)SUN.pptx. Presentation and group Discussion .
PRISON Bincang (2)SUN.pptx. Presentation and group Discussion .
Major K. Subramaniam Kmaravehlu
 
Dhurkhesh Discussion_Prison_26.12.21.pdf
Dhurkhesh Discussion_Prison_26.12.21.pdfDhurkhesh Discussion_Prison_26.12.21.pdf
Dhurkhesh Discussion_Prison_26.12.21.pdf
Major K. Subramaniam Kmaravehlu
 
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
Major K. Subramaniam Kmaravehlu
 
u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
u2-lect-1-to-9-mtd-pvb-1801161758710.pptu2-lect-1-to-9-mtd-pvb-1801161758710.ppt
u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
Major K. Subramaniam Kmaravehlu
 
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSMBLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
Major K. Subramaniam Kmaravehlu
 
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
Major K. Subramaniam Kmaravehlu
 
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical securityBLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
Major K. Subramaniam Kmaravehlu
 
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning GuideBLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
Major K. Subramaniam Kmaravehlu
 
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in WarfareAI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
Major K. Subramaniam Kmaravehlu
 
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principlesAVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
Major K. Subramaniam Kmaravehlu
 
CTPAT PPTX Presentation.pptx - minimum security
CTPAT  PPTX Presentation.pptx - minimum securityCTPAT  PPTX Presentation.pptx - minimum security
CTPAT PPTX Presentation.pptx - minimum security
Major K. Subramaniam Kmaravehlu
 
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Major K. Subramaniam Kmaravehlu
 
SECURITY PLANNING DESIGN (SESSION 3).ppt
SECURITY PLANNING  DESIGN (SESSION 3).pptSECURITY PLANNING  DESIGN (SESSION 3).ppt
SECURITY PLANNING DESIGN (SESSION 3).ppt
Major K. Subramaniam Kmaravehlu
 
Physical_Security_Historical_perspective.ppt
Physical_Security_Historical_perspective.pptPhysical_Security_Historical_perspective.ppt
Physical_Security_Historical_perspective.ppt
Major K. Subramaniam Kmaravehlu
 
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSIONBLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
Major K. Subramaniam Kmaravehlu
 
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATIONBLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
Major K. Subramaniam Kmaravehlu
 

More from Major K. Subramaniam Kmaravehlu (20)

PRISON Bincang (1)SUN.pptx. Prison Security measures
PRISON Bincang (1)SUN.pptx. Prison Security measuresPRISON Bincang (1)SUN.pptx. Prison Security measures
PRISON Bincang (1)SUN.pptx. Prison Security measures
 
BENTANG 1 -CDM APR 22 ahmad.pptx. Crisis and Disaster management presntation
BENTANG 1 -CDM APR 22 ahmad.pptx. Crisis and Disaster  management presntationBENTANG 1 -CDM APR 22 ahmad.pptx. Crisis and Disaster  management presntation
BENTANG 1 -CDM APR 22 ahmad.pptx. Crisis and Disaster management presntation
 
BENTANG 2 -CDM MAY 22.pptx Crisis and Disaster Management
BENTANG 2 -CDM MAY 22.pptx Crisis and Disaster ManagementBENTANG 2 -CDM MAY 22.pptx Crisis and Disaster Management
BENTANG 2 -CDM MAY 22.pptx Crisis and Disaster Management
 
BENTANG 1 -PI APR 22.pptx- Private Investigation Services
BENTANG 1 -PI APR 22.pptx- Private Investigation ServicesBENTANG 1 -PI APR 22.pptx- Private Investigation Services
BENTANG 1 -PI APR 22.pptx- Private Investigation Services
 
PRISON Bincang (2)SUN.pptx. Presentation and group Discussion .
PRISON Bincang (2)SUN.pptx. Presentation and group Discussion .PRISON Bincang (2)SUN.pptx. Presentation and group Discussion .
PRISON Bincang (2)SUN.pptx. Presentation and group Discussion .
 
Dhurkhesh Discussion_Prison_26.12.21.pdf
Dhurkhesh Discussion_Prison_26.12.21.pdfDhurkhesh Discussion_Prison_26.12.21.pdf
Dhurkhesh Discussion_Prison_26.12.21.pdf
 
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
 
u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
u2-lect-1-to-9-mtd-pvb-1801161758710.pptu2-lect-1-to-9-mtd-pvb-1801161758710.ppt
u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
 
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSMBLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
 
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
 
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical securityBLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
 
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning GuideBLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
 
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in WarfareAI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
 
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principlesAVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
 
CTPAT PPTX Presentation.pptx - minimum security
CTPAT  PPTX Presentation.pptx - minimum securityCTPAT  PPTX Presentation.pptx - minimum security
CTPAT PPTX Presentation.pptx - minimum security
 
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
 
SECURITY PLANNING DESIGN (SESSION 3).ppt
SECURITY PLANNING  DESIGN (SESSION 3).pptSECURITY PLANNING  DESIGN (SESSION 3).ppt
SECURITY PLANNING DESIGN (SESSION 3).ppt
 
Physical_Security_Historical_perspective.ppt
Physical_Security_Historical_perspective.pptPhysical_Security_Historical_perspective.ppt
Physical_Security_Historical_perspective.ppt
 
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSIONBLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
 
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATIONBLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
 

Recently uploaded

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
Special education needs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
Vivekanand Anglo Vedic Academy
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Sourabh Kumar
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 

PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY

  • 1. What is Physical Security?
  • 2. There are three domains of security: 1.Cyber (e.g., computer, network and information security; important tasks: encryption, data backups). 2.Human (e.g., employees, consultants, suppliers, partners and anyone in contact with your company, important tasks: prevention of social engineering scams). 3.Physical (e.g., the wires, silicon, glass, and structures; important tasks: locked doors, clean desks, situational awareness, shredding).
  • 3.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10.
  • 12.
  • 13. The Physical Security Training Program at fletc.gov covers a wide range of topics, including: •Security legal considerations •Access control •Perimeter security •Security design •Guard force •Protective lighting •Video monitoring systems •Intrusion detection systems •Improvised explosive devices (IED) •Computer vulnerabilities and countermeasures https://www.pelco.com/blog/physical-security- guide#:~:text=Access%20control%20technology%20is%20another%20cornerstone%20of,pe ople%20out%20and%20authorize%20people%20to%20enter.
  • 14. Physical security systems use technology and control systems to monitor and secure an environment, and to detect intrusion. Some components of physical security systems include: •Access control •Systems that provide an overview of who is entering and exiting a premises, and allow physical controls to keep some people out and authorize others to enter •Security lighting •Well-lit areas are less likely to attract intruders, so entrances should be well lit to allow close observation of people entering and exiting •Alarms and intrusion detection systems •Can connect to alert and response systems that inform and activate emergency services if there's an issue •Authentication •Most sites use passwords to distinguish between legitimate and unauthorized users •Cloud-based security •Solutions that provide an added layer of security for physical access control and digital information
  • 15. What is physical security? Before getting into specifics, let’s start with a physical security definition. Simply put, physical security is the protection of your people, property and assets. This includes the physical protection of equipment and tech, including data storage, servers and employee computers. Physical security is often jokingly referred to as just being ​“guards and gates”, but modern physical security systems consist of multiple elements and measures, for example: •Site layout and security configuration: where are your weak points? What needs the most protection? •Visibility of critical areas: including lighting and video cameras •Access control: from simple locks through to keypads and biometric access •Perimeter protection: the ​“guards and gates” aspect of physical security •Intrusion detection: including motion sensors, cameras and tripwire alarms •Infrastructure protection: including power, fire, network connectivity and water •Staff training and incident response: do your employees know how to handle an incident, and do you have an emergency response process in place?
  • 16.
  • 17. Each business’ individual physical security risks will be different, but there are some common types of physical security threats to be aware of. •Unauthorized entry: this includes tailgating, social engineering, or access via stolen passes or codes. The earliest physical security breaches are, logically, at the first point of entry to your site. If unwanted visitors manage to gain access, then it is only a matter of time before other physical security threats can occur. •Theft and burglary: businesses own many valuable assets, from equipment, to documents and employee IDs. Some businesses are extremely exposed to physical security risks like theft because of what they store on their premises – for example, jewelry or tech stores. Other businesses store extremely valuable information, like a wealth management firm. Both businesses are prime targets for thieves, even though their assets are very different. •Vandalism: some businesses are at risk of their property being destroyed or tampered with. This can be linked to a company’s location — for example, if your business is next door to a bar or nightclub, alcohol- related vandalism could be a frequent problem. Vandalism can also be ideologically motivated: for example, when activists cause physical damage to a business’ premises, such as smashing windows or throwing paint. These are a few high-level types of physical security threats. As you conduct a risk assessment of your own business, you will discover physical security risks specific to your industry and location.
  • 18. Physical security measures and methods There are all kinds of physical security measures, but the main types of physical security fall into four broad categories: Deter, Detect, Delay and Respond. As the diagram shows, the different physical security methods work together in stages. These levels of physical security begin with Deter at the outermost level, working inwards until finally, if all other levels are breached, a Response is needed.
  • 19. Levels of physical security Deter – Deterrence physical security measures are focused on keeping intruders out of the secured area. Common methods include tall perimeter fences, barbed wire, clear signs stating that the site has active security, commercial video cameras and access controls. All of these are designed to give a clear message to criminals that trespassing is not only difficult, it is also highly likely that they will be caught. Detect – Detection works to catch any intruders if they manage to get past the deterrence measures mentioned above. Some criminals might slip in behind an employee — known as tailgating — or they might find a way of scaling barriers. In these cases, a physical security measure that can detect their presence quickly is crucial. These include many types of physical security system that you are probably familiar with. Physical security controls examples include CCTV cameras, motion sensors, intruder alarms and smart alerting technology like AI analytics. If an intruder is spotted quickly, it makes it much easier for security staff to delay them getting any further, and to contact law enforcement if needed.
  • 20. Delay – You will notice that several physical security systems have multiple roles: they can deter as well as detect. Many of the physical security measures above also effectively delay intruders. Access control systems require credentials to open a locked door, slowing an intruder down and making it easier to apprehend them. Respond – Having the technology and processes to respond to intruders and take action is crucial for physical security, yet often overlooked. Response physical security measures include communication systems, security guards, designated first responders and processes for locking down a site and alerting law enforcement. Physical security controls come in a variety of forms — from perimeter fences, to guards and security camera system recorders. Many physical security components have more than one function, and when several methods are combined, they are very effective at preventing or intercepting intruders and criminal activity.
  • 21. Physical security control technology Within the four main types of physical security control categories is an enormous range of physical security tools and cutting-edge technology. Physical security technologies have evolved in leaps and bounds in recent years, offering advanced protection at accessible price points. Physical security devices now use cloud technology and artificial intelligence for even smarter processing in real time. Automated physical security components can perform a number of different functions in your overall physical security system. For physical controls, you might want to verify entry and exits with access control technology. You can carry out proactive intrusion detection with video security and access controls that work together as a unified system.
  • 22. One of the great things about physical security technology is that it is scalable, so you can implement it flexibly. If you are testing physical security technology out, you might start with a small number of cameras, locks, sensors or keypads, and see how they perform. However, for a more robust plan required for properties like municipalities, extensive government cameras, access control and security technology are most likely necessary and should be planned accordingly. When connected to the cloud or a secure network, physical security technology can also collect useful data for audit trails and analysis. It is also useful for demonstrating the merits of your physical security plan to stakeholders. When scoping out your physical security investment plan, consider how different types of physical security tools will work together. Choosing physical security devices that seamlessly integrate together will make things much easier, especially in the soak testing phase. Many physical security companies now observe universal standards like ONVIF, which enables devices from different manufacturers to integrate much more smoothly than in the past. Other specific standards such as FIPS certified technology should also be taken into account when reviewing your investment plan.
  • 23. Video security Video surveillance technology is a core element of many physical security plans today. CCTV has moved on significantly from the days of recording analog signal to tape. So too has internet connectivity – thanks to fast network connections and the cloud, transmitting high-quality video is faster than ever before. Video security is primarily a Detect form of physical security control. Using a live connection and smart cameras, it is possible to spot suspicious activity in real time. They can also be used to Deter intruders, since the sight of cameras around a premises can discourage criminals from attempting to break in. There are many different types of security cameras to suit all kinds of requirements and environments, such as city surveillance cameras used for poor lighting conditions. Or, for targeting specific small spaces in a business setting, varifocal lens cameras are best for such environment. Analog cameras are still a cost-effective option for many physical security plans, and whilst the technology is older, in some cases they have advantages over their more current counterparts. HD analog security cameras are a popular choice that offers the best of both worlds: cheaper hardware with high-quality footage.
  • 24. Internet protocol (IP) cameras use the latest technology to transmit high-quality video over an internet connection via ethernet security camera cables. These cameras have many smart features, such as motion detection and anti-tampering. This means that you not only receive data about what is going on around your site, you also have information about the cameras themselves. IP cameras come in many different models, depending on the footage you need to record. As the name suggests, fixed IP cameras have a fixed viewpoint. This might sound limiting, but most cameras only need to focus on one key area at a time. Fixed IP cameras are a great choice for indoor and outdoor use, and there are models for both. These cameras can handle a range of lighting conditions. Available in both bullet cameras or dome camera formats, these cameras can handle wall-to-wall and floor-to-ceiling coverage. This also makes them suitable security choices as elevator cameras. Some models are specifically designed to be vandal-resistant, if this is a physical security risk.
  • 25. If 360-degree views are what you need, then pan-tilt-zoom (PTZ) security cameras are the perfect choice. These give you ultimate control over what you can see in a certain area. They are made to be versatile in a range of lighting conditions, with long-distance views. Look for low latency cameras, which deliver footage with minimal delays. If you want 360-degree views around the clock, panoramic IP cameras are a great option. They constantly record from all angles. If there are areas where you need maximum visibility, these could be a great choice for your physical security plan. Some environments are more challenging and require a specialized solution. For industries such as oil and gas plants, there are ruggedized cameras which can resist blasts and extreme temperatures. Ruggedized cameras are also useful in extreme outdoor conditions, for example at busy ports where water and humidity can affect equipment.