Top Banner

of 38

Intro to Sy Vgdxx

Apr 06, 2018

Download

Documents

supervehl7468
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/3/2019 Intro to Sy Vgdxx

    1/38

  • 8/3/2019 Intro to Sy Vgdxx

    2/38

    Prepared by: Matt J. McCarthy 2

    Crime Prevention ThroughEnvironmental Design (CPTED)

    Began in the early 1960s

    A fundamental concept in security

    design that is based on the premisethat effective use and manipulationof the physical environment canreduce criminal behavior

  • 8/3/2019 Intro to Sy Vgdxx

    3/38

    Prepared by: Matt J. McCarthy 3

    Crime Prevention ThroughEnvironmental Design (CPTED)

    4 Key Strategies:

    1. Territoriality

    2. Natural Surveillance3. Activity Support

    4. Access Control

  • 8/3/2019 Intro to Sy Vgdxx

    4/38

    Prepared by: Matt J. McCarthy 4

    Crime Prevention ThroughEnvironmental Design (CPTED)

    1. Territoriality:

    Most people tend to protect area

    that they feel is their own, andhave a certain amount of respectfor others. Fences, pavementtreatments, signs and landscaping

    all help to express ownership.

  • 8/3/2019 Intro to Sy Vgdxx

    5/38

    Prepared by: Matt J. McCarthy 5

    Crime Prevention ThroughEnvironmental Design (CPTED)

    2. Natural Surveillance

    -This is almost entirely based off ofthe fact that criminals do not wantto be seen.

    - place physical activities, featuresand people in a way that they can

    be observed- remove trees, sheds, bushes andother sight obstructions

  • 8/3/2019 Intro to Sy Vgdxx

    6/38

    Prepared by: Matt J. McCarthy 6

    Crime Prevention ThroughEnvironmental Design (CPTED)

    3. Activity Support

    - encourage legitimate activity in

    public spaces- any activity that gets people outand interacting helps to discouragecrime

    - basketball courts in parks,neighborhood parties, etc.

  • 8/3/2019 Intro to Sy Vgdxx

    7/38

    Prepared by: Matt J. McCarthy 7

    Crime Prevention ThroughEnvironmental Design (CPTED)

    4. Access Control

    - properly located entrances/exits

    - fencing- lighting

    - receptionist at a front desk

    - a neighbor sitting on their frontporch

  • 8/3/2019 Intro to Sy Vgdxx

    8/38

    Prepared by: Matt J. McCarthy 8

    An Overview of Physical Controls

    Concentric Zone Theory based onthe premise that the more valuablean asset is, the more protection itneeds

  • 8/3/2019 Intro to Sy Vgdxx

    9/38

    Prepared by: Matt J. McCarthy 9

    Concentric Zone Theory

  • 8/3/2019 Intro to Sy Vgdxx

    10/38

    Prepared by: Matt J. McCarthy 10

    An Overview of Physical Controls

    3 Basic Lines of Physical Defense:

    1. The perimeter of the facility

    2. The building exterior3. The interior

  • 8/3/2019 Intro to Sy Vgdxx

    11/38

    Prepared by: Matt J. McCarthy 11

    Basic Security Equipment

    A. Locks

    - key, key card or smart card

    operated first used in Egypt over 4,000years ago

    - remains one of the oldest, mostcommonly used methods of accesscontrol

  • 8/3/2019 Intro to Sy Vgdxx

    12/38

    Prepared by: Matt J. McCarthy 12

    Basic Security Equipment

    B. Biometrics

    - the science of using individual

    physiological features or behavioralcharacteristics to positively identifya person

    Examples: fingerprint, iris/retinalscans, hand geometry, voice, et al.

  • 8/3/2019 Intro to Sy Vgdxx

    13/38

    Prepared by: Matt J. McCarthy 13

    Basic Security Equipment

    C. Lighting

    - intruders want darkness to cover

    their actions- 3 out of 4 commercial burglariesare committed within buildings withlittle or no light

  • 8/3/2019 Intro to Sy Vgdxx

    14/38

    Prepared by: Matt J. McCarthy 14

    Basic Security Equipment

    C. Lighting

    4 types:

    1. Continuous2. Standby

    3. Moveable

    4. Emergency

  • 8/3/2019 Intro to Sy Vgdxx

    15/38

    Prepared by: Matt J. McCarthy 15

    Basic Security Equipment

    D. Alarms

    - date back to 390 BC when geese

    were used- many federally insured institutionsare required to use them

    - some insurance companies offerdiscounts for alarm installation/use

  • 8/3/2019 Intro to Sy Vgdxx

    16/38

    Prepared by: Matt J. McCarthy 16

    Basic Security Equipment

    D. Alarm uses:

    Burglar

    Fire

    Temperature

    Humidity

    Water flow

    Electrical power

  • 8/3/2019 Intro to Sy Vgdxx

    17/38

    Prepared by: Matt J. McCarthy 17

    Basic Security Equipment

    D. Alarm system types:

    Local sound on the premises only

    Proprietary a constantly-mannedalarm panel operated by the owner

    Central Station similar to proprietary,except usually operated off premises byan alarm company

    Police Connected the alarm isdirected via phone lines to the nearestpolice dept.

  • 8/3/2019 Intro to Sy Vgdxx

    18/38

    Prepared by: Matt J. McCarthy 18

    Basic Security Equipment

    D. Alarms False Alarms

    More than 90% of all intrusion alarmsare false alarms, resulting in needless

    expense and risks on the part ofresponders.

    Because of the high number of falsealarms, many cities prohibit alarms

    connected directly to the policedepartment.

  • 8/3/2019 Intro to Sy Vgdxx

    19/38

    Prepared by: Matt J. McCarthy 19

    Basic Security Equipment

    E. Closed Circuit Television (CCTV)

    A generic term, generally meaning asystem in which a number of video

    cameras are connected in a closedcircuit or loop, where the images aresent to a central television monitor orrecorded.

    CCTV systems range from basic systemto very complicated networks.

  • 8/3/2019 Intro to Sy Vgdxx

    20/38

    Prepared by: Matt J. McCarthy 20

    Basic Security Equipment

    E. Closed Circuit Television (CCTV)

    Cameras may be overt or covert, orsemi-covert.

    Overt out in the open

    Covert hidden

    Semi- Covert cameras are in public viewbut behind a one-way transparent

    covering.

  • 8/3/2019 Intro to Sy Vgdxx

    21/38

    Prepared by: Matt J. McCarthy 21

    Basic Security Equipment

    E. CCTV other technology:

    Internet Protocol Video (IP)

    Video can be sent across a companysdata network so that it can be viewedwherever the company chooses.

    These can cause bandwidth and digital

    storage issues for a companysnetwork.

  • 8/3/2019 Intro to Sy Vgdxx

    22/38

    Prepared by: Matt J. McCarthy 22

    Basic Security Equipment

    E. CCTV other technology:

    Night Cameras most popular kind

    use image intensification thatamplifies available visible and near-infrared light to achieve bettervision

  • 8/3/2019 Intro to Sy Vgdxx

    23/38

    Prepared by: Matt J. McCarthy 23

    Basic Security Equipment

    E. CCTV other technology:

    Thermal Imaging operates on the

    principle that all objects emitinfrared energy that can be seenusing a thermal imager

  • 8/3/2019 Intro to Sy Vgdxx

    24/38

    Prepared by: Matt J. McCarthy 24

    Privacy concerns

    There is concern over the amountof, or rather lack of, privacy byprivate, non-criminal citizensthrough the extensive use ofsurveillance methods.

    Some cities are passing legislation

    to govern these types of devicesand their use.

  • 8/3/2019 Intro to Sy Vgdxx

    25/38

    Prepared by: Matt J. McCarthy 25

    Facility PhysicalDefense Guidelines

  • 8/3/2019 Intro to Sy Vgdxx

    26/38

    Prepared by: Matt J. McCarthy 26

    The Perimeter

    The perimeter can be controlledby a variety of ways:

    A. Fences 2 basic typesOrnamental

    Chain Link effectiveness can beincreased by adding razor wire,

    barbed wire, etc.

  • 8/3/2019 Intro to Sy Vgdxx

    27/38

    Prepared by: Matt J. McCarthy 27

    The Perimeter

    The perimeter can be controlledby a variety of ways:

    B. AlarmsC. Perimeter Lighting

    Floodlights

    Street lights

    Fresnal units Searchlights

  • 8/3/2019 Intro to Sy Vgdxx

    28/38

    Prepared by: Matt J. McCarthy 28

    The Perimeter

    The perimeter can be controlledby a variety of ways:

    D. Surveillance CamerasE. Vehicle Barriers

    Active require some action by a personor equipment to be raised into place

    Passive a fixed device with no movingparts, such as guard rails, concrete poles,etc.

  • 8/3/2019 Intro to Sy Vgdxx

    29/38

    Prepared by: Matt J. McCarthy 29

    The Perimeter

    The perimeter can be controlledby a variety of ways:

    F. Patrols Security Officers

    Patrol or Guard Dog units roam aloneinside a perimeter or building to deterintruders

  • 8/3/2019 Intro to Sy Vgdxx

    30/38

    Prepared by: Matt J. McCarthy 30

    The Perimeter

    The perimeter can be controlledby a variety of ways:

    G. SignsH. Physical Layout Whenpossible, we should always try tomaintain a clear zone of 20 feet on

    either side of the perimeter

  • 8/3/2019 Intro to Sy Vgdxx

    31/38

    Prepared by: Matt J. McCarthy 31

    The Building Exterior

    For some facilities, the exterior isthe first line of defense.

    Keys for effective security: Strong, locked doors

    Limited number of entrances

    Secured openings (>96 sq. inches)

    Alarms

    Surveillance

    Lighting

  • 8/3/2019 Intro to Sy Vgdxx

    32/38

    Prepared by: Matt J. McCarthy 32

    Building Exterior controls

    Panic or Crash Bars

    A device located on the inside of a dooronly. It allows the door to opened in

    case of a fire, but has no hardware onthe outside that can be used to openthe door.

  • 8/3/2019 Intro to Sy Vgdxx

    33/38

    Prepared by: Matt J. McCarthy 33

    The Building Interior

    Internal physical controls areusually required along with externalcontrols.

    Secure areas should be separatedfrom non-secure areas if possible.

  • 8/3/2019 Intro to Sy Vgdxx

    34/38

    Prepared by: Matt J. McCarthy 34

    The Building Interior

    Safeguards:

    Locks

    Alarms

    Mirrors

    Document shredders

    Vaults/ safes

    Bolt down large, moveable equipment Lock down devices on office equipment

    Surveillance systems

  • 8/3/2019 Intro to Sy Vgdxx

    35/38

    Prepared by: Matt J. McCarthy 35

    The Building Interior

    The Command Center

    Should be linked to the security controlcenter

    Should be in a tightly controlled area

    Can also monitor access

    Increasingly, staff members of the

    command center can also handlecomputer network issues if need be.

  • 8/3/2019 Intro to Sy Vgdxx

    36/38

    Prepared by: Matt J. McCarthy 36

    The Physical Security System

    The goal is to provide the amount ofsecurity needed - neither too muchnor too little.

    This is a balancing act betweenaesthetic, operational, safety andsecurity needs.

  • 8/3/2019 Intro to Sy Vgdxx

    37/38

    Prepared by: Matt J. McCarthy 37

    The Physical Security System

    Physical Security Users: a groupcomprised of the people who ownthe property being protected, thepeople who work at or visit thefacility, and the security forcesthemselves.

  • 8/3/2019 Intro to Sy Vgdxx

    38/38

    P d b M tt J M C th 38

    The Physical Security System

    Physical security footprint themark left during or after a securityaction that the public sees and letsthem know security is present.