module 7 physical security system
TRANSCRIPT
![Page 1: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/1.jpg)
BE-NETTE C. REVIDAD, CST
![Page 2: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/2.jpg)
At the end of the session, the trainees must be able to
Define the Physical Security System; Identify correctly the objectives of
Physical Security and It’s importance in the Security Industry
![Page 3: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/3.jpg)
The physical measures designed to safeguard personnel, property, and information, to prevent unauthorize access to equipment, installations, materail and documents and to safeguard them against espionage, sabotage, damage, and theft.
![Page 4: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/4.jpg)
ARCHITECTURAL FEATURESLOCATION / LAY OUTBARRIER / DOORSLOCKS and BOLTSLIGHTINGS
STAFF and PROCEDURESDEPLOYMENTPOLICIES and PROCEDURESCOMMUNICATIONTRAINING
ELECTRONIC SYSTEMACCESS CONTROL SYSTEMALARM SYSTEMCCTV SYSTEMSCOMMUNICATIONS
![Page 5: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/5.jpg)
The type of access necessary will depend on a number of variable factors and therefore may be achieve in a number of ways.
There is no impenetrable barrier Defence in depth – barrier after barrier Delay provided against surreptitious and
non–surreptitious entry. Each installation is different
![Page 6: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/6.jpg)
DETERRENCE DETECTION DELAY RESPONSE
![Page 7: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/7.jpg)
PROTECTION IN DEPTH CPTED RISKED – BASED APPROACH
![Page 8: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/8.jpg)
EXTERIOR PERIMETERS
BUILDING PERIMETERS
INTERIOR BARRIERS
INTERVENTION ZONE
![Page 9: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/9.jpg)
“The proper design and effective use of the built environment can lead to a reduction in fear of crime and te incidence of crime and to an improvement in the quality of life”
Dr. Jeffery, CPTED
![Page 10: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/10.jpg)
Natural access control utilises walkways, fences, lighting, signage and landscape to clearly guide people and vehicles to and from the proper entrances.
Image and maintenance ensure that a building or area is clean, well kept and free of graffiti or litter. If a property is untidy and littered with trash and graffiti, it sends the message that no one cares for the property and undesirable behaviour will be tolerated.
![Page 11: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/11.jpg)
Territoriality allows for the feeling of pride or ownership of a place while also creating a welcoming environment. It is important to project the image that a property is well cared for and those responsible for it will protect it.
Natural surveillance maximises the ability to spot suspicious people or activities. Clear sight lines and visible entranceways are helpful while dimly lit or isolated areas create a more comfortable location for criminals to act.
![Page 12: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/12.jpg)
Activity support encourages the intended use of public space by residents. An unsafe area may see a loss of business or a lack of people on the street, for example. An area active with legitimate users deters criminal activity.
Hierarchy of space identifies ownership of an area by clearly delineating private from public space with boundaries such as decorative sidewalks, lawns, and hedges.
![Page 13: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/13.jpg)
Proper allocation of space features a design or location decision that takes into account the surrounding environment and minimises the use of space by conflicting groups. In addition to creating an environment in which criminals feel uncomfortable, the goal of these design principals is also to foster an environment in which law-abiding citizens do feel comfortable and secure.
![Page 14: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/14.jpg)
NATURAL SURVALLAN
CE
TERRITORIALITY
DEFENSIVE SPACE
ACTIVITY PROGRAMM
E
FORMAL ORGANIZED SURVAILLAN
CE
ACCESS CONTROL
TARGET HARDENING
![Page 15: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/15.jpg)
PREPARATION RESOURCE APPRECIATION AUDIT OF EXISTING SECURITY
STRATEGIES THREAT ASSESSMENT IDENTIFICATION OF VULNERABILITIES FORMULATION OF STRATEGIES
AND RECOMMENDATION
![Page 16: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/16.jpg)
Safety First Support business misson Adopt risk – based approach Integrate with business operations Aim at achieving the objective of deterrenct,
detection, delay and response Plan for business continuity Comply with rules and regulations Establish policies and procedures Raise staff awareness Periodic review and continuous improvement
![Page 17: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/17.jpg)
Putting security before lives Not knowing what is at risk Not achieving the objective No policies and procedures Not integrated with business operations Low staff awareness of policies and
procedures No information classification Not compliant with local rules and
regulations relevant to physical security No business continuity planning
![Page 18: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/18.jpg)
TARGET
THREAT
CHARACTERISTICS
PLANDEVELOP
DETECTION
DETERRENCE
RESPONSE
DELAY
COST / BENEFIT
FEASIBILITY
EVALUATEFINAL
DESIGN
ASSESSMENT
![Page 19: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/19.jpg)
![Page 20: Module 7 physical security system](https://reader033.vdocuments.net/reader033/viewer/2022052903/55756798d8b42a2e248b49d1/html5/thumbnails/20.jpg)
Thank you for your time...
7.19.2011