Physical security

Modern prisons are among some of the most physically secure facilities, with almost every area under tight access control and surveillance. Pictured here is the exterior of Shata Prison in Israel, which is secured through the use of high fences, razor wire, protective barriers, guard towers, and security lighting.

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks).[1] Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.

Overview

Canadian Embassy in Washington, D.C. showing planters being used as vehicle barriers to increase the standoff distance, and barriers and gates along the vehicle entrance

Physical security systems for protected facilities are generally intended to:[2][3][4]

  • deter potential intruders (e.g. warning signs, security lighting and perimeter markings);
  • detect intrusions and monitor/record intruders (e.g. intruder alarms and CCTV systems); and
  • trigger appropriate incident responses (e.g. by security guards and police).

It is up to security designers, architects and analysts to balance security controls against risks, taking into account the costs of specifying, developing, testing, implementing, using, managing, monitoring and maintaining the controls, along with broader issues such as aesthetics, human rights, health and safety, and societal norms or conventions. Physical access security measures that are appropriate for a high security prison or a military site may be inappropriate in an office, a home or a vehicle, although the principles are similar.

Elements and design

Deterrence methods

The goal of deterrence methods is to convince potential attackers that a successful attack is unlikely due to strong defenses.

The initial layer of security for a campus, building, office, or other physical space uses crime prevention through environmental design to deter threats. Some of the most common examples are also the most basic: warning signs or window stickers, fences, vehicle barriers, vehicle height-restrictors, restricted access points, security lighting and trenches.[5][6][7][8]

Physical barriers

Spikes atop a barrier wall act as a deterrent to people trying to climb over the wall
Vehicle barrier at the US Mexico border, 2010

Physical barriers such as fences, walls, and vehicle barriers act as the outermost layer of security. They serve to prevent, or at least delay, attacks, and also act as a psychological deterrent by defining the perimeter of the facility and making intrusions seem more difficult. Tall fencing, topped with barbed wire, razor wire or metal spikes are often emplaced on the perimeter of a property, generally with some type of signage that warns people not to attempt entry. However, in some facilities imposing perimeter walls/fencing will not be possible (e.g. an urban office building that is directly adjacent to public sidewalks) or it may be aesthetically unacceptable (e.g. surrounding a shopping center with tall fences topped with razor wire); in this case, the outer security perimeter will be defined as the walls/windows/doors of the structure itself.[9]

Security lighting

Security lighting is another effective form of deterrence. Intruders are less likely to enter well-lit areas for fear of being seen. Doors, gates, and other entrances, in particular, should be well lit to allow close observation of people entering and exiting. When lighting the grounds of a facility, widely distributed low-intensity lighting is generally superior to small patches of high-intensity lighting, because the latter can have a tendency to create blind spots for security personnel and CCTV cameras. It is important to place lighting in a manner that makes it difficult to tamper with (e.g. suspending lights from tall poles), and to ensure that there is a backup power supply so that security lights will not go out if the electricity is cut off.[10] The introduction of low-voltage LED-based lighting products has enabled new security capabilities, such as instant-on or strobing, while substantially reducing electrical consumption.[11]

For nuclear power plants in the United States (U.S.), per the U.S. Nuclear Regulatory Commission (NRC), 10 CFR Part 73, [security] lighting is mentioned four (4) times. The most notable mentioning contained in 10 CFR 73.55(i)(6) Illumination, which clearly identifies that licensees "-shall provide a minimum illumination level of 0.2 foot-candles, measured horizontally at ground level, in the isolation zones and appropriate exterior areas within the protected area-". [Ref] This is also the minimum illumination level specified in Table H–2 Minimum Night Firing Criteria of 10 CFR 73 Appendix H, for night firing. Per 10 CFR 73.46(b)(7) "-Tactical Response Team members, armed response personnel, and guards shall qualify and requalify, at least every 12 months, for day and night firing with assigned weapons in accordance with Appendix H-"; therefore on said respective shooting range [at night] per Appendix H, Table H-2, "-all courses [shall have] 0.2 foot-candles at center mass of target area-" applicable to handguns, shotguns, and rifles. [Ref] 1 foot-candle is approximately 10.76 lux, therefore the minimum illumination requirements for the above sections also reflect 2.152 lux.

Intrusion detection and electronic surveillance

Alarm systems and sensors

Alarm systems can be installed to alert security personnel when unauthorized access is attempted. Alarm systems work in tandem with physical barriers, mechanical systems, and security guards, serving to trigger a response when these other forms of security have been breached. They consist of sensors including perimeter sensors, motion sensors, contact sensors, and glass break detectors.[12]

However, alarms are only useful if there is a prompt response when they are triggered. In the reconnaissance phase prior to an actual attack, some intruders will test the response time of security personnel to a deliberately tripped alarm system. By measuring the length of time it takes for a security team to arrive (if they arrive at all), the attacker can determine if an attack could succeed before authorities arrive to neutralize the threat. Loud audible alarms can also act as a psychological deterrent, by notifying intruders that their presence has been detected.[13] In some jurisdictions, law enforcement will not respond to alarms from intrusion detection systems unless the activation has been verified by an eyewitness or video.[14] Policies like this one have been created to combat the 94–99 percent rate of false alarm activation in the United States.[15]

Video surveillance

Closed-circuit television cameras

Surveillance cameras can be a deterrent[16] when placed in highly visible locations and are useful for incident assessment and historical analysis. For example, if alarms are being generated and there is a camera in place, security personnel assess the situation via the camera feed. In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed. Although the term closed-circuit television (CCTV) is common, it is quickly becoming outdated as more video systems lose the closed circuit for signal transmission and are instead transmitting on IP camera networks.

Video monitoring does not necessarily guarantee a human response. A human must be monitoring the situation in real time in order to respond in a timely manner; otherwise, video monitoring is simply a means to gather evidence for later analysis. However, technological advances like video analytics are reducing the amount of work required for video monitoring as security personnel can be automatically notified of potential security events.[17][18][19]

Access control

Access control methods are used to monitor and control traffic through specific access points and areas of the secure facility. This is done using a variety of systems including CCTV surveillance, identification cards, security guards, biometric readers, and electronic/mechanical control systems such as locks, doors, turnstiles and gates.[20][21][22]

Mechanical access control systems

A drop arm optical turnstile
An electronic access control system, controlling entry through a door

Mechanical access control systems include turnstiles, gates, doors, and locks. Key control of the locks becomes a problem with large user populations and any user turnover. Keys quickly become unmanageable, often forcing the adoption of electronic access control.

Electronic access control systems

Electronic access control systems provide secure access to buildings or facilities by controlling who can enter and exit. Some key aspects of these systems include:

  • Access credentials - Access cards, fobs, or badges are used to identify and authenticate authorized users. Information encoded on the credentials is read by card readers at entry points.
  • Access control panels - These control the system, make access decisions, and are usually located in a secure area. Access control software runs on the panels and interfaces with Card reader.
  • Card readers - Installed at access points, these read credentials and send information to the access control panel. Readers can be proximity, magnetic stripe, smart card, Biometrics, etc.
  • Door locking hardware - Electrified locks, electric strikes, or maglocks physically secure doors and release when valid credentials are presented. Integration allows doors to unlock when authorized.
  • Request to exit devices - These allow free egress through an access point without triggering an alarm. Buttons, motion detectors, and other sensors are commonly used.
  • Alarms - Unauthorized access attempts or held/forced doors can trigger audible alarms and alerts. Integration with camera systems also occurs.
  • Access levels - Software can limit access to specific users, groups, and times. For example, some employees may have 24/7 access to all areas while others are restricted.
  • Event logging - Systems record activity like access attempts, alarms, user tracking, etc. for security auditing and troubleshooting purposes.

Electronic access control uses credential readers, advanced software, and electrified locks to provide programmable, secure access management for facilities. Integration of cameras, alarms and other systems is also common.

An additional sub-layer of mechanical/electronic access control protection is reached by integrating a key management system to manage the possession and usage of mechanical keys to locks or property within a building or campus.[citation needed]

Identification systems and access policies

Another form of access control (procedural) includes the use of policies, processes and procedures to manage the ingress into the restricted area. An example of this is the deployment of security personnel conducting checks for authorized entry at predetermined points of entry. This form of access control is usually supplemented by the earlier forms of access control (i.e. mechanical and electronic access control), or simple devices such as physical passes.

Security personnel

Private factory guard

Security personnel play a central role in all layers of security. All of the technological systems that are employed to enhance physical security are useless without a security force that is trained in their use and maintenance, and which knows how to properly respond to breaches in security. Security personnel perform many functions: patrolling facilities, administering electronic access control, responding to alarms, and monitoring and analyzing video footage.[23]

See also

References

  1. ^ "Chapter 1: Physical Security Challenges". Field Manual 3-19.30: Physical Security. Headquarters, United States Department of Army. 2001. Archived from the original on 2013-03-13.
  2. ^ Garcia, Mary Lynn (2007). Design and Evaluation of Physical Protection Systems. Butterworth-Heinemann. pp. 1–11. ISBN 9780080554280. Archived from the original on 2013-09-21.
  3. ^ "Chapter 2: The Systems Approach". Field Manual 3-19.30: Physical Security. Headquarters, United States Department of Army. 2001. Archived from the original on 2013-09-21.
  4. ^ Anderson, Ross (2001). Security Engineering. Wiley. ISBN 978-0-471-38922-4.
  5. ^ For a detailed discussion on natural surveillance and CPTED, see Fennelly, Lawrence J. (2012). Effective Physical Security. Butterworth-Heinemann. pp. 4–6. ISBN 9780124158924. Archived from the original on 2018-01-05.
  6. ^ Task Committee; Structural Engineering Institute (1999). Structural Design for Physical Security. ASCE. ISBN 978-0-7844-0457-7. Archived from the original on 2018-01-05.
  7. ^ Baker, Paul R. (2012). "Security Construction Projects". In Baker, Paul R.; Benny, Daniel J. (eds.). The Complete Guide to Physical Security. CRC Press. ISBN 9781420099638. Archived from the original on 2018-01-05.
  8. ^ "Chapter 4: Protective Barriers". Field Manual 3-19.30: Physical Security. Headquarters, United States Department of Army. 2001. Archived from the original on 2013-03-13.
  9. ^ Talbot, Julian & Jakeman, Miles (2011). Security Risk Management Body of Knowledge. John Wiley & Sons. pp. 72–73. ISBN 9781118211267. Archived from the original on 2018-01-05.
  10. ^ Kovacich, Gerald L. & Halibozek, Edward P. (2003). The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program. Butterworth-Heinemann. pp. 192–193. ISBN 9780750674874. Archived from the original on 2018-01-05.
  11. ^ "Use of LED Lighting for Security Purposes". silvaconsultants.com. Retrieved 2020-10-06.
  12. ^ "Chapter 6: Electronic Security Systems". Field Manual 3-19.30: Physical Security. Headquarters, United States Department of Army. 2001. Archived from the original on 2013-03-13.
  13. ^ Fennelly, Lawrence J. (2012). Effective Physical Security. Butterworth-Heinemann. pp. 345–346. ISBN 9780124158924. Archived from the original on 2013-09-21.
  14. ^ "Evaluation of alternative policies to combat false emergency calls" (PDF). p. 238. Archived from the original (PDF) on 2012-11-01.
  15. ^ "Evaluation of alternative policies to combat false emergency calls" (PDF). p. 233. Archived from the original (PDF) on 2012-11-01.
  16. ^ "Evaluating the Use of Public Surveillance Cameras for Crime Control and Prevention" (PDF). Archived (PDF) from the original on 2012-12-01.
  17. ^ Crowell, William P.; et al. (2011). "Intelligent Video Analytics". In Cole, Eric (ed.). Physical and Logical Security Convergence. Syngress. ISBN 9780080558783. Archived from the original on 2018-01-05.
  18. ^ Dufour, Jean-Yves (2012). Intelligent Video Surveillance Systems. John Wiley & Sons. ISBN 9781118577868. Archived from the original on 2018-01-05.
  19. ^ Caputo, Anthony C. (2010). Digital Video Surveillance and Security. Butterworth-Heinemann. ISBN 9780080961699. Archived from the original on 2013-09-29.
  20. ^ Tyska, Louis A. & Fennelly, Lawrence J. (2000). Physical Security: 150 Things You Should Know. Butterworth-Heinemann. p. 3. ISBN 9780750672559. Archived from the original on 2018-01-05.
  21. ^ "Chapter 7: Access Control". Field Manual 3-19.30: Physical Security. Headquarters, United States Department of Army. 2001. Archived from the original on 2007-05-10.
  22. ^ Pearson, Robert (2011). "Chapter 1: Electronic Access Control". Electronic Security Systems: A Manager's Guide to Evaluating and Selecting System Solutions. Butterworth-Heinemann. ISBN 9780080494708. Archived from the original on 2018-01-05.
  23. ^ Reid, Robert N. (2005). "Guards and guard forces". Facility Manager's Guide to Security: Protecting Your Assets. The Fairmont Press. ISBN 9780881734836. Archived from the original on 2018-01-05.

Read other articles:

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Maret 2016. Bom Sana'a 2012Bagian dari Tindakan keras al-Qaeda YamanLokasiSana'a, YamanTanggal21 Mei 2012 (2012-05-21) 09:00 AST (UTC+03:00)SasaranTentara YamanJenis seranganBom bunuh diriKorban tewaslebih dari 120[1][2]Korban lukasekurang-kuran...

  لمعانٍ أخرى، طالع تشارلي غرين (توضيح). هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (نوفمبر 2019) تشارلي غرين معلومات شخصية الميلاد 14 مارس 1943 (80 سنة)  دايتون، أوهايو  مواطنة الولايات المتحدة  الوزن 190 رط...

بيراميفير الاسم النظامي (1S,2S,3S,4R)-3-[(1S)-1-acetamido-2-ethyl-butyl]-4- (diaminomethylideneamino)-2-hydroxy-cyclopentane- 1-carboxylic acid يعالج إنفلونزا[1]  اعتبارات علاجية اسم تجاري Rapivab بيانات دوائية توافر حيوي 100% (IV) عمر النصف الحيوي 7.7 to 20.8 hour in patients with normal renal function إخراج (فسلجة) renal معرّفات CAS 330600-85-6 N ك ع ت None بوب...

16α-Hydroxyandrostenedione Names IUPAC name 16α-Hydroxyandrost-4-ene-3,17-dione Systematic IUPAC name (2R,3aS,3bR,9aR,9bS,11aS)-2-Hydroxy-9a,11a-dimethyl-2,3,3a,4,5,8,9,9a,9b,10,11,11a-dodecahydro-1H-cyclopenta[a]phenanthrene-1,7(3bH)-dione Other names 16α-OH-A4 Identifiers CAS Number 63-02-5 3D model (JSmol) Interactive image ChEBI CHEBI:27582 ChEMBL ChEMBL1908014 ChemSpider 389474 PubChem CID 440574 UNII JN8H7214IR CompTox Dashboard (EPA) DTXSID20331500 InChI InChI=1S/C19H26O3/c1-18-7-5-...

أمير أسقف لوبيكأمير أوتين كريستيان أوغست (بالألمانية: Christian August von Schleswig-Holstein-Gottorf)‏  معلومات شخصية الميلاد 11 يناير 1673  قلعة غوتورب  [لغات أخرى]‏  الوفاة 24 أبريل 1726 (53 سنة)   قلعة غوتورب  [لغات أخرى]‏  مكان الدفن كاتدرائية لوبيك  [لغات أخرى]‏...

هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (أبريل 2019) كيري برادي معلومات شخصية الميلاد 27 أغسطس 1963 (60 سنة)  فانكوفر  مواطنة الولايات المتحدة  الوزن 205 رطل  الحياة العملية المدرسة الأم جامعة هاواي  المهن

Robert Byrd foi o político que mais tempo integrou o Senado dos Estados Unidos: 51 anos.[1] Os senadores dos Estados Unidos são comumente classificados pela duração de seus mandatos. Cada estado tem dois senadores como seus representantes no Senado; o que tiver mais anos no cargo (em contínuo) é, por convenção, chamado senador sénior, e o outro é referido como senador júnior. Se ambos são eleitos ao mesmo tempo (um em eleição normal e outro designado para substituir no cargo um ...

Geographic Names Information System Sede principal del USGSInformación generalDominio https://geonames.usgs.gov/pls/gnispublic/Tipo Base de datos geográficaBase de datos en líneaComercial noIdiomas disponibles InglésEn español NoEstado actual ActivoGestiónOperador United States Board on Geographic NamesLanzamiento 1947[editar datos en Wikidata] El Geographic Names Information System (GNIS) es una base de datos que alberga nombres e información sobre localidades geográficas d...

This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: The Rock Northwestern University – news · newspapers · books · scholar · JSTOR (March 2009) (Learn how and when to remove this template message) The Rock on December 31, 2007 The Rock is a boulder on the campus of Northwestern University in Evanston, Illin...

Stasiun Maguwo Y03 Bangunan operasional Stasiun Maguwo, setelah menjalani elektrifikasi dan penggantian papan nama stasiun, 2021LokasiJalan Bandara AdisuciptoMaguwoharjo, Depok, Sleman, Daerah Istimewa Yogyakarta 55598IndonesiaKetinggian+118 mOperatorKAI CommuterLetak dari pangkalkm 158+975 lintas Semarang Tawang-Brumbung-Gundih-Solo Balapan-Yogyakarta[1]Jumlah peronDua peron sisi yang tinggi; satu sama lainnya dihubungkan dengan jalan setapak dan lorong bawah tanahJumlah jalur4 (jalu...

Romance Tropical, film Puerto Rico pertama film dengan suara dan film berbahasa Spanyol kedua di duniaSejarah Industri sinema di Puerto Rico dimulai saat invasi AS ke pulau tersebut pada 1898. Pada waktu itu, para prajurit Amerika membawa kamera-kamera untuk merekam apa yang mereka lihat. Sementara, kegiatan perfilman oleh penduduk setempat disana tidak berlangsung sampai 1912 ketika bangsa Puerto Rico mulai membuat film mereka sendiri. Setelah itu, sinema Puerto Rico berkembang dengan perlah...

Ancient city in Etruria See also: Lucus Feroniae Map of Latium 400 BC Feronia plan showing the forum with the sanctuary on its northeastern side Wikimedia Commons has media related to Lucus Feroniae. Feronia forum, view from the basilica podium The Augusteum Feronia or Lucus Feroniae (Φερωνία, Strabo; Λοῦκος Φηρωνίας, Ptolemy) was an ancient town near the present town of Fiano Romano. It is located in the plain along the Tiber river, at the foot of Mount Soracte, and was...

Consolidated city-county in the United StatesAugustaConsolidated city-countyDowntown Augusta on Broad StreetAugusta National Golf ClubRiverwalk Augusta on the Savannah RiverThe University Hall at Augusta UniversitySacred Heart Cultural CenterAugusta Canal with Enterprise Mill in the backgroundOld Government House SealNickname: The Garden CityMotto: We Feel GoodShow AugustaShow GeorgiaShow the United StatesAugusta's location in GeorgiaCoordinates: 33°28′12″N 81°58′30″Wþ...

Wappen Gabriel Thormann in der Kirche Seedorf (1716) Die Familie Thormann war eine bernische Patrizierfamilie. Die Familie besitzt möglicherweise seit ungefähr 1295 das Burgerrecht der Stadt Bern und gehört der Gesellschaft zu Pfistern an. Geschichte Das Geschlecht der Thormann ist in Bern auf Hans Thormann, Bäcker und Mitglied des Kleinen Rats, zurückzuführen. Frühere Namensvorkommnisse sind nicht in Zusammenhang zu bringen, da der Name im deutschsprachigen Raum eine beachtliche Verbr...

Backlot set located in Burbank, California Warner ranch redirects here. Not to be confused with Warner Center, Los Angeles, a commercial and residential development that was once a horse ranch owned by movie studio owner Harry Warner. This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Warner Bros. Ranch – news · newspapers ...

The Bye Bye ManTheatrical release posterSutradara Stacy Title Produser Simon Horsman Trevor Macy Jeffrey Soros Seth William Meier Melinda Nishioka Ditulis oleh Jonathan Penner BerdasarkanThe Bridge to Body Islandoleh Robert Damon SchneckPemeran Douglas Smith Lucien Laviscount Cressida Bonas Doug Jones Carrie-Anne Moss Jenna Kanell Faye Dunaway Penata musikThe Newton BrothersSinematograferJames KniestPenyuntingKen BlackwellPerusahaanproduksi Huayi Brothers Pictures Intrepid Pictures Los ...

The Age of AdalinePoster perilisan bioskopSutradara Lee Toland Krieger Produser Sidney Kimmel Gary Lucchesi Brett Ratner Tom Rosenberg Ditulis oleh J. Mills Goodloe Salvador Paskowitz PemeranBlake Lively Michiel Huisman Kathy Baker Amanda Crew Harrison Ford Ellen BurstynAnthony IngruberNaratorHugh RossPenata musikRob SimonsenSinematograferDavid LanzenbergPenyuntingMelissa KentPerusahaanproduksiLakeshore Entertainment Sidney Kimmel Entertainment RatPac-Dune EntertainmentDistributorLionsg...

American lawyer and politician (born 1964) Jared HuffmanMember of the U.S. House of Representativesfrom California's 2nd districtIncumbentAssumed office January 3, 2013Preceded byLynn WoolseyMember of the California State Assemblyfrom the 6th districtIn officeDecember 4, 2006 – November 30, 2012Preceded byJoe NationSucceeded byBeth Gaines Personal detailsBornJared William Huffman (1964-02-18) February 18, 1964 (age 59)Independence, Missouri, U.S.Political party...

2015 French filmThe Sweet EscapeFilm posterDirected byBruno PodalydèsWritten byBruno PodalydèsProduced byPascal CaucheteuxStarringBruno Podalydès Sandrine Kiberlain Agnès Jaoui Vimala PonsCinematographyClaire MathonEdited byChristel DewynterProductioncompaniesWhy Not ProductionsFrance 3 CinémaDistributed byUGC DistributionRelease date 10 June 2015 (2015-06-10) Running time104 minutesCountryFranceLanguageFrenchBudget$4 million[1]Box office$2.5 million[2] The...

Artikel ini tidak memiliki referensi atau sumber tepercaya sehingga isinya tidak bisa dipastikan. Tolong bantu perbaiki artikel ini dengan menambahkan referensi yang layak. Tulisan tanpa sumber dapat dipertanyakan dan dihapus sewaktu-waktu.Cari sumber: Warna – berita · surat kabar · buku · cendekiawan · JSTOR Untuk kegunaan lain, lihat Warna (disambiguasi). Pensil warna Efek warna—sinar matahari bersinar melalui kaca patri di atas karpet (Masjid Nasi...