Physical security
   HOME

TheInfoList



OR:

Physical security describes
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangib ...
,
theft Theft is the act of taking another person's property or services without that person's permission or consent with the intent to deprive the rightful owner of it. The word ''theft'' is also used as a synonym or informal shorthand term for som ...
, or
terrorist Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
attacks). Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards,
protective barriers A separation barrier or separation wall is a barrier, wall or fence, constructed to limit the movement of people across a certain line or border, or to separate peoples or cultures. A separation barrier that runs along an internationally recogn ...
,
locks Lock(s) may refer to: Common meanings *Lock and key, a mechanical device used to secure items of importance *Lock (water navigation), a device for boats to transit between different levels of water, as in a canal Arts and entertainment * ''Lock ...
, access control, perimeter intrusion detection, deterrent systems,
fire protection Fire protection is the study and practice of mitigating the unwanted effects of potentially destructive fires. It involves the study of the behaviour, compartmentalisation, suppression and investigation of fire and its related emergencies, as we ...
, and other systems designed to protect persons and property.


Overview

Physical security systems for protected facilities are generally intended to: * deter potential intruders (e.g. warning signs, security lighting and perimeter markings); * detect intrusions and monitor/record intruders (e.g. intruder alarms and CCTV systems); and * trigger appropriate incident responses (e.g. by security guards and police). It is up to security designers, architects and analysts to balance security controls against risks, taking into account the costs of specifying, developing, testing, implementing, using, managing, monitoring and maintaining the controls, along with broader issues such as
aesthetics Aesthetics, or esthetics, is a branch of philosophy that deals with the nature of beauty and taste, as well as the philosophy of art (its own area of philosophy that comes out of aesthetics). It examines aesthetic values, often expressed t ...
,
human rights Human rights are moral principles or normsJames Nickel, with assistance from Thomas Pogge, M.B.E. Smith, and Leif Wenar, 13 December 2013, Stanford Encyclopedia of PhilosophyHuman Rights Retrieved 14 August 2014 for certain standards of hu ...
, health and safety, and societal norms or conventions. Physical access security measures that are appropriate for a high security
prison A prison, also known as a jail, gaol (dated, standard English, Australian, and historically in Canada), penitentiary (American English and Canadian English), detention center (or detention centre outside the US), correction center, corre ...
or a military site may be inappropriate in an office, a home or a vehicle, although the principles are similar.


Elements and design


Deterrence methods

The goal of ''deterrence'' methods is to convince potential attackers that a successful attack is unlikely due to strong defenses. The initial layer of security for a campus, building, office,, or other physical space uses crime prevention through environmental design to deter threats. Some of the most common examples are also the most basic: warning signs or window stickers,
fence A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or netting. A fence differs from a wall in not having a solid foundation along its whole length. ...
s, vehicle barriers, vehicle height-restrictors, restricted access points, security lighting and trenches.


Physical barriers

Physical barriers such as fences, walls, and vehicle barriers act as the outermost layer of security. They serve to prevent, or at least delay, attacks, and also act as a psychological deterrent by defining the perimeter of the facility and making intrusions seem more difficult. Tall fencing, topped with barbed wire, razor wire or metal spikes are often emplaced on the perimeter of a property, generally with some type of signage that warns people not to attempt entry. However, in some facilities imposing perimeter walls/fencing will not be possible (e.g. an urban office building that is directly adjacent to public sidewalks) or it may be aesthetically unacceptable (e.g. surrounding a shopping center with tall fences topped with razor wire); in this case, the outer security perimeter will be defined as the walls/windows/doors of the structure itself.


=Combination barriers

= Barriers are typically designed to defeat defined threats. This is part of
building code A building code (also building control or building regulations) is a set of rules that specify the standards for constructed objects such as buildings and non-building structures. Buildings must conform to the code to obtain planning permiss ...
s as well as fire codes. Apart from external threats, there are internal threats of
fire Fire is the rapid oxidation of a material (the fuel) in the exothermic chemical process of combustion, releasing heat, light, and various reaction products. At a certain point in the combustion reaction, called the ignition point, flames a ...
, smoke migration as well as sabotage. The National Building Code of Canada, as an example, indicates the need to defeat external explosions with the
building envelope A building envelope is the physical separator between the conditioned and unconditioned environment of a building including the resistance to air, water, heat, light, and noiseSyed, Asif. ''Advanced building technologies for sustainability''. Hoboke ...
, where they are possible, such as where large electrical
transformer A transformer is a passive component that transfers electrical energy from one electrical circuit to another circuit, or multiple circuits. A varying current in any coil of the transformer produces a varying magnetic flux in the transformer' ...
s are located close to a building. High-voltage transformer fire barriers can be examples of walls designed to simultaneously defeat fire, ballistics and fragmentation as a result of transformer ruptures, as well as incoming small weapons fire. Similarly, buildings may have internal barriers to defeat weapons as well as fire and heat. An example would be a counter at a police station or embassy, where the public may access a room but talk through security glass to employees in behind. If such a barrier aligns with a fire compartment as part of building code compliance, then multiple threats must be defeated simultaneously, which must be considered in the design. Plastic deformation as a result of impact can knock loose, tear or squish
passive fire protection Passive fire protection (PFP) is components or systems of a building or structure that slows or impedes the spread of the effects of fire or smoke without system activation, and usually without movement. Examples of passive systems include floo ...
(PFP) materials, particularly once the PFP materials are stressed. Some PFP materials can at times be very resilient, impact resistant and ductile ''at ambient''. Once stressed by fire, that can change as free water dissipates at 100°C (212°F), and hydrates can be spent near 300°C (572°F), all of which is reached within minutes of a fire. Construction level binders, unlike certain refractories, can also degrade with heat, thus changing the physical properties of many PFP materials across different temperature ranges. None of that is normally a problem. In fact it is part of PFP designs for different reasons. But when combining PFP with ballistics or fragmentation, it is prudent to consider all relevant stresses in designing barriers that must (or may be presumed or advertised to) simultaneously defeat fire, followed by hose stream and impacts that come during a fire event.


Natural surveillance

Another major form of deterrence that can be incorporated into the design of facilities is natural surveillance, whereby architects seek to build spaces that are more open and visible to security personnel and authorized users, so that intruders/attackers are unable to perform unauthorized activity without being seen. An example would be decreasing the amount of dense, tall vegetation in the landscaping so that attackers cannot conceal themselves within it, or placing critical resources in areas where intruders would have to cross over a wide, open space to reach them (making it likely that someone would notice them).


Security lighting

Security lighting is another effective form of deterrence. Intruders are less likely to enter well-lit areas for fear of being seen. Doors, gates, and other entrances, in particular, should be well lit to allow close observation of people entering and exiting. When lighting the grounds of a facility, widely distributed low-intensity lighting is generally superior to small patches of high-intensity lighting, because the latter can have a tendency to create blind spots for security personnel and CCTV cameras. It is important to place lighting in a manner that makes it difficult to tamper with (e.g. suspending lights from tall poles), and to ensure that there is a backup power supply so that security lights will not go out if the electricity is cut off. The introduction of low-voltage LED-based lighting products has enabled new security capabilities, such as instant-on or strobing, while substantially reducing electrical consumption.


Intrusion detection and electronic surveillance


Alarm systems and sensors

Alarm systems can be installed to alert security personnel when unauthorized access is attempted. Alarm systems work in tandem with physical barriers, mechanical systems, and security guards, serving to trigger a response when these other forms of security have been breached. They consist of sensors including perimeter sensors,
motion sensors Motion detection is the process of detecting a change in the position of an object relative to its surroundings or a change in the surroundings relative to an object. It can be achieved by either mechanical or electronic methods. When it is done b ...
, contact sensors, and glass break detectors. However, alarms are only useful if there is a prompt response when they are triggered. In the reconnaissance phase prior to an actual attack, some intruders will test the response time of security personnel to a deliberately tripped alarm system. By measuring the length of time it takes for a security team to arrive (if they arrive at all), the attacker can determine if an attack could succeed before authorities arrive to neutralize the threat. Loud audible alarms can also act as a psychological deterrent, by notifying intruders that their presence has been detected. In some jurisdictions, law enforcement will not respond to alarms from intrusion detection systems unless the activation has been verified by an eyewitness or video. Policies like this one have been created to combat the 94–99 percent rate of false alarm activation in the United States.


Video surveillance

''Surveillance cameras'' can be a deterrent when placed in highly visible locations and are useful for incident assessment and historical analysis. For example, if alarms are being generated and there is a camera in place, security personnel assess the situation via the camera feed. In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed. Although the term closed-circuit television (CCTV) is common, it is quickly becoming outdated as more video systems lose the closed circuit for signal transmission and are instead transmitting on IP camera networks. Video monitoring does not necessarily guarantee a human response. A human must be monitoring the situation in real time in order to respond in a timely manner; otherwise, video monitoring is simply a means to gather evidence for later analysis. However, technological advances like video analytics are reducing the amount of work required for video monitoring as security personnel can be automatically notified of potential security events.


Access control

Access control methods are used to monitor and control traffic through specific access points and areas of the secure facility. This is done using a variety of systems including CCTV surveillance, identification cards, security guards, biometric readers, and electronic/mechanical control systems such as locks, doors, turnstiles and gates.


Mechanical access control systems

''Mechanical access control systems'' include turnstiles, gates, doors, and locks. Key control of the locks becomes a problem with large user populations and any user turnover. Keys quickly become unmanageable, often forcing the adoption of electronic access control.


Electronic access control systems

''Electronic access control'' manages large user populations, controlling for user life cycles times, dates, and individual access points. For example, a user's access rights could allow access from 0700h to 1900h Monday through Friday and expire in 90 days. These access control systems are often interfaced with turnstiles for entry control in buildings to prevent unauthorized access. The use of turnstiles also reduces the need for additional security personnel to monitor each individual entering the building allowing faster throughput. An additional sub-layer of mechanical/electronic access control protection is reached by integrating a
key management Key management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, ...
system to manage the possession and usage of mechanical keys to locks or property within a building or campus.


Identification systems and access policies

Another form of access control (''procedural'') includes the use of policies, processes and procedures to manage the ingress into the restricted area. An example of this is the deployment of security personnel conducting checks for authorized entry at predetermined points of entry. This form of access control is usually supplemented by the earlier forms of access control (i.e. mechanical and electronic access control), or simple devices such as physical passes.


Security personnel

''Security personnel'' play a central role in all layers of security. All of the technological systems that are employed to enhance physical security are useless without a security force that is trained in their use and maintenance, and which knows how to properly respond to breaches in security. Security personnel perform many functions: patrolling facilities, administering electronic access control, responding to alarms, and monitoring and analyzing video footage.


See also

*
Alarm management Alarm management is the application of human factors and ergonomics along with instrumentation engineering and systems thinking to manage the design of an alarm system to increase its usability. Most often the major usability problem is that t ...
* Artificial intelligence for video surveillance * Biometric device *
Biometrics Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify i ...
* Boundaries of Security Report *
Computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
*
Door security The term door security or door security gate may refer to any of a range of measures used to strengthen doors against door breaching, ram-raiding and lock picking, and prevent crimes such as burglary and home invasions. Door security is used in c ...
* Executive protection * Guard tour patrol system *
Information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...
* Logical security *
Perimeter intrusion detection system A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter of a property, building, or other secured area. A PIDS is typically deployed as part of an ...
* Physical Security Professional * Security alarm *
Security company A private security company (PSC) is a business entity which provides armed or unarmed security services and expertise to clients in the private or public sectors. Overview Private security companies are defined by the U.S. Bureau of Labor Stat ...
* Security convergence * Security engineering * Surveillance * High-voltage transformer fire barriers


References

{{DEFAULTSORT:Physical Security Security Crime prevention Public safety National security Warning systems Security engineering Perimeter security