To adequately protect an organization, physical security must go beyond the "gates, guns, and guards" mentality that characterizes most security programs. Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. The Complete Guide to Physical Security discusses the assets of a facility—people, building, and location—and the various means to protect them. It emphasizes the marriage of technology and physical hardware to help those tasked with protecting these assets to operate successfully in the ever-changing world of security.
The book covers specific physical security technologies, such as intrusion detection, access control, and video surveillance systems—including networked video. It addresses the reasoning behind installations, how to work with contractors, and how to develop a central station for monitoring. It also discusses government regulations for building secured facilities and SCIFs (Sensitive Compartmented Information Facilities). Case examples demonstrate the alignment of security program management techniques with not only the core physical security elements and technologies but also operational security practices.
The authors of this book have nearly 50 years combined experience in the security industry—including the physical security and security management arenas. Their insights provide the foundation for security professionals to develop a comprehensive approach to achieving physical security requirements while also establishing leadership roles that help further the overall mission of their organization.
Table of Contents
Physical Security Planning
Setting the Stage
Reviewing the Physical Design
The Security Survey
Developing a Vulnerability Assessment
Understanding the Threats
Security Design and Planning
Security Planning and Evaluation
Security Design Concepts
Adversary Sequence Diagram
Working with Architects
Working with Contractors
Security Construction Projects
Initial Point of Access
Protection in Depth
Access Control Violation Monitoring
Crime Prevention through Environmental Design (CPTED)
Protecting with CPTED Concepts
Access Control Head End
Turnstiles and Mantraps
Physical Protection Systems
Interior Intrusion Detection Systems
Perimeter Intrusion Detection Systems
CCTV and IP Video
The Essential Guide to Video Surveillance
Video Surveillance Use Cases
Video Surveillance System Classifications
Image Capture Video Sources—Cameras
Video Management Systems
Video Control, Analysis, and Video Content Analysis Systems
Using a Step-by-Step Approach to System Selection and Deployment
Manpower and Video Surveillance
Privacy and Legal Considerations—Video Surveillance Checklist
The Future of Video Surveillance
Keys, Locks, and Safes
Keys, Locks, and Safes
Developing a Master Locking System
What Is Biometrics?
Attacks on Biometric Systems and Their Remedies
Security Guard Force
Establishing a Security Guard Force
Mission and Duties of the Security Guard Force
Profile of the Facility to Be Protected
Proprietary Security Guard Force
Contract Security Guard Force
Security Guard Uniforms
Security Guard Identification
Security Guard as an Authority Figure
Security Guard Protective Equipment
Security Guard Training
Professional Security Certifications
Central Station Design
Developing an Operation
Secondary Amenities for an Operations Control Center
Security Alarm Requirements
Dealing with Contractors
Appendix A: Fixed Facility Checklist
Financial Institutions and Banks
Teller Cash Recyclers
Data Center Protection
Total System Cost
Determining Total System Cost
System Design Cost
System Installation Cost
System Operational Cost
Cost of Loss
Cost of Prevention
Return on Investment
Security Master Plan
Security Master Plan Strategy
Engaging the Stakeholders
What Should Your Security Philosophies Be?
Technology Migration Strategy
Equipment Replacement Schedules
What Is Leadership?
Purpose of Leadership
Why Security Leaders Are Important
Understanding the Basics
Are Leaders Born or Made?
Going from Bad to Good
Forging the Future
New Definitions for Leaders in the Twenty-First Century
Dr. Paul R. Baker began his security career in the U.S. Marine Corps as a military policeman. Upon discharge, he joined the Maryland State Police and worked in all phases of law enforcement, spending the majority of his career in the intelligence and narcotics areas. Upon retirement in 2001, he began the security management phase of his journey, working for the MITRE Corporation, Institute for Defense Analysis, Capital One Bank, and, finally, with the RAND Corporation.
Dr. Baker is board certified in security management as a certified protection professional (CPP) by ASIS (American Society for Industrial Security) International. He is an adjunct professor for University of Maryland University College in the homeland security field and an adjunct professor for Southwestern College in its security management curriculum. He is a contributor to the CRC Press books Official (ISC)2® Guide to the CISSP® CBK®, Second Edition and Official (ISC)2 Guide to the ISSAP CBK.
Dr. Daniel J. Bennyis the security discipline chair at Embry-Riddle Aeronautical University. He served as a U.S. Navy intelligence officer and DOD Federal Police Chief and holds a Ph.D. in Criminal Justice from Capella University. He is board-certified in security management as a certified protection professional (CPP) and board-certified as a professional certified investigator (PCI)—both by ASIS International; certified fraud examiner (CFE) by the Association of Certified Fraud Examiners; certified confidentiality officer (CCO) by the Business Espionage Controls and Countermeasures Association; certified member (CM) airport certified employee-security (ACE); and airport security coordinator by the American Association of Airport Executives.
Dr. Benny is the author of the CRC Press books General Aviation Security: Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports; Cultural Property Security: Protecting Museums, Historic Sites, Archives, and Libraries; and the forthcoming book, Industrial Espionage: Developing a Counterespionage Program Security. He has authored over 300 articles on security administration, intelligence, aviation security, private investigation, and cultural property security topics.
"There is much to like about this book with its definitions as well as the logical progression through the chapters on how to develop a physical security program … it is a good introduction to physical security concepts."
– ASIS Dynamics
'For manufacturing readers wondering how truly safe their operations are, or how safe they could be, this volume is a great starting point.' --Blue Heron Journal