1st Edition
The Complete Guide to Physical Security
To adequately protect an organization, physical security must go beyond the "gates, guns, and guards" mentality that characterizes most security programs. Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. The Complete Guide to Physical Security discusses the assets of a facility—people, building, and location—and the various means to protect them. It emphasizes the marriage of technology and physical hardware to help those tasked with protecting these assets to operate successfully in the ever-changing world of security.
The book covers specific physical security technologies, such as intrusion detection, access control, and video surveillance systems—including networked video. It addresses the reasoning behind installations, how to work with contractors, and how to develop a central station for monitoring. It also discusses government regulations for building secured facilities and SCIFs (Sensitive Compartmented Information Facilities). Case examples demonstrate the alignment of security program management techniques with not only the core physical security elements and technologies but also operational security practices.
The authors of this book have nearly 50 years combined experience in the security industry—including the physical security and security management arenas. Their insights provide the foundation for security professionals to develop a comprehensive approach to achieving physical security requirements while also establishing leadership roles that help further the overall mission of their organization.
Physical Security Planning
Setting the Stage
Site Planning
Reviewing the Physical Design
Vulnerability Assessments
The Security Survey
Vulnerability Assessment
Developing a Vulnerability Assessment
Understanding the Threats
Making Adjustments
Security Design and Planning
Security Planning and Evaluation
Security Design Concepts
Security Technologies
EASI Model
Adversary Sequence Diagram
Working with Architects
Working with Contractors
Construction Review
Security Construction Projects
New Construction
Initial Point of Access
Roadway Design
Parking
Loading Docks
Signage
Retrofitting
Protection in Depth
Protection-in-Depth Concepts
Protection Plans
Evacuation Drills
Incident Response
Penetration Tests
Access Control Violation Monitoring
Perimeter Protection
Crime Prevention through Environmental Design (CPTED)
Protecting with CPTED Concepts
Barriers
Lighting
Access Control
Access Control
Anti-Passback
Access Control Head End
Turnstiles and Mantraps
Physical Protection Systems
Doors
Windows
Interior Intrusion Detection Systems
Perimeter Intrusion Detection Systems
CCTV and IP Video
The Essential Guide to Video Surveillance
Video Surveillance Use Cases
Video Surveillance System Classifications
Image Capture Video Sources—Cameras
Lenses
Lighting
HDTV
Recording Systems
Video Management Systems
Video Control, Analysis, and Video Content Analysis Systems
Using a Step-by-Step Approach to System Selection and Deployment
Upgrade Path
Manpower and Video Surveillance
Privacy and Legal Considerations—Video Surveillance Checklist
The Future of Video Surveillance
Keys, Locks, and Safes
Keys, Locks, and Safes
Developing a Master Locking System
Safes
Vaults
Containers
Biometrics
What Is Biometrics?
Multibiometric Systems
Deploying Biometrics
Privacy
Biometric Metrics
Attacks on Biometric Systems and Their Remedies
Security Guard Force
Establishing a Security Guard Force
Mission and Duties of the Security Guard Force
Profile of the Facility to Be Protected
Proprietary Security Guard Force
Contract Security Guard Force
Hybrid Force
Security Guard Uniforms
Security Guard Identification
Security Guard as an Authority Figure
Security Guard Protective Equipment
Security Guard Training
Professional Security Certifications
Personnel Issues
Central Station Design
Developing an Operation
Design Requirements
Secondary Amenities for an Operations Control Center
Alarm Assessment
Government Security
SCIF
Location
Design
Sound Masking
TEMPEST
Shielding
Filtering
Access
Security Alarm Requirements
Open Storage
Closed Storage
Dealing with Contractors
Appendix A: Fixed Facility Checklist
Financial Institutions and Banks
Vaults
Safes
ATMs
Night Depositories
Teller Cash Recyclers
Dye Packs
Barriers
Ambush Features
Video Systems
Holdup Alarms
Bank Guards
Data Center Protection
Data Centers
Fire Protection
Fire Detection/Alerting
Fire Suppression
Total System Cost
Determining Total System Cost
System Design Cost
System Installation Cost
System Operational Cost
IT-Related Cost
Maintenance Cost
Replacement Cost
Cost-Benefit Analysis
Cost of Loss
Cost of Prevention
Return on Investment
Cost Factors
Security Master Plan
Security Master Plan Strategy
Engaging the Stakeholders
What Should Your Security Philosophies Be?
Technology Migration Strategy
Equipment Replacement Schedules
Security Foresight
Strategic Foresight
Foresight Techniques
Security Leadership
What Is Leadership?
Purpose of Leadership
Effective Leadership
Why Security Leaders Are Important
Understanding the Basics
Are Leaders Born or Made?
Good Leadership
Bad Leadership
Going from Bad to Good
Forging the Future
New Definitions for Leaders in the Twenty-First Century
Index
Biography
Dr. Paul R. Baker began his security career in the U.S. Marine Corps as a military policeman. Upon discharge, he joined the Maryland State Police and worked in all phases of law enforcement, spending the majority of his career in the intelligence and narcotics areas. Upon retirement in 2001, he began the security management phase of his journey, working for the MITRE Corporation, Institute for Defense Analysis, Capital One Bank, and, finally, with the RAND Corporation.
Dr. Baker is board certified in security management as a certified protection professional (CPP) by ASIS (American Society for Industrial Security) International. He is an adjunct professor for University of Maryland University College in the homeland security field and an adjunct professor for Southwestern College in its security management curriculum. He is a contributor to the CRC Press books Official (ISC)2® Guide to the CISSP® CBK®, Second Edition and Official (ISC)2 Guide to the ISSAP CBK.
Dr. Daniel J. Benny
is the security discipline chair at Embry-Riddle Aeronautical University. He served as a U.S. Navy intelligence officer and DOD Federal Police Chief and holds a Ph.D. in Criminal Justice from Capella University. He is board-certified in security management as a certified protection professional (CPP) and board-certified as a professional certified investigator (PCI)—both by ASIS International; certified fraud examiner (CFE) by the Association of Certified Fraud Examiners; certified confidentiality officer (CCO) by the Business Espionage Controls and Countermeasures Association; certified member (CM) airport certified employee-security (ACE); and airport security coordinator by the American Association of Airport Executives.Dr. Benny is the author of the CRC Press books General Aviation Security: Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports; Cultural Property Security: Protecting Museums, Historic Sites, Archives, and Libraries; and the forthcoming book, Industrial Espionage: Developing a Counterespionage Program Security. He has authored over 300 articles on security administration, intelligence, aviation security, private investigation, and cultural property security topics.
"There is much to like about this book with its definitions as well as the logical progression through the chapters on how to develop a physical security program … it is a good introduction to physical security concepts."
– ASIS Dynamics'For manufacturing readers wondering how truly safe their operations are, or how safe they could be, this volume is a great starting point.' --Blue Heron Journal