Skip to main content

2021 | OriginalPaper | Buchkapitel

9. Physical Security

verfasst von : Jim Seaman

Erschienen in: Protective Security

Verlag: Apress

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

There is often a misconception within the industry as to what constitutes an effective Physical Security strategy, and individuals may perceive effective Physical Security as being likened to that of a prison (with the high thick walls marking the perimeter). However, as you can see from Sun Tzu’s 512 BC quote, the opposite provides effective Physical Security defensive measures.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Sunzi (2014). The art of war. New York: Black & White Classics.
 
4
Extract from the Defence Manual of Security (JSP 440) (http://wla.1-s.es/uk-mod-jsp-440-2001.pdf).
 
5
Watson, G., Mason, A.G. and Ackroyd, R. (2014). Social engineering penetration testing : executing social engineering pen tests, assessments and defense. Amsterdam ; Boston: Syngress, An Imprint Of Elsevier.
 
10
A Class 2 fence is an anti-intruder fence which offers a degree of resistance to climbing and breaching by an opportunist intruder not having particular skills and using material and breaching items that are readily to hand.
 
11
Security lighting can offer a high degree of deterrence to a potential intruder in addition to providing the illumination necessary for effective surveillance either directly by the guards or indirectly through a CCTV system. The standard of lighting is to meet the minimum requirement and its installation be appropriate to the site conditions.
 
12
These are SECURITY containers which are
(1) Of substantial design and construction
(2) Offer resistance to the casual or opportunist attacker who has not been prepared for the attack and only has use of items that are readily to hand
 
14
There should be only one entrance in Type A Secure Room, but if emergency exits are necessary, they must be fitted with approved doors and emergency exit devices and be wired into any installed intrusion detection system.
Windows are not permitted. Air vents and ducts must be fitted with steel grilles or bar sets. Protectively marked material may be held on open racking or in non-SEAP approved containers in a Type A Secure Room. A lightweight version of the Type A Secure Room is available for use when the standard structure is too heavy for the building.
Specification:
a. Walls – 150mm (min) reinforced concrete or in existing buildings, 340mm solid brick, cement rendered on both sides
b. Floor and roof – 150mm solid reinforced concrete
c. Door – Oxford or Cambridge door
d. Lock – Medway Locking unit or Fraser Bar, for emergency exits
 
15
These are MEDIUM SECURITY locks which have a high degree of resistance to expert and professional attack using skills and resources that are available commercially to a professional locksmith.
 
16
A building which
(1) Offers a degree of resistance to a forced attack
(2) Is of solid construction, normally brick or block, on cavity wall principles
(3) Has windows and doors of a standard equal to that of the building in its resistance to a forced attack
Modern building techniques of precast or fabricated panels or steel frame and glass may also rate Class 3.
 
17
A Class 1 entry control system is one based on a locked door with access allowed by either
(1) A mechanical or stand-alone electronic push-button code lock (PBCL)
(2) The issue of keys to “authorized key holders”
 
18
Visitors who are required to be escorted within a protected area are always accompanied by an appointed escort or by personnel they are visiting. If they need to visit several different departments or other members of staff, they are to be formally handed over from one escort to the next with, if required, the visitor’s pass being annotated accordingly.
 
19
Internal random patrols at intervals not exceeding 6 hours allow for two or three patrols during the night and periodic security checks during a weekend or holiday period. The first patrol is to normally take place soon after cease work and is to be concerned with checking that the site or building is properly secure. Patrol routes are to be varied so that the timing and location of the guard cannot be predicted.
 
20
A Class 2 alarm system is one which
(1) Is used in premises where the security risks of a sophisticated attack are not high.
(2) Intruders are expected to have a limited knowledge of alarm systems and have available only basic tools and portable instruments.
 
21
A Class 2 fence is an anti-intruder fence which offers a degree of resistance to climbing and breaching by an opportunist intruder not having particular skills and using material and breaching items that are readily to hand.
 
22
The compromise of SECRET information or material would be likely to raise international tension; to damage seriously relations with friendly governments; to threaten life directly, or seriously prejudice public order, or individual security or liberty; to cause serious damage to the operational effectiveness or security of UK or allied forces or the continuing effectiveness of highly valuable security or intelligence operations; to cause substantial material damage to national finances or economic and commercial interests.
 
23
The compromise of CONFIDENTIAL information or material would be likely to materially damage diplomatic relations (i.e., cause formal protest or other sanction); to prejudice individual security or liberty; to cause damage to the operational effectiveness or security of UK or allied forces or the effectiveness of valuable security or intelligence operations; to work substantially against national finances or economic and commercial interests; substantially to undermine the financial viability of major organizations; to impede the investigation or facilitate the commission of serious crime; to impede seriously the development or operation of major government policies; and to shut down or otherwise substantially disrupt significant national operations.
 
33
A designated location in an operational area used as a base for supply and evacuation by air.
 
38
By The joy of all things – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=57363538
 
46
It is important to note that, at this point, I still had not engaged with any potential suppliers.
 
Metadaten
Titel
Physical Security
verfasst von
Jim Seaman
Copyright-Jahr
2021
Verlag
Apress
DOI
https://doi.org/10.1007/978-1-4842-6908-4_9