Understanding Security Basics: A Tutorial on Security Concepts and Technology
|
|
|
- Eileen McKenzie
- 9 years ago
- Views:
Transcription
1 Article Applied Biosafety, 10(1) pp ABSA 2005 Understanding Security Basics: A Tutorial on Security Concepts and Technology Richard Kibbey Science Applications International Corporation, Melbourne, Florida Author s Note This was a presentation at the CDC 8th National Biosafety Symposium, Atlanta, Georgia, Although this article presents an overview of security concepts and systems, you will still need a security expert, either from your own organization or outsourced to a full- or part-time contractor, to review the security plan for your facility. A security expert has the experience to help you implement a security program that covers all the elements of security and allows you to put the right components in place. Our discussion begins by drawing you a mental picture of a probable threat element (PTE). Groups of PTE are located throughout the United States. It should be no surprise that they are plotting operations against us all the time, even today. Consider this scenario: Field members of a terrorist organization meet in Baltimore in December 2002 for an initial meeting. Two of them are from New York City and two are from Fort Worth. Their mission? Steal biological material for a bioterror attack on the U.S. food supply. They meet again in March 2003 at the Black Angus restaurant in Atlanta to discuss target selection. The men decide to conduct preselection operations at three locations: Centers for Disease Control and Prevention in Atlanta, the U.S. Army Medical Research Institute of Infectious Diseases (USAMRIID) in Fort Detrick, Maryland, and Plum Island Animal Disease Center in Long Island, New York. Surveillance on these targets is conducted from April to September of The purpose was to identify weaknesses in security to exploit during their operation. The criteria were to find a location that had poor lighting, weak CCTV cameras/systems, and an inconsistent access control system. They began their surveillance of the CDC in April to June They recorded their s and discovered that there were new alarm systems at the CDC and numerous high-tech television systems strategically located throughout the complex. The site is also patrolled regularly and there were barriers that could hinder movement. Their assessment was that the security components hindered the proposed operation and made it extremely difficult to continue their pre-attack surveillance. In July and August 2003, they conducted a surveillance of the USAMRIID. The tactical information collected revealed similar problems. A large number of uniformed personnel made them very nervous. It just so happened that during their surveillance the USAMRID was conducting an antiterrorism threat exercise, which also made them nervous. Additional security measures made it even more obvious that this site was well protected. There were many lights and security structures. They used barriers during the exercise. There were consistent access control procedures, not only at the building but also in the streets leading up to the building. In addition, there was a visible use of guards and posts. Their assessment was that this location was too difficult. In August through September 2003, they conducted their surveillance on Plum Island. Here they found what they were looking for: Numerous gaps in security, security doors left open for ventilation, 40
2 R. Kibbey Figure 1 Hypothetical Scenario Dec 2002 Four members of HAMAS meet in Baltimore, MD 2 from NYC, NY 2 from Ft Worth, TX Their mission: Steal biological materials that can be used in a bioterror attack on the US food supply? NOTE: Map from the testimony of Steven Emerson 2/24/98 to the senate judiciary subcommittee on terrorism, technology and government information. Figure 2 Hypothetical Headline New Headlines The CDC announced today that a major crisis has developed in the US beef industry Major Outbreaks of Mad Cow Disease Beef industry collapses 41
3 Understanding Security Basics: A Tutorial on Security Concepts and Technology some windows left open overnight, alarms and door sensors not operational, and poor lighting, both interior and exterior to the facilities. The site also had inadequate and broken CCTV equipment and inconsistent access control procedures. As a result, the terrorists selected Plum Island as their target. September through December 2003, they conducted their pre-attack surveillance. In this phase, they discovered a route of ingress based on good terrain and shadows and darkness for their approach. They also found a point of entry a window in one of the buildings that they wanted to access that was left unlocked most evenings. After observing daily operations for a period of time, they selected their target. Note on the slides that they designated points on their maps where they were going to attack and what they were looking for. Early in January 2004, they conducted their operation. One individual remained at the vehicle approximately a half a mile from the site. The other three followed their attack plan and entered the building at a poorly lit window. They made their way to the laboratory and easily gained access by bypassing door alarms by cutting a hole in the drywall. They located several vials of hoof and mouth virus and exited the same way they entered. The entire operation took less than 70 minutes and the whereabouts of the perpetrators and the missing virus is unknown until [Laughter] the CDC announced today that a major crisis has developed in the U.S. beef industry. The situation I described is a hypothetical scenario, but it does have real world consequences if it should ever happen. In fact, the security deficiencies I discussed for the target location were identified in a recent assessment. So, how do you avoid this at your facility? Well, hopefully, I m going to give you at least a direction to go in to get the answers. Consult your trusty, local security expert. This guy may not look like he knows what he is doing, but a properly trained security expert with experience can help you provide your facility with a cost-effective and efficient security program. She or he can help you improve or develop a sound program, and here is how. I look at a security system as having elements. Figure 3 Rings of Security Elements of Security Security 201 Deter Detect Assess Delay Respond Deny Bio Lab What needs protection? Consequences Likelihood Vulnerabilities Fiscal Resources Rings of Security 42
4 R. Kibbey These are rings of security that go around the resource you are trying to protect. Each of these rings is an element of security. Each is supported by security equipment and security procedures that will either deter, detect, or support defeating an adversary by being applied to one or more of the rings of security. These are the components of security. So remember: Components equal electronic equipment, procedures, and processes, and elements are the rings. We are going to discuss those rings right now. The rings are Deter, Detect, Assess, Delay, Respond, and Deny. Everything in security should apply to one of those areas. If it does not, you are spending a lot of money without getting very much help. The first question to ask is What needs protection? What do I have in my facility that needs a security system? Then, after you ve figured out what it is you are trying to protect, you need to know how much of it there is. Is it a cold virus? Is it Ebola? Is it a hoof and mouth virus or something like that? The lower on the risk scale, the less equipment and sophistication you need. The higher on the scale, the more security you are going to need. The amount of security you need will be determined by determining what your threat is, the vulnerabilities that exist in your facilities, the likelihood of an attack, and the consequences should an attack occur at your facility. Deterrence is the prevention of action through a fear of unacceptable consequences, as viewed by the PTE. It is not a physical state. It is a psychological state that your security program gives a perception of, from the outside looking in. If the PTE perceives a risk of being caught, he will usually move on to another target just as in my scenario where they looked at two locations. One was too tough, so they went somewhere else. It s unfortunate in our business that when we are dealing with deterrence we say, Let s keep them away from here and you end up sending them somewhere else. But, if everybody is doing his or her part, you are going to make it very difficult for an adversary to be successful. Detection is the determination and transmission that an event has occurred. The use of technology increases the capability to detect. Ideally, you will detect as far away from the resource as possible. Assessment is the analysis of an event by a person directly onsite or via technology usually today a closed circuit television (CCTV) system. Assessment is necessary to determine the validity of an alarm and an appropriate response. Delay is the ability of physical or psychological barriers to restrict movement. The purpose of delay is to allow time for an appropriate response and to make it undesirable for the perpetrator to continue. Response is the level of reaction required to counter an intrusion. Response forces range from unarmed security guards or staff to local police. At the high end there are dedicated armed response forces like you would expect to be around nuclear storage areas. Denial is the ability to oppose or negate the effects of an overt or covert action. Denial is the final and last chance to defeat an adversary. Now we are going to discuss the components of security. Components of security consist of equipment, policies, and procedures that support each of the previously discussed elements (rings of security). The components consist of clear zones, barriers, lighting, shrouds, locks, electronic security systems, access control systems, guard forces, and operator/owner procedures. A clear zone is usually provides a 30-foot clear zone from the facility or object you want protected. It is void of trash receptacles, dumpsters, ashtrays, brushes, and other objects that could obscure a small bomb or provide cover to an adversary. Barriers are designed to restrict, deny, or channel pedestrian or vehicular traffic, and in most cases, will do the same for potential adversaries. Barriers are not necessarily impenetrable but they do increase the probability of detecting people and vehicles or dissuading them from attempting to illegally access your location. Lighting is a significant deterrent to potential intruders. It enhances visibility for routine patrols and general staff and allows response units to have better visibility. Permanent lighting should provide adequate illumination to entry points, site perimeters, pathways, and parking lots. And you can have lighting that is activated by sensors motion sensors or line sensors that will activate the lights when they are penetrated. These can be activated by timers or operated manually. 43
5 Understanding Security Basics: A Tutorial on Security Concepts and Technology Shrouds are an often-neglected component of security. They support deterrence and delay by providing concealment from chance and direct surveillance. The purpose of a shroud is to limit visibility from unauthorized sources. It can be as simple as darkened windows or curtains or a more complex structure such as walls, coverings, and even shrubbery. Locks come in many shapes and forms, from single hasp locks that you have at your house, to very complex systems. They include standard key locks, combination locks, cipher locks, card access control systems including swipe cards and proximity cards, seals, and biometrics. All of these can be tied into an electronic security system, if desired. Electronic security systems come in three flavors: access control, security surveillance, and intrusion detection. Access control systems include devices designed to limit access to a site, building, room, and containers. They can be very complex systems with biometrics, exchange badge systems, and other electronic devices, or they can be a simple card swipe access system. Security surveillance: The most common surveillance system is the CCTV, which is offered with a variety of capabilities. This is one area that I would caution you on. You will have hundreds if not thousands of vendors telling you, I ve got the camera for you. You need to be extremely cautious regarding what kind of system you buy. When choosing a CCTV system, consider the resolution and the image quality. Do you need color or black and white? Is pan/tilt/zoom capability what you want the camera to do for you? What type of transmission mode do you need? That includes fiber optics, coaxial cables, and wireless. Other considerations include light levels and weather. Intrusion detection systems (IDS) identify unauthorized entry. Usually, they are connected to a monitoring system of some kind and fall into three general categories. (1) A local alarm system, which, when the IDS is breached, sounds an alarm for a local security officer or staff to respond to. (2) 24- hour central stations that are usually commercially operated. When they get an alarm, they contact the local police or a designated security service. (3) Propriety alarm systems are controlled and monitored within the facility. This system usually reports to an onsite security control center and response is provided by an onsite security force or local law enforcement. Intrusion detection systems can be specific right down to a room or a container. They can be simple alarm systems such as ADT home alarms or more sophisticated systems that include CCTV, access verification, and other technology. Intrusion detection systems consist of sensors, which can be motion sensors, glass break sensors, and contact or beam sensors. Transmission components include coaxial cable, fiber optics, and wireless. Most IDS have an alerting system that usually terminates at some kind of monitoring function. Guard forces or response forces need to be considered in your security system. There usually needs to be a good balance between the use of security technology and a properly trained security force or staff that has security response responsibilities. Owner/Operator procedures are the one thing that you have complete control over and won t have to spend very much money on to improve the security of your facility. This is all internal and consists of written procedures and processes that your organization must follow. These procedures translate policies into action for people responsible for carrying out those instructions. Security policies must be backed by well-defined procedures. The next two slides list several policies that you should have in writing at your facilities. In my scenario, I talked about leaving windows open. I worked in several areas in the military where we were supposed to lock up at night, and in the morning we d come in and find windows wide open. It happens all too often. So as a minimum, I recommend that the following written procedures be implemented at your facility: End of day security checks Computer procedures. These are very important to keep your information secure and out of the eyes and hands of somebody who would want to do harm. Access to restricted areas Visitor and contractor procedures Escort requirements Property passes (removal equipment) Parking restrictions Personal and vehicle restrictions 44
6 R. Kibbey Figure 4 Probability of Protection Low Risk High Risk Visual Assessment Tools Partial coverage by fixed CCTV Total coverage by fixed CCTV Above ground Observation towers CCTV w/pan, tilt, zoom Video motion detection, thermal tracking, IR capable Electronic Security Systems Perimeter alarms Perimeter and asset alarms, ID checks Automated access control system Access control system w/biometrics Dual line security systems, exchange badges, container access control Barriers Signs, simple fences, ditches, shrubbery Berms, fence, wall Fence w/cable Fence w/outrigger Bollards, jersey barriers cabled Barrier & fence system plan, ability to engage Structures Stand off distance delineated Walls/roof reinforced, Doors windows ballistic resistant, HVAC filtration capable So far, we ve looked at the six elements of security and numerous components of security. An effective security system will incorporate a security-indepth concept by employing some or all of the elements of security. These must complement one another, be integrated, and work from the resource out to the perimeter of your facility. This will provide you with a solid program that mitigates the level of risk and the vulnerability of your facility. Figures 4 and 5 are a matrix of components and risk levels. These simple matrices illustrate the components of security that you might consider implementing at various risk levels. Left to right, the security components become more complex. You can buy CCTV cameras as cheap as $150 per camera, or you can buy them as expensively as several thousand dollars per camera. For a simple lab that has very little risk and very little consequence of losing sensitive resources, a simple ADT-style, commercial system is probably sufficient. When you get up to facilities that are doing weapons-grade bioresearch, you will need something a lot more complex. The second slide has a few more examples covering some of the elements where you can start at the lower risk level and move your way up. The combination of security components that covered by the elements of security, constitute the level and depth of protection you have at your facility. 45
7 Understanding Security Basics: A Tutorial on Security Concepts and Technology Figure 5 Probability of Protection Low Risk High Risk Locks Warded Disk Wafer Pin tumbler Super pin tumbler Lever, high security lock Shrouds chance direct ground space Total cover to include protection from attack Guard Force Local Law Enforcement Only Unarmed Part Time Unarmed Full Time Armed Part Time Armed Full Time Clear Zones Outer perimeter only Inside and outside outer perimeter Clear zones for all sensor fields Lighted Lighted and alarmed, delineated by type 2 fencing Lighting Handheld lights issued, temp lights during higher threats Building exteriors lighted Sensor or timer activated Gates, and entry points, all clear zones Restricted and critical areas, entire site illuminated 46
Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings
Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over
Physical Security for Drinking Water Facilities
Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland
Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response
Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response International Biological Threat Reduction Department Sandia National Laboratories
Site Security Standards and Strategy
Site Security Standards and Strategy I. Background and Overview A. The City s Program Standards and Procedures (PSP) are intended to be used in conjunction with the data contained in related standards
1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.
2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must
Palm Beach County Sheriff s Office
Palm Beach County Sheriff s Office Business Security Self Survey Since 1909, the deputies of Palm Beach County have provided a safe environment for hundreds of thousands of people who live, work and visit
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism
IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN
IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department
How to Solve the Most Persistent Problem in Perimeter Security Systems
How to Solve the Most Persistent Problem in Perimeter Security Systems Duane Thompson General Manager of Fiber SenSys Carrondo, Antonio Commercial Manager, Teleprinta Perimeter Security Challenging!! More
Guide for Non-Profit Housing Societies Security Guide Table of Contents
Guide for Non-Profit Housing Societies Security Guide Table of Contents Chapter 1 - General Security Guidelines Chapter 2 - Target hardening Chapter 3 - Security window bars Chapter 4 - Anti-Graffiti solutions
MONROE POLICE DEPARTMENT
MONROE POLICE DEPARTMENT 104 Stage Road Monroe, NY 10950 Main: (845) 782-8644 - Fax: (845) 782-2227 A. Alex Melchiorre Website: www.monroepd.org Chief of Police BUSINESS BURGLARY PREVENTION TIPS Is your
File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014)
File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014) Appendix A -- Minimum Security Standards for Level Federal
Security 101 For School Safety. Intertech Associates, Inc. Lunch & Learn
Security 101 For School Safety Intertech Associates, Inc. Lunch & Learn Safe & Secure Educational Environment What type of school is it? What type of security risks do schools see? How can traffic flows,
Physical Security Checklist and Inventory
Tool 1: Assessing Robbery Risk Physical Security Checklist and Inventory Any assessment of robbery risk begins with an evaluation and inventory of the measures you are already taking as a financial institution.
How To Ensure Security At A Site Security Site
Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers
Security Guidelines for. Agricultural distributors
Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole
Physical Security Assessment Form
Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...
ADVANCED SECURITY SOLUTIONS
ADVANCED SECURITY SOLUTIONS HSD - Advanced Security Solutions p. 1-2 Safe Rooms Residential Safe Rooms There is no better comfort than knowing that you are safe and secure in your own home. If you are
Appendix G. Security management plan
Appendix G Security management plan Security Management Plan Prepared by: Kann Finch Group Project Energy Australia Belmore Park Zone 1- Sub-station component General Design Requirements The perimeter
School Security: What are you missing?
School Security: What are you missing? The need to keep our nation s children safe at school has become more urgent than ever. But this also puts pressure on both the school s administrators and its budget.
Surveillance and Security Technologies for Bridges and Tunnels
Surveillance and Security Technologies for Bridges and Tunnels Sheila Rimal Duwadi, P.E., Team Leader Bridge Safety, Reliability and Security, Federal Highway Administration, 6300 Georgetown Pike, McLean
Current as of 11/10/08 1 of 1
BEST PRACTICES STANDARDS FOR SCHOOLS UNDER CONSTRUCTION OR BEING PLANNED FOR CONSTRUCTION I. Site Layout A. School buildings shall be provided with a securable perimeter. A securable perimeter means that
Barrington Hills Police Department
Barrington Hills Police Department Home Security Checklist Use this as a guide as you check your home for safety measures. Boxes marked indicate areas where you could take action to improve your home s
NSW POLICE FORCE. Home Safe
NSW POLICE FORCE Home Safe IS YOUR HOME SECURE? This brochure is intended to provide your household with the latest information regarding home security and break-in prevention. You will learn how to evaluate
Security Criteria for C-TPAT Foreign Manufacturers in English
Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security
Select Agent Program Workshop November 16, 2012. Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC)
Select Agent Program Workshop November 16, 2012 Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC) Revisions to Regulations 11 (a) through 11 (c)(7): (b) and (c)(2) changed
Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland
Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland B. Wieland Swiss Federal Office of Energy, CH 3003 Berne, Switzerland ABSTRACT: The presentation describes the
Guidance Notes FSR 2014
Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a
Middleborough Police Electronic Security Narrative
Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of
UK SBS Physical Security Policy
UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following
Court Security Guidelines
July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
Home Security. What you absolutely must know before purchasing a security system
Home Security What you absolutely must know before purchasing a security system 1 As founder and owner of SHIELD Security Systems, I ve answered hundreds, if not thousands, of questions from homeowners
Protecting your Home Business Future
Eurotech Security Systems plc Protecting your Home Business Future Eurotech has been providing quality security systems and high levels of service for more than 25 years Our business customers vary from
Vindicator Security Solutions EXTEND YOUR SECURITY PERIMETER. Vindicator Radar Detection System
Vindicator Security Solutions EXTEND YOUR SECURITY PERIMETER Vindicator Radar Detection System Extend Your Security Perimeter Many security solutions today are required to provide advanced detection of
"DOT IN-DEPTH HAZMAT SECURITY TRAINING"
PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose
Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.
Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right
Global Supply Chain Security Recommendations
Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed
Home Security Assessment
Home Security Assessment Brought to you by Community Organisations, sports clubs, churches, youth groups and Businesses, get your free webpage HERE. No ifs or buts.its free. 1. Introduction 2. Purpose.
Palm Beach County Sheriff s Office
Palm Beach County Sheriff s Office Home Security Self Survey Since 1909, the deputies of Palm Beach County have provided a safe environment for thousands of people who live, work and visit Palm Beach County.
C-TPAT Importer Security Criteria
C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources
SECURITY CAMERA INSTRUCTION MANUAL ENGLISH VERSION 1.0 LBC5451. www.lorextechnology.com
SECURITY CAMERA INSTRUCTION MANUAL ENGLISH VERSION 1.0 LBC5451 www.lorextechnology.com Contents 1x Camera and mounting stand 1x Power adapter 1x Mounting kit 1x Allen key 1x Screw cap 1x 60 ft. (18m)
UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7
Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section
Car Security Begins at Home
Please print out and complete this form to reduce the risk of car theft happening to you. In Australia, seven in 10 late model vehicles are stolen by the thief gaining access to the vehicles keys or transponder.
View. Select View Managed Video Services ADT
monitoring Access Control Video Surveillance Intrusion Detection Fire & life safety Commercial Solutions ADT SM Select View Managed Video Services Leverage your existing investment in video surveillance
Nuclear Plant Security Systems
Nuclear Plant Security Systems Course Description Gary W Castleberry, PE This course will introduce the student into the design of security systems for commercial nuclear power plants. An overview of plant
CASE STUDY OF INDUSTRIAL ESPIONAGE THROUGH SOCIAL ENGINEERING
CASE STUDY OF INDUSTRIAL ESPIONAGE THROUGH SOCIAL ENGINEERING Ira S. Winkler National Computer Security Association 10 South Courthouse Avenue Carlisle, Pennsylvania 17013 [email protected] (717) 258-1816
Home Security Assessment Checklist DATE
Home Security Assessment Checklist DATE PREFACE The Home Security Assessment Checklist is designed to assist justices, judges, and other court officials in determining their level of security at home.
Thank you for the opportunity and privilege to introduce the services offered by Silver Space Electro Mechanical Works L.L.C.
COMPANY PROFIL Date: 18 th May 2015 Dear Sir/Madam, Thank you for the opportunity and privilege to introduce the services offered by Silver Space Electro Mechanical Works L.L.C. Silver Space Electro Mechanical
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building
Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:
Alarm Systems An intruder alarm system is designed to detect intruder presence at your premises. When detected, a siren will activate and communicate an alarm signal to one of our highly sophisticated
Security Service de Services sécurité. Security Alarm Monitoring Protocol
Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
Chapter 8. EOC Security Concepts and Requirements:
: One of the primary objectives in the design and construction (or retrofit) of an Emergency Operations Center (EOC) is to provide a safe and secure environment that will enable the emergency management
Does a fence or other type physical barrier define the perimeter of the facility?
PHYSCIAL SECURITY SURVEY CHECKLIST PERIMETER BARRIERS TRANSIT FACILITIES Does a fence or other type physical barrier define the perimeter of the facility? (1) Specify type and height of physical barrier
C-TPAT Self-Assessment - Manufacturing & Warehousing
Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name
GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants
Adapted from information provided by the U.S. Department of Agriculture Food Safety and Inspection Service GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants March 2008 BY COMPLETING PAGE
Ten Tips for Completing a Site Security Plan
TRANSPORTATION LOGISTICS PETROCHEMICal Commercial Industrial Retail Federal Systems Banking Ten Tips for Completing a Site Security Plan Introduction The Chemical Facility Anti-Terrorism Standards (CFATS)
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
Risk Management Handbook
Risk Management Handbook 1999 Introduction Risk management is the process of selecting and implementing countermeasures to achieve an acceptable level of risk at an acceptable cost. The analytical risk
How To Protect A Water System
SECURITY OFFICER & PATROL OFFICER PROTOCOL SECURITY OFFICER LOCATIONS AND SHIFTS La Entrada Main Security Center 24 hour coverage 7 days per week Plant 1 Main Gate Monday Friday, 5:00 AM 6:00 PM Patrol
MINIMUM HOME SECURITY
MINIMUM HOME SECURITY The 3 H's of a Secure Home: Hardware, Habits and Humans INSTALL HOME SECURITY HARDWARE Install & maintain deadbolt locks on all exterior doors, including garage service doors. Locks
A Self-Audit of Your Current Campus Security Systems
A Self-Audit of Your Current Campus Security Systems Security Solutions for Education, Business & Public Safety Free Consultations on ID Card Systems, Access Control, Call Recording, Video Surveillance,
Totally Wireless Video Security
Traditional Video Surveillance ($50,000+) vs. Event-Based Videofied Solution ($2,500) Executive Summary: Totally Wireless Video Security has been effective but cost and complexity has limited deployment
GATES, GUARDS, AND GADGETS: AN INTRODUCTION TO THE PHYSICAL SECURITY OF IT
GATES, GUARDS, AND GADGETS: AN INTRODUCTION TO THE PHYSICAL SECURITY OF IT Kai Axford, MBA, CPP, CISSP, ACE Manager, IT Security Services Accretive Solutions [email protected] THIS SESSION
Security Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
Intermec Security Letter of Agreement
Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism
Electronic Security. For Financial Institutions
A partner you can bank on Our bank was growing. New branches. New card processing center. We wanted to tie access control, alarm monitoring and video surveillance into one system we could monitor from
C-TPAT Security Criteria Sea Carriers
C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Where a sea carrier does
Security Alarm Monitoring Protocol
Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or
Cyber Threats in Physical Security Understanding and Mitigating the Risk
Cyber Threats in Physical Security Understanding and Mitigating the Risk Synopsis Over the last few years, many industrial control systems, including security solutions, have adopted digital technology.
2. Employees must wear their ID tag at all times while on the premises.
3. Physical Access Controls Access control must prevent unauthorized entry to facilities, maintain control of employees and visitors and protect company assets. There must be written and verifiable procedures
Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
Best Practices For. Supply Chain Security
Best Practices For Supply Chain Security Document Information Created By: Family Dollar Imports Updated On: 10.21.2015 2 Contents What is C-TPAT? 5 Family Dollar s Distribution Network 6 Distribution Centers
Remote Monitoring offers a comprehensive range of services, which are continually
Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have
WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM
BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade
Protecting datacenters & mission critical facilities - using IP based systems. Presented by: Jeffrey Lam RCDD Director, Global Accts, Asia ANIXTER
Protecting datacenters & mission critical facilities - using IP based systems Presented by: Jeffrey Lam RCDD Director, Global Accts, Asia ANIXTER Agenda Industry drivers Business trends Developing the
Policing requirements for Closed Circuit Television
Policing requirements for Closed Circuit Television 1 Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 2 Closed circuit television (CCTV) systems
A Message for Warehouse Operators And Security Guidelines for Warehouse Operators
A Message for Warehouse Operators And Security Guidelines for Warehouse Operators Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint
Conducting Security System Site Surveys
Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM
A Tennessee airport ramps up safety with Milestone XProtect wireless IP video surveillance
A Tennessee airport ramps up safety with Milestone XProtect wireless IP video surveillance "The corporate accounts have insurance requirements we couldn't meet before our force came on board and this system
Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution
Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution Chances are, you re not just responsible for making sure people get in and out of your facilities.
Seventh Avenue Inc. 1
Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
visit us on the web at: www.strategicsecuritycorp.com
CAMERAS & ALARMS Closed Circuit Television (CCTV) / SMART Home Structured Wiring & Systems Commercial and Residential Alarm Systems / Central Monitoring Integrated Access Control Systems (Proximity Cards,
Hazardous Materials Transportation Security Planning
Objectives To better understand security threats; To detail new security requirements; and To provide guidance and resources to assist in developing and adhering to a security plan. PART I Understanding
Physical Security to mitigate Social Engineering Risks
2013 Cl iftonlar Physical Security to mitigate Social Engineering Risks cliftonlarsonallen.com Agenda Background and statistics of physical security Address social engineering risks associated with deficiencies
FACILITY SECURITY CERTIFICATION FORM DOJ SECURITY LEVEL II
FACILITY SECURITY CERTIFICATION FORM DOJ SECURITY LEVEL II AGENCY: FACILITY: ADDRESS: LEASED/OWNED: UPGRADE COSTS: REVIEW TEAM: REVIEW DATE: FACILITY POC: CERTIFIED Y/N: I. PERIMETER SECURITY A.. PARKING
Statement of objective MALLS & MULTIPLEXES
//1// Statement of objective Security is an important factor today and in establishments that have large numbers of people visiting; it is necessary that they have a basic infrastructure of security. With
FRONTIER PITTS Datacentre Protection
FRONTIER PITTS Introduction Bespoke protection for Data and Cash Centres Frontier Pitts secure various Data Centres and Cash Centres in the UK and around the World, with a variety of equipment from both
