Title: CPP Study Course
1CPP Study Course
Protection of Assets Manual Physical
Security Part 1 Presented By Mark
Bavousett Director of Design and
Engineering Secure Concepts International
2Barriers
- Have Security in depth
- Layers of security to delay and deter Natural
- Water
- Mountains
- Marshes
- Deserts
- Other Terrain difficult to traverse
3Barriers (Cont.)
- Structural Barrier physically and
psychologically deters or discourages the
undetermined, delays the determined, and channels
the flow of the traffic through entrances.
4Barriers (Cont.)
- Structural Barriers
- Building Surfaces
- Roofs, Floors and Walls
- Building Openings
- Doors
- Windows
- Drives
- Grills
- Utilities into and out of area
- Metal, including drawn wire
- Masonry
5Barriers (Cont.)
- Glass
- Electrically Conductive Glass
- Rough or patterned Glass
- Mirrors and Transparent Mirrors
- Tempered Glass
- Laminated Glass
- Bullet-Resisting Glass
- Wired Glass
- Acrylic Glass (Plexiglas) (polycarbonate)
6Perimeter Barriers
- Perimeter Barriers
- Chain Link Fencing
- Outriggers
- Privacy slats
- Barbed Wire
- Concertina Wire
- Barbed Tape
- Expanded Metal and Welded wire Fabric
7Locking
- Mechanical Lock
- Warded Lock
- Lever Locks
- Pin Tumbler Lock
- Interlocking Pins
- Multiple Axes Tumblers
- Wafer Tumbler
- Key Accountability
- The use of a single Grand Master combination for
any mechanical locking system is not a sound
security practice. - Electromagnetic Lock
- Electro-Mechanical Locks (breakaway strikes)
- Electronic Lock (Crash bars)
- Dial Type Combination Locks (Safe Locks)
8Alarm sensors
- Alarm sensors
- Perimeter or point of entry
- Area
- Object
- Or
- Electro-mechanical
- Foil
- Switches
- Wire and Screen Detectors
- Pressure Mats
9Alarm sensors (Cont.)
- Sound wave-Microwave
- Ultrasonic Detectors
- Capacitance (Safe Detection Mainly)
- Vibration (Typically installed inside of safe or
controlled areas.) - Audio (Glass break detectors)
- Light (Infra-red Beam detectors)
- Other
- Pressure
- Thermal
- Chemical
-
10Sensor Integration
- Types of Systems
- Local Alarm
- Central Station
- Direct Connection
- Proprietary
11Engineering Design
- Protection Improvement
- Patrol Reduction
- CCTV and Personal Reduction
- The Automated Security System
- Centrally- Controlled Systems
- Control Center Equipment
- Costs
- Personnel Control
- Identification
- Access
- Monitoring Sensors
- Supervision of Protection Personnel
- Time and Attendance Recording
- Programming the Computer
12Engineering Design (Cont.)
- System Expansion
- The Control Center
- Emergency Power
- Standby Power
- Continuous Power
- The System Design Task
- System Objective
- System and Subsystem Task Relationship
- The Vulnerabilities Analysis
- Determination of Functional Countermeasures
- Countermeasures Network Relationships
- Subsystem Importance
- Complete Functional Statement
13Engineering Design (Cont.)
- Development of a Complete Functional
Specification - Elements of a Typical Functional Specification
- General Requirements
- Bid or Cost Proposal
- Relevant Standards
- Subsystem Description
- Summaries of Devices
- Alternate Approaches
- Evaluation of Proposals Responsive to Functional
Specification - Selection of the Supplier and Negotiation of the
System Contract
14Communications
- Line Protection
- Wire Transmission of Alarm and Audio Signals
- Loop
- Point to Point
- Multiplexing
- Optical Fiber
- Video Transmission by Wire
- Radio
- Radio-Telephone
- Cellular Telephone
- Radio Interference
- Microwave Transmissions
- Light
- Interconnection
- Communication Security
15Communications (Cont.)
- Scramblers
- Frequency inverters
- Bandsplitters
- Rolling Bandsplitters
- Frequency or Phase Modulators
- Masking
- Vocoder
- Rolling Codes
- Digital Coding and Encryption
16Identification
- To include or exclude someone or something from a
group (employee, police officer , welfare
recipient) - To grant or Deny admittance
- To Issue or Withhold material or information
- To permit, Deny or qualify in some way a privilege
17Identification (Cont.)
- Security Applications of Access Control
- Permit or deny entrance to or presence in a given
place. - Increase or reduce the rate or density of
movement to, from or with in a defined place. - Protect persons, materials, or information
against unauthorized observation or removal. - Prevent injury to persons or damage to things.
- Performance Requirements
- It is valid.
- It is reliable
- It is easy to use.
- It should be resistive to surreptitious
substitution or counterfeiting. - It should be rugged and long-lived.
18Identification (Cont.)
- Performance Criteria
- It should be physical adequate.
- It should be valid and reliable
- If mechanical or electro-mechanical, it should be
easily maintained. - Manual Access Control Systems
- Personal Recognition
- Prior Familiarity
- Opportunity to observe
- Frequency of observation
- Verifiable Authorization
- Controllable
19Identification (Cont.)
- Document Criteria
- Obviously distinctive
- Resistive to surreptitious changes
- Watermark
- Laminate the document.
- Holograms
- Document Criteria Cont.)
- Unique to the authorized holder
- Photograph
- Description of holder
- Positive if coded or access
- Adaptable for display wearing.
- Of limited valid period.
20Access Control
- Automated Personnel Identification and Control
- A device or artifact which can be possessed, such
as a key or coded card - Information which can be remembered, such as a
personal identification number (PIN) and/or - A uniquely personal characteristic, such as a
fingerprint, voice pattern, signature
characteristics or retinal vascular pattern - the
biometric approach.
21Access Control (Cont.)
- Coded Card System Elements
- The card or token.
- The sensing or point of entry device.
- The control processor
- The communications links between those twoand
- The local or central database.
22Access Control (Cont.)
- Magnetic Stripe
- ANSI/ ISO 7810 and 7811/2
- Track 1 used by International Air Traffic
Association (IATA) - Track 2 used By American Bankers Association
(ABA) - Coercivity
- 300 oersteds (early card system usually)
- 4000 oersteds
- Encoded data is read when the card is passed over
the reader head. - Insertion reader
- Swipe reader
- Watermark (usually on Track 3 or 4)
23Access Control (Cont.)
- Magnetic Matrix
- Advantages
- Cards and readers are relatively inexpensive
- Card codes are user changeable.
- The card life is fairly long.
- There is a low read error rate
- Disadvantages
- Cards can be duplicated.
- Interference from other magnetic energy fields
may occur.
24Access Control (Cont..)
- Optical Matrix (Transparent Bar Code)
- Advantages
- Low cost
- Difficult to counterfeit
- A low read error rate.
- Avoidance of electromagnetic interference.
- A relatively long life for the card and reader.
- Disadvantages
- Cannot be user coded
- Vulnerable to obscuring markings on card or
dirt/dust in reader
25Access Control (Cont..)
- Hollerith Code (Hole Pattern)
- Advantages
- very inexpensive
- Large coding capacity
- No read errors
- Not vulnerable to electromagnetic interference
- Disadvantages
- Codes not user changeable
- Easy to duplicate
- Short card life
26Access Control (Cont..)
- Electrical Matrix
- Advantages
- None
- Disadvantages
- Not durable
- Easily Decoded
- Not user Changeable
- Bulky
27Access Control (Cont..)
- Capacitance Code
- Advantages
- Difficult to read or counterfeit
- Low cost
- Disadvantages
- User cannot change codes
- Limited data carrying capacity
28Access Control (Cont..)
- Proximity Code
- Advantages
- Hands-free operation
- Low maintenance
- Difficult to decode or counterfeit
- Disadvantages
- Limited data coding capability.
- Bulky
- Substantially higher cost per card
- Codes are not user changeable
29Access Control (Cont..)
- Wiegand Coding
- Advantages
- Highly secure and resistive to alteration or
counterfeiting. - Durable cards.
- Not vulnerable to radio frequency or
electromagnetic interference. - Disadvantages
- Cards are expensive
- Codes not user changeable
30Access Control (Cont..)
- Bar Coding
- Advantages
- Inexpensive
- Cards and readers have long live
- A large amount of data can be coded
- A low error rate
- Disadvantages
- Can be easily decoded and reproduced
31Access Control (Cont..)
- BioMetric Access
- Fingerprint Identification
- Speech Identification
- Hand Geometry
- Handwriting
- Retinal Scan
- Detection of Weapons and Metal
- Metal Detectors
- X-ray Detectors
- Detection of Explosives
- Vapor Trace Detection
- Electron Detection
32Parking and Traffic Control
- Vehicular Access
- Driveways and Ramps
- Vehicle Checkpoints
- Locally Operated
- Remotely Operated
- Signs and Placards
- On-Premises Vehicle Safety
- Vehicle Identification and Registration
- Identifying Employee Vehicles
- Identifying Delivery Vehicles
- Identifying General Visitors
- The Goal - All Vehicles Identified
33Parking and Traffic Control (Cont..)
- It is suggested that as many vehicles as
possible be assigned general parking
authorization and as few as possible be given
reserved parking. - General On-Premises Parking
- Lot Layout
- Smaller-than-Standard Cars
- Larger-than-Standard Vehicles
- Reserved On-Premises Parking
- Lot or Area Control
- General Areas
- Oversubscription
- Mechanized Control
- Differential Counter
- Visitor Parking
34Parking and Traffic Control (Cont..)
- Violations and Sanctions
- Parking Area Censuses
- Personal Safety (Emergency Stations)
35Sample Exam Questions
36The degree of protection desired in any
installation is predicated upon an analysis of
the following two factors
- A. Cost and environmental conditions
- B. Criticality and vulnerability
- C. Cost and vulnerability
- D. Cost and Criticality
37Excluding the top guard, standard barbed wire
fencing intended to prevent human trespassing
should not be less than
- A. 7 Feet High
- B. 6 Feet High
- C. 10 Feet High
- D. 8 Feet High
38Which of the following is not true with regard to
lock and key systems?
- A. The lock is the most accepted and widely used
security device of the basic safeguards in
protecting installations. - B. The locking system should be backed up with
other security. - C. A high-quality, pick-proof lock is considered
a positive bar to entry. - D. Most key locks can be picked by an expert in a
few minutes
39The symbol TRTL indicates
- A. Safe is resistant to torches
- B. Safe is resistant to tools
- C. Safe is resistant to both torches and tools
- D. Nothing pertaining to torches or tools
40The type of sensor which is not influenced by
exterior noise which reacts only to movement
with in a protected area and which can be
adjusted so the movement of air caused by fire
will activate an alarm is known as
- A. Proximity detector
- B. Ultrasonic sensor
- C. Electro-mechanical sensor
- D. Audio sensor