ebook img

Security for business professionals : how to plan, implement, and manage your company's security program PDF

239 Pages·2014·1.07 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security for business professionals : how to plan, implement, and manage your company's security program

110 OFESSIONALSUSINESS PRSECURITY FOR B Entry Control Points Base Perimeter Flightline Entry Points Aircraft Parking Area Flightline Area FIGURE 6.1 Example of security layers and defense in depth on a military installation. that anyone entering the installation meets the necessary erquirements. The perim - eter fenc,e although fencing is not perfect security yb any means, at least prvoides a cleard elineationo ft hee xteriorb oundaryo ft heb asea ndw illn ormallyb ep ostedw ith warning signs to identify that the property belongs to the gvoernment.T he number of access points into the installation is minimized along the perimeter where there are entry gates that allwo people and vehicles to enter and exit the basTe.h ese entry gates are manned yb security personnel who check identification and authorization of per - sonnelp riort oa llwoinga ccesso ntot hei nstallationi tselTfh.es econdl ayero fs ecur, ity shwon in y,e llswourrounds the flight line and runway areas in order to limit access to locations where the aircraft are parked. Access to these areas is limited and traffic is funneled through the use of barriers, fencing, and buildings(cid:151)the buildings also have thea ddedb enefitt ol imitv isibilityo ft hef lightl inea reaf romo therp ortionsw ithint he installation. Similar to entry onto the base, entry to the flight line area has a minimum number of entry control points that are under the observation of aircraft maintenance personnel, and security patrols that are dedicated to the flight line. The final layer of secur, ityshwon in red, surrounds the aircraft parking area itself through the use of marked boundaries, wheer additional security patrols that are solely responsible to protect the aircraft aer located. ithin Wthis , examplee wed vmoom frthe perimeter of the otected prea ard inwarulti - mately to the critical ces esourrthat e arof primary concern. As e wlook at the arvious ough these e laythrve will , mowal sectionser erthe next vseves ophysical security measur - ers in a similar fashion: king worour way om frthe exterior ving , of moa facility(cid:146)s operprty Chapter 6ecurity hysical S (cid:127) P 111 ds inward wartothe interior of the building, and ultimately eaching rthe eas arwith the e ith this in mind, wW. cesesourhighest securganization(cid:146)s ity cras they contain an oritical r .es placed at the peroperimeter of the prtywill begin with physical security measur 6.2 Perimeter Security Measures As discussed in the , exampleperimeter security es measurnot only attempt to hinder access to the facility and , its but operprtyalso help to define our yfacility(cid:146)s physical lim - . itsThese limits can include eas arthat e arnecessary for the activity of the , facilitysuch as , ehouseswarage storand loading , easarmultiple , facilitiesking par, esstructurand any common eas arwithin the compound. t Iis important to emember rthat any perimeter security e measurcannot stop all access onto , our yit operprtyerev; has wal erhosevother .e will discussantages that wuses and adv n Iaddition to vidinpogr a clear delineation of oyur facility(cid:146)s , porpertythese security vide porcan oyu weh ereaasr to funneled e arvehicles and individuals enes uralso meaessu r weha,imgts cetsreeheooherc tnfec use ur riaviftnituydsyn i dbaimleinttyadliss cussi end useeefxmutel rly e arpoicnhtoTskh ee se poi.cn h(cid:151)toeusksseti anbgal 2nCi dhs ahpitnegr in that they limit the number of eaasr that w allaoccess to , thaen d fatchiulsi tyminimie z the costs to place obseravtion devices along the exterior of the facility y bonly needing to concentarte on these primary entry poi.n tsTeh ere aralso seavelr types of perimete r barriers that can stop a vehicle form apporaching the , facilitywhich portects against a vehicle-bornee xplosieveta ht(r asw asu sedi nt hekO lahomaC ,im toysb tombing).L astly perimetesre curitmyes ae,uss cafuhser nvcieadtsnweho da ep lpo pl,ros rtunittcyol early identify the porperty thorugh the use of warning signs or notifications announcing tha t motiavtead stop npoortbA awslbiitllghylno augg.eh pprorpeiravitset yeaea nrclotsheed intruder form gaining access to oyur location, a clear delineation and notification along oyur porperty boundaries can deter some individuals and make it easier to stop others who may suddenly wish toe actre porblems simply because theye aprassing thorugh th e Theseea a.br oundaries also clearly highlight individuals who attempt to access the facil - ity without authorization(cid:151)it is much em ordifficult for an alleged perpetartor to justify why they cut thorugh a fence when attempting a eabkr in than if teh ere arno perimeter security meaessu rto portect oyur . , porpertyLastlysignage and the clear delineation o f oyur facility boundary y bsome type of barrier can also help to ver cooyur ogranization form liability iss.ues eTe h saeerrvearl difefnetr types of perimeter security meaessu trhat can be used, and is a major factor to consider when oyu e arlooking at what type wokrs for oyur porperty and what type of iemspsrion oyu wish to convey to the public and oyur potential cus - tom.e rsn Iother d,ws ormost facilities have some type of security meeas urto define its , boundarybut what type of barrier should oyu use based upon oyur business and level of securityTe eh o yeeuarqem ru?ari nry oapttuai.rlo nNsbarriers such as berm,s ditche, s mabnamotrafymrd paeen siy e er s arteh erours edb,e cwsaatnloa lnnsedfw eaae,tts eurr to include fencing and wa.l lsanMy of these perimeter security meeassu rcan vide por a 112 OFESSIONALSUSINESS PRSECURITY FOR B avstly difefnetr iemspsrion to the public although still meeting the need tvoi de porsome type of obstacle onto oyur porperty(cid:151)an atatcrtive pond videspo rthe same esulrt as a fence topped with aorzr ew(cid:151)ibrut these options portary a avstly difefnetr persona. t Iis up to each company and its unique personality to determine what solution wokrs best for their busi.ness 6.2.1 Natural Barriers t aht erutaef evitcartta na yllamron era taht serutaef lacihpargopot fo tsisnoc sreirrab larutaN atsbo ,noitategev ,niarret edulcni sreirrab esehT .ryadnuob s(cid:146)ytilicaf ruoy ot ssecca yned llits - l aruta no tegatnavd asuoivb oehT .serutae freta wdn a,).ct e,slla w,senot s,skco rs ahcus (selc l lits hguohtla ytilicaf ruoy ot ecnaraeppa citehtsea dna gnikirts a edivorp yeht taht si sreirrab rab larutan ,yletanutrofnU .rytne dezirohtuanu tsniaga ecnerreted tnacifingis a gniniatniam - t curtsnoc ot elba era uoy sselnu ,sreirrab edamnam naht evisnepxe erom eb yllacipyt lliw sreir f i ro ,ytilicaf s(cid:146)ynapmoc ruoy fo noitcurtsnoc laitini eht gnirud sreirrab larutan eseht fo emos .ecalp ni serutaef eseht fo ynam sah ydaerla gnidliub ruoy gnidnuorrus yhpargopot eht 6.2.1.1 Terrain Barriers These types of bar. ain barrerriers include berms and ditches that ound our surryfacilityT - riers e arprimarily used to stop ehicle v, accessbut will also assist in clearly identifying any people who may try to access the . facility(cid:146)s perimeter e igurF6.2 w ws beloshotypical dimensions of these barre iers that to they ensurwould stop most ehicles om vfraccessing otect.ou wish to prea ythe ar , As costs stated for earliermany of these ain terrbarriers will normally be e morexpen - e sivthan a simple chain-link fence; , erevwhoou yshould definitely consider their use if ou ycan ate incorporthem during either new facility construction or if our yfacility is .ojectsaccomplishing major landscaping pr 6.2.1.2 Vegetation ertain Ctypes of plants or egetation v-cost vide can erwaltera e onativprloto ain terrbarri - ers that vide oprsecurity to our yoperprty , and although facilitystill aying portra gentler dependehicles ven evand , peoplefunnel to used be can egetation V. publicthe to persona - obseration vunder e arthat eas arand ances entrprimary d wartoplant, of type the upon ing of either as cameror personnel. When using egetation vto ent evpror hinder access onto our yoperprty or , ou facilityyshould consider thorny and dy hartypes of plants that will .easough these are thrvom trdeter people frying to mo Of , coursea major ation considerin using egetation vis that it may take al ersevears y ou will likely for these plants to fore barre been planted, so ym an effectivier after they hav e another type equirof perrimeter e securin ity the measurinterim. ation Another consider to der orin k worof amount significant a take can plants(cid:151)it many of ed equirrupkeep the is a as plants using considering e arou yf I. efeaturuseful and e activattran as plants maintain , ecommended it to k would worwith be a rlandscape designer or a local barrnurseriery in our yea arto get advice on what type of egetation vwould k worbest in our yonment envir Chapter 6ecurity hysical S (cid:127) P 113 Hillside cut 6′0 15′– 20′ Protected 4′0 area Berm 12′– 15′ Protected 6′0 area Ditch 7′6” 12′– 15′ Protected 5′0 area FIGURE 6.2 Dimensions of berms required to prevent vehicle access. also and onments envirmany in ell wk worthat plants some e are ther, erevwhoegion; rand wn in al barrier as shovide a good naturopr able 6.1T . 6.2.1.3 Natural Obstacles , Obstaclessuch as , ocksr, stonesand , wallsvide can ceptional oexprbarriers against both ehicles vand personnel ound arthe perimeter of our yfacility and at the . ancesentrThey can be used in the same manner as berms and , ditchesand they e aran e activattrland - om frehicles vblock to walkways pedestrian of middle the in used be can that e featurscape wn shois manner this in obstacles al naturof example An . ancesentrbuilding oaching appr in e 6.3igurF . Thel astn aturalb arrierwew illl ooka taew r aterfT ehaetsvue.epirs rodeas uperbb ar - rier to either people or vehicles, and as with many of the other natural barriers, they will also funnel traffic to aeras that aer under observation y bcameras or security personnel. dAdi,t ionallytheer aer a variety of diffeernt water featuers that can be used to vpirode 114 OFESSIONALSUSINESS PRSECURITY FOR B Table 6.1 Plants to Deter Trespassing Trees Shrubs Hawthorne is a dense hedge that grows 25 ft high and has Pyracantha, a thorny evergreen shrub, produces sharp thorns, which can range from 1 to 5 in in length red, yellow, or orange berries in fall Hardy orange is a fruit-bearing tree that grows up to 20 ft high Barberry are characterized by their distinctive and wide and is covered to the ground with lacerating thorns three-spined thorns Black locust produces creamy white (cid:31)owers and short thorns Some varieties of roses will grow into a dense at the base of each leaf thicket that is impenetrable to trespassers Duffy D. Thorny solutions: bushes and other plants that deter trespassing. CSO Online; 2007 FIGURE 6.3 Rocks used as a natural obstacle at a building entrance . FIGURE 6.4 Water features that act as natural barriers. barriers or pathways such as waterfalls, ponds, and ruwnon ienxga msptelTraem.ss can be seen in Figuer 6.4 . e There aral ersevantages disadvto these types of al naturbarriers: water es featurwill e havervy high initial costs for e installation; a they equirgood will deal rof time and man - er wpoto perform daily , maintenancecleaning, and upkeep; and e therwill be periodic Chapter 6ecurity hysical S (cid:127) P 115 FIGURE 6.5 Examples of different fencing. costs needed in der orto operly prmaintain the water es featurand keep them in king wor natuof types these e utilizstill will companies many , antagesdisadvthese with en vE. deror - of many with ed comparwhen es(cid:151)particularly feature activattrtheir of because barriers al r .esthe other perimeter security measur barriers manmade the to solution subtle e mormuch a vide oprbarriers al naturall, erOv e wwill look at next, and depending upon the ession improu ywish to ey convto the pub - lic, they can be an cellent exestment invto not e vonly the oimprsecurity of our yfacility(cid:146)s .our businesse site for yactivvide an attro, but also to prperimeter security 6.2.2 Manmade Barriers whoboundary; facility(cid:146)s our yto access deny also barriers manmade , barriersal naturLike - as not normally e arthey Although ea. arthe to construction al structurwith so do they , erev they , barriersal naturof extent the to onment envirthe with in blend they do nor , eactivattr .e easilye and can be added to existing facilities much more usually much less expensivar 6.2.2.1 Fencing e There armany types of fences that oyu can use should ouy decide upon this type of perimeter security , emeasurand these ednitf fertypes can vide porevry ednitf feresimpr - elaeotvrpieevlrnfoy, aarma ant ncgtrdfter eyi cen vta ocynfTep hsee s putbh.le sit icoo ns as is the case with wooden fencing, to the other end of the spectrum as wn shoy bthe fcomotroinfhbflceei ieyen dtre cdtan iiyrannptgtgiwuh i cironariusbalnst ll eiyoydl c ea - . tionsaelev rSednitf fertypes of fencing that can vide porviable perimeter security e ar wn in sho e 6i.g5uFr . e vits e our ations ability ybuildal for to considere erfencing secursevto oe imprarTher - ing(cid:146)s . or perimeterFchain-link, barbed , ewirand concertina fencing, ou yshould use the minimum gauge and other ameters parthat meet al feder. specificationsencing Fshould ely also attached be to securthe , ound; grchain-link for fencing exampleshould ideally be placed in ete concrfootings and buried a minimum of 2 in into the ound. gr able 6.2T con - , and concertina fencing.etains specifications for chain-link, barbed wir tI stinatrop moit eton t aghntic nlelfi we dtiovn oatrn pesuorir reoestted d aetavitom r orfedurt n niyaal eydl nlol igwnicn etfa hdtesiv dea rsarenna lyptiruc erysatilim(cid:151)redurtni s0 1 ]1[ os(cid:151) r uyotiyru cneas ldpluoh sto ndn eypleedlos ngonidliu ba ec ndenfuor ruaoy ytilicaf dna gnikniht taht ruoy gnidliub si .eruces sA ,dessucsr iegdinlirsaue ehty tiruces latnemadnuf fo esnefed ni htped dna gn isveaihcnadnud enihrtiw ruoy ytirucesm etsys , tis eordeve w; fgo noo,i hcsr ni p.eet-fol no rs oyuAhftst iaiyrewnumac elrsylai swesbecen 116 OFESSIONALSUSINESS PRSECURITY FOR B Table 6.2 Fence Speci(cid:31)cations Chain-Link Barbed Wire 9 gauge or heavier 12 gauge or heavier Minimum height of 7 ft Minimum height of 7 ft No larger than 2 in mesh openings 4-pointed barbs no more than 6 in apart Vinyl or galvanized coated Twisted double strand Fence must reach within 2 in of hard ground or pavement Firmly af(cid:30)xed to metal posts no more than 6 ft apart Military handbook 1013/10. Design guidelines for security fencing, gates, barriers, and guard facilities. FIGURE 6.6 Constructed walls can provide an attractive perimeter security boundary. a gnidivor pedulcn io t,erutso pytiruce slacisyh pruo yo tdd atah tsgnih tlareve shsilpmocca d na ,ciffart elcihev dna nairtsedep gnillortnoc ,seiradnuob s(cid:146)ytilicaf ruoy fo noitaeniled raelc .selcatsbo eseht tuc ro bmilc yeht nehw sredurtni laitnetop yfitnedi ot snaem a gnidivorp 6.2.2.2 Walls onstructed Cwalls vide opranother manmade barrier option and can be much e mor facilour yinto visibility limit also will alls W. optionsfencing of types many than e activattr - and personnel security for ability the limit also will visibility this , erevwhoounds; grand ity other ees yemploinside the operprty to be able to see along much of the exterior of the . f Iperimeterit is necessary to e ensurvisibility outside our ylocation due to the ea arour y the along placed as camerCTCV ough thred esolvrbe can oblem prthis located, is company , this erevwwall. oadditional Hcost should be taken into account when considering walls , earlierdiscussed e wbarriers al naturthe of many Like . emeasursecurity perimeter our yas security a of example An fencing. than e expensive morbe to going typically e arwalls these wn in wall is sho e 6.6igurF . 6.2.3 Cost Considerations for Perimeter Security Measures A primary focus of any security e(cid:151)whether measurou ye arlooking at our yperimeter or at other eas arwithin our yall ervosecurity system(cid:151)will be cost. As e we havw nogone w knoto important is it om, frchoose to e havou yes measursecurity perimeter the ough thr Chapter 6ecurity hysical S (cid:127) P 117 Water feature Stone wall ost C Prefabricated walls Wood Chain-link fence Vegetation fence FIGURE 6.7 Relative costs of the various perimeter security measures. . optionsthese of costs e elativrthe 6.7e igurF secuperimeter the of each of costs the ws sho - .elation to one anothere discussed in re haves writy measur ince Sactual costs can arvy eatly grbased on al ersev, factorssuch as ear -to-yearyprice , easesincrwhat egion rof the country ou ye arlocated in, and the climate of the ea arou y , exampleor F. costse elativrws shoinstead but costs actual w shonot does e figurThe in. e liv er wlocost options such as planting egetation vand fencing e arless than 1/10th the cost of the higher cost . till optionsShigher e aroptions such as stone walls and , water esfeatur e cost.elative exponentially higher in terms of rwhich ar 6.3 Doors and Windows Doors and ws windoe arpart of the inner barriers of a building, and they e arone of the eakest wlinks in the security of the e structursince they e armuch e moragile frthan the the om fraside , linkseak wthese engthen strto der orn Ifoundation. and walls ounding surr vious ation considerthat oball doors ws and should windonormally be closed and locked, This not only . includes the they must also be designed esist to attempts cible rfor entrfory .amesounding fr, but also the surresws themselvdoors and windo 6.3.1 Doors Exterior doors to your ,f acilityalong with interior doors located at entrances in aeras housing critical ersoucres, should to be evaluated in ergadr to their structural sterngth andt het ypeo fl ockingm echaniTshme.d oorst hemselvess houldb em adeo fh eavya nd solid material, either solid wood or ideally steel. t Iis also a good practice that doors open wtador the likely therat dierction to perclude an intruder from being able to kick the door inwadr. 118 OFESSIONALSUSINESS PRSECURITY FOR B n Iaddition to construction of the door itself; the , amesfr, hingesand locking mech - anisms should also be ced. einforr, deallyIdoor ames frshould be constructed using heavy and solid steel. inges Hon exterior doors and viding doors oentrpry to our ycritical ces esourrshould er nevbe located along the exterior of the e structur(or the ea arom fr e whera potential intruder would be oaching). apprf Ithe hinges cannot be ed vmoto the interior of the door , estructurthey should be either elded spot-wor flanged (inserting a headless machine ew scrough thrthe hinge leaf) in der orto eclude pran intruder om fr being able to dissemble the door and gain . The entrylocking mechanism used on these doors should ideally be a dead bolt that meets a ade rG1 pecification Sas ated ry bthe nstitute (ANSI).ds Itandarational SAmerican N 6.3.2 Windows ince Sws windoe areasy to eak brin der orto gain access into a , facilitythey e artypically ed viewas the eakest wpoint in the building(cid:146)s . defensesAs such, potential intruders will combat to option ne O. facilityour yto entry gain to attempting when these to look typically this ability vulneris to consider placing , bars, grillsor heavy eens scross acrany ws windo that e arless than 18 ft om fround grel. levAlthough this is one of the most e securoptions to otect pr, wswindoplacing bars along all our yexterior ws windomay not omote pran open and inviting onment(cid:151)parenvirticularly if ou e yarin a -service . customerf businessI this option is , ableundesirother options that still vide oprotection prto these able vulner wing methods:ough the folloce them threinfore to rws arwindo (cid:127) nderatorwries (UL) iters Laboresistant glass or safety glass that meets U-rglarurB .dsstandar (cid:127) e cnatsiser rettahs edivorp lliw hcihw ,)salgixelP( cilryca ro citsalp rehtie gnisu ,gnizalG .ecnatsiser tellub sesac emos ni dna (cid:127) .swodniw dna srood erif ni desu yllausu ,ssalg deriW (cid:127) t i ,derettahs nehW .ssalg delaenna naht regnorts semit ruof si hcihw ,ssalg derepmeT h cihw ,sdrazah ssalg gniylf tsniaga tcetorp ot stnemgarf llams otni kaerb yllausu lliw .ytilibissop a si taerht evisolpxe enrob-elcihev a fi noitpo doog a eb yam e ws some Although arof doors e the and e eaker wwindo, arpoints therin eany structur against facility our yotect prbetter and eas arthese engthen strcan that options arof viety a .unauthored accessiz 6.4 Lighting Lighting is an essential element of our yphysical security es measursince security light - oper , use prof eur. therFmoring will make detection of any e potential likelyintruders mor ent.chological deterrvide a significant psyolighting can pr tI si tnartopmi ot eton t aehtv igtncietfhfgeil si eht elgnt inesev ittscoremrfeftee-dtsoc tsnia geamric ecnis e t viyilsene vpo, ixtnsteiianaliten idanmar ne hywl edevsiutn caecffe e ht fo eno si gnithgil ytriuceS .sesac emos ni lennosrep ytriuces rof deen eht ecuder yllautca Chapter 6ecurity hysical S (cid:127) P 119 e ht ecnis ,metsys enola-dnats a sa desu eb ton dluohs taht serusaem ytriuces lacisyhp ynam d lgue nobih t s,h.tgl iuslsAe ea snnoo ip roets etrmaeepe odysfsvitbovo res ospi rouotprp detn ehmt gir uw elayhettnriinueoc se srsraeo pwre mo at nceohiottlcle atfeod ynauanu - e s ll a l dueieed swidnzv noriieapoe dtshr bnaetunroiisapt Wnosesre rpsr psi.aaethntetni .ytilicaf ruoy edisni dna edistuo htob ytriuces sevorpmi ti woh dna gnithgil gninimaxe 6.4.1 Exterior Security Lighting ws obserder xteration to in our notify Eovound ior and facility and ylighting arin pralloor - vide detection for security personnel, , ascameror both. dequate Aexterior security light - ing consists of en evlight along eas dering arborour y. facility(cid:146)s xterEior perimeterlighting should ideally eate crglaring light into the es eyof potential , intrudersviding although opr only w lolight in eas e arwhersecurity posts and e ols patr. Theris ateopera balance in the , since amount too of erevwmuch lighting, can hoactually become detrimental, making it difficult to see into ounding surr. easarThis esults rin d standarexterior security lighting .king lightshaving less intensity than wor When designing and planning an exterior security lighting system, the wing follocon - ations should be taken into account:sider (cid:127) m etsys gnithgil eht tceffa yam taht aera ruoy ot nommoc era taht snoitidnoc rehtaeW .).cte ,sduolc ,niar ,gof ,.g.e( (cid:127) f o sruoh etaluger ot redr o ni dellatsni eb yllamron dluohs slortnoc gnithgil citamotuA d ednemmocer si ti ,ssenkrad ni desu era sthgil roiretxe fo ytirojam eht ecniS .noitarepo s ihT .thgilnus no desab no dna ffo nrut yeht ecnis desu eb sllec cirtceleotohp taht g nignahc-reve eht ot eud sremit naht etaluger ot reisae hcum si metsys lortnoc gnithgil .esirnus dna tesnus rof semit (cid:127) e b osla dna lennosr ep ytiruces fo lortnoc eht rednu eb dluohs gnithgil retemireP .noitpursid lanoitnetni ro kcatta morf deruces e There arfour d standartypes of exterior lighting typically used: ontinuous CLighting, these of each at look will e WLighting. gency merEand Lighting, able voMLighting, y tandbS .atelysepar 6.4.1.1 Continuous Lighting ontinuous Clighting is the most common form of exterior security lighting. This type of lighting consists of stationares anged e and to arrlights continuously y that flood fixturara when e effectivmost e arexterlights of ior types These . knessdarof durhours ea ing aren giv illuminating boundaries ound arour yfacility and any entry points either into the facility .oundsor onto the gr 6.4.1.2 Standby Lighting y tandbSlighting is also fixed in terms of its placement; , erevwhothese lighting es fixtur will not be continuously lit. nstead, Iy standblighting is either automatically or manually turned on when suspicious activity is suspected or detected.

Description:
Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don’t have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an existing security program.The bo
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.