1st Edition

The Complete Guide to Physical Security

By Paul R. Baker, Daniel J. Benny Copyright 2013
    360 Pages 90 B/W Illustrations
    by Auerbach Publications

    To adequately protect an organization, physical security must go beyond the "gates, guns, and guards" mentality that characterizes most security programs. Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. The Complete Guide to Physical Security discusses the assets of a facility—people, building, and location—and the various means to protect them. It emphasizes the marriage of technology and physical hardware to help those tasked with protecting these assets to operate successfully in the ever-changing world of security.

    The book covers specific physical security technologies, such as intrusion detection, access control, and video surveillance systems—including networked video. It addresses the reasoning behind installations, how to work with contractors, and how to develop a central station for monitoring. It also discusses government regulations for building secured facilities and SCIFs (Sensitive Compartmented Information Facilities). Case examples demonstrate the alignment of security program management techniques with not only the core physical security elements and technologies but also operational security practices.

    The authors of this book have nearly 50 years combined experience in the security industry—including the physical security and security management arenas. Their insights provide the foundation for security professionals to develop a comprehensive approach to achieving physical security requirements while also establishing leadership roles that help further the overall mission of their organization.

    Physical Security Planning
    Setting the Stage
    Site Planning
    Reviewing the Physical Design
    Vulnerability Assessments
    The Security Survey
    Vulnerability Assessment
    Developing a Vulnerability Assessment
    Understanding the Threats
    Making Adjustments
    Security Design and Planning
    Security Planning and Evaluation
    Security Design Concepts
    Security Technologies
    EASI Model
    Adversary Sequence Diagram
    Working with Architects
    Working with Contractors
    Construction Review
    Security Construction Projects
    New Construction
    Initial Point of Access
    Roadway Design
    Parking
    Loading Docks
    Signage
    Retrofitting
    Protection in Depth
    Protection-in-Depth Concepts
    Protection Plans
    Evacuation Drills
    Incident Response
    Penetration Tests
    Access Control Violation Monitoring
    Perimeter Protection
    Crime Prevention through Environmental Design (CPTED)
    Protecting with CPTED Concepts
    Barriers
    Lighting
    Access Control
    Access Control
    Anti-Passback
    Access Control Head End
    Turnstiles and Mantraps
    Physical Protection Systems
    Doors
    Windows
    Interior Intrusion Detection Systems
    Perimeter Intrusion Detection Systems
    CCTV and IP Video
    The Essential Guide to Video Surveillance
    Video Surveillance Use Cases
    Video Surveillance System Classifications
    Image Capture Video Sources—Cameras
    Lenses
    Lighting
    HDTV
    Recording Systems
    Video Management Systems
    Video Control, Analysis, and Video Content Analysis Systems
    Using a Step-by-Step Approach to System Selection and Deployment
    Upgrade Path
    Manpower and Video Surveillance
    Privacy and Legal Considerations—Video Surveillance Checklist
    The Future of Video Surveillance
    Keys, Locks, and Safes
    Keys, Locks, and Safes
    Developing a Master Locking System
    Safes
    Vaults
    Containers
    Biometrics
    What Is Biometrics?
    Multibiometric Systems
    Deploying Biometrics
    Privacy
    Biometric Metrics
    Attacks on Biometric Systems and Their Remedies
    Security Guard Force
    Establishing a Security Guard Force
    Mission and Duties of the Security Guard Force
    Profile of the Facility to Be Protected
    Proprietary Security Guard Force
    Contract Security Guard Force
    Hybrid Force
    Security Guard Uniforms
    Security Guard Identification
    Security Guard as an Authority Figure
    Security Guard Protective Equipment
    Security Guard Training
    Professional Security Certifications
    Personnel Issues
    Central Station Design
    Developing an Operation
    Design Requirements
    Secondary Amenities for an Operations Control Center
    Alarm Assessment
    Government Security
    SCIF
    Location
    Design
    Sound Masking
    TEMPEST
    Shielding
    Filtering
    Access
    Security Alarm Requirements
    Open Storage
    Closed Storage
    Dealing with Contractors
    Appendix A: Fixed Facility Checklist
    Financial Institutions and Banks
    Vaults
    Safes
    ATMs
    Night Depositories
    Teller Cash Recyclers
    Dye Packs
    Barriers
    Ambush Features
    Video Systems
    Holdup Alarms
    Bank Guards
    Data Center Protection
    Data Centers
    Fire Protection
    Fire Detection/Alerting
    Fire Suppression
    Total System Cost
    Determining Total System Cost
    System Design Cost
    System Installation Cost
    System Operational Cost
    IT-Related Cost
    Maintenance Cost
    Replacement Cost
    Cost-Benefit Analysis
    Cost of Loss
    Cost of Prevention
    Return on Investment
    Cost Factors
    Security Master Plan
    Security Master Plan Strategy
    Engaging the Stakeholders
    What Should Your Security Philosophies Be?
    Technology Migration Strategy
    Equipment Replacement Schedules
    Security Foresight
    Strategic Foresight
    Foresight Techniques
    Security Leadership
    What Is Leadership?
    Purpose of Leadership
    Effective Leadership
    Why Security Leaders Are Important
    Understanding the Basics
    Are Leaders Born or Made?
    Good Leadership
    Bad Leadership
    Going from Bad to Good
    Forging the Future
    New Definitions for Leaders in the Twenty-First Century
    Index


    Biography

    Dr. Paul R. Baker began his security career in the U.S. Marine Corps as a military policeman. Upon discharge, he joined the Maryland State Police and worked in all phases of law enforcement, spending the majority of his career in the intelligence and narcotics areas. Upon retirement in 2001, he began the security management phase of his journey, working for the MITRE Corporation, Institute for Defense Analysis, Capital One Bank, and, finally, with the RAND Corporation.

    Dr. Baker is board certified in security management as a certified protection professional (CPP) by ASIS (American Society for Industrial Security) International. He is an adjunct professor for University of Maryland University College in the homeland security field and an adjunct professor for Southwestern College in its security management curriculum. He is a contributor to the CRC Press books Official (ISC)2® Guide to the CISSP® CBK®, Second Edition and Official (ISC)2 Guide to the ISSAP CBK.

    Dr. Daniel J. Benny is the security discipline chair at Embry-Riddle Aeronautical University. He served as a U.S. Navy intelligence officer and DOD Federal Police Chief and holds a Ph.D. in Criminal Justice from Capella University. He is board-certified in security management as a certified protection professional (CPP) and board-certified as a professional certified investigator (PCI)—both by ASIS International; certified fraud examiner (CFE) by the Association of Certified Fraud Examiners; certified confidentiality officer (CCO) by the Business Espionage Controls and Countermeasures Association; certified member (CM) airport certified employee-security (ACE); and airport security coordinator by the American Association of Airport Executives.

    Dr. Benny is the author of the CRC Press books General Aviation Security: Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports; Cultural Property Security: Protecting Museums, Historic Sites, Archives, and Libraries; and the forthcoming book, Industrial Espionage: Developing a Counterespionage Program Security. He has authored over 300 articles on security administration, intelligence, aviation security, private investigation, and cultural property security topics.

    "There is much to like about this book with its definitions as well as the logical progression through the chapters on how to develop a physical security program … it is a good introduction to physical security concepts."
    ASIS Dynamics

    'For manufacturing readers wondering how truly safe their operations are, or how safe they could be, this volume is a great starting point.' --Blue Heron Journal