Company Name
Your company tagline
Mission
statement: Your
companys mission
goes here
20XX
20XX
20XX
20XX
Physical security is a
The solution
combination of physical and
procedural measures
designed to prevent or
mitigate threats or attacks
against people, information
and assets. Often a measure
designed to meet one
particular physical security
goal that may address
others.
1.Deter
2.Detect
3.Delay
4.Assess
5.Respond
Goals of Physical
Security
1. Deter - these are measures that adversaries perceive as too
difficult or needing special tools and training to defeat.
2. Detect - these are measures implemented to determine if an
unauthorised action is occurring or has occurred.
3. Delay - these are measures implemented to:
impede an adversary during an attack
slow the progress of a detrimental event to allow a response
before agency information or physical assets are compromised.
4. Assess- these are measures taken once an agency is aware
of an attack or event to prevent, resist or mitigate the attack or
event.
5. Respond - these are measures taken to restore operations to
normal (as possible) following an incident.
It should address all hazards an agency may face in the
protection of people, information, functions and physical assets
including:
1. civil disturbance, for example, riots, insurrections and protests
2. crime, including personal and property crimes
3. workplace violence such as assault, harassment and revenge attacks
4. terrorism, including bombing, extortion, white powder incidents and
kidnapping
5. natural disasters such as flood, bush fire, earthquake and pandemics
6. industrial disasters, including explosions, building fires, structural collapse
and other major accidents
*other risks, for example, disturbed persons and traffic accidents.
Personnel
Security
Major
Elements
Physical Security
Information
Security
The team
Customers
Employees
Visitors
Contractors
and
Consultant
Interruption of services
Information
Security
Theft
Physical damage
Unauthorized disclosure
Loss of system integrity
Theft
HVAC
Access
Six key
Threats
Shoulder
Surfing
Espionage
Dumpster
Diving
Social Engineering
Before the theft
Establish a line of succession for this function; trains all people in that
line to conduct the responsibilities of this function.
Maintains and regularly updates contact information for staff members.
Maintains and regularly updates contact information for workers
compensation insurance carrier and clinics, and employee assistance
program (EAP) or other counseling services to assist in dealing with staff
injuries or trauma.
Maintains and regularly updates contact information for bank contacts
and other financial agencies.
Working with Security, establishes policy on background checks for
personnel with access to collections.
After the theft
If staff members are suspected in the incident, coordinates with Legal on employee relations
issues.Coordinates with workers compensation carrier and clinics to assist with any staff
injuries.
Coordinates with EAP or other counseling services to assist with response to staff trauma or
emotional needs. In coordination with the Director and Board, makes financial resources
available to respond to the incident, including for Private Investigators, public relations firms,
psychological assistance, etc.
With Director and Communications/PR, coordinates and disseminates appropriate
information to staff.
Cooperates with law enforcement and develops a plan for lockout pay, as needed.
Coordinates with Communications/PR to update staff on when to return to work. In the
event of closure to visitors, coordinates with Director and Communications/PR to consider
refunds to public for admission, food service, etc. Keeps records of expenses incurred in
responding to and investigating incident, including for additional security, private investigator,
etc. Regularly reports progress and actions to Director. Administrator
Layered Defense Model
Crime Prevention Through
Environmental Design
Personnel
Security
Site Location
Facility Construction
Impacts
Infrastructure Support
Systems
Crime Prevention Through
Environmental Design
The physical environment of a building is changed or managed to produce
behavioral effects that will assist in reducing the incidence and fear of
crime.
Focuses on the relationships between the social behavior of people and
the environments.
Crime Prevention Through
Environmental Design
Three Key Strategies
Territoriality - people protect territory that is their own
Surveillance - high degree of visual control
Access Control - limit access and control the flow of
access
Site Location
Security should include where the building is and how it
should be built.
Crime?
Riots?
Natural disasters?
Adjacent buildings?
Airport?
Highway?
Military Base?
Emergency support
systems?
How it works
Step 3
Step 1
Facility and
Construction
Issues
Step 2
Infrastructure
Support System
Fire and
Ventilation System
Infrastructure Issues
Walls, Windows, and Doors
Entry Points
Primary & secondary entrances
Windows
Roof access
Maintenance entrance
Emergency exits
Loading docks
Doors
Do not block exit doors
Provide sufficient and appropriate
lock mechanics
Hinges securely fixed to the frames
Frame securely fixed to the
adjoining wall.
Infrastructure Support
System
Infrastructure Support Systems include
electrical power, water/plumbing, steam,
gas lines, and heating, ventilation, air
conditioning (HVAC), and refrigeration.
Support System Threats
Fire
Best Practices
Fire Containment System (floors, vents, HVAC)
Fire Extinguishing System (permanent & mobile)
Abiding by the Fire Codes
Fire Prevention Training and Drills
Fire
Fire Prevention reduce causes of fire.
Fire Detection - receive warnings of fire
before it becomes a problem.
Fire Suppression - how to extinguish and
contain a fire to minimize damage.
Fire Prevention
Use fire resistant materials for walls, doors, furnishings, etc.
Reduce the amount of combustible papers around electrical
equipment.
Provide fire-prevention training to employees - remember, life
safety is the most important issue.
Conduct fire drills on all shifts so that personnel know how to
safely exit a building.
Fire Detection
Ionization-type smoke detectors detect charged particles in
smoke.
Optical (Photoelectric) detectors react to light blockage caused by
smoke.
Fixed or rate-of-rise temperature sensors - heat detectors that
react to the heat of a fire.
Combinations are usually used for the best effectiveness in
detecting a fire.
Fire Types and Suppression
Fire Suppression
Water Sprinkler Systems
Water could be a conductor of electricity - it may compound the
problems in computer rooms.
Water can cause damage to electrical equipment.
Pre-action or dry-pipe system - water is held back by a valve
and is released when the sensor activates.
Electrical Power
Disruptions in electrical power can have a serious business
impact.
Goal is to have clean and steady power.
Dedicated feeders
Alternate power source
Access Controls
Secure breaker and transformer rooms
Heating, Ventilation and Air
Conditioning Practices
HVAC
Temperature Controls Protection
Emergency Detection System
Auto Shutoff Mechanisms
Proper Maintenance
Earthquake Preparedness
1.
2.
3.
4.
Eliminate Potential Hazards
Train Employees
Business Emergency Plan
Emergency Supplies
Sexual harassment in the
workplace
Sexual harassment is unwelcome sexual behaviour, which could be
expected to make a person feel offended, humiliated or intimidated. It can
be physical, verbal or written.
Sexual harassment is covered in the workplace when it happens:
1. at work
2. at work-related events
3. between people sharing the same workplace
4. between colleagues outside of work.
The law
Sexual harassment is against the law. Some types of sexual
harassment may also be offences under criminal law and should
be reported to the police, including indecent exposure, stalking,
sexual assault and obscene or threatening communications,
such as phone calls, letters, emails, text messages and postings
on social networking sites.
Republic Act 7877 Anti-Sexual Harassment
Act of 1995
Guidelines and Security
Policies
Id Badges worn at all times in visible location.
Escort visitors both to and from your office.
Prevent access of unauthorized visitors (tailgating and piggybacking).
Do not prop secured doors open.
Tailgating occurs when an unauthorized person enters a secure area by
following closely behind an authorized cardholder.
Piggybacking occurs when an authorized person gains access to a
secure area and allows others to followby holding open a secured
door, for example.
Dont let anyone in if they cant get in themselves.
Everyone must show ID and insist on seeing ID from people you dont
know.
Dont let strangers mess with anything even if they do have an ID.
Escort visitors to departments. Dont let them wander around.
Lock office doors while not there.
Lock your workstation when away from desk or cubicle.
Be attentive to any visitors who seem confused or out of place.
Address anyone you don't know who may be wandering or looking
around your office. Note their appearance, behavior, etc., and report
any unusual activity immediately.
Duties and Responsibilities of
a Security personnel
1 . To be clearly visible
2. To be vigilant
3. To respond quickly and correctly during crisis
4. Observing and reporting
5. Getting help
6. Checking and monitoring
7. Maintain order among people
8. Receiving guests
9. Offer safety warnings and tips
10. Performing other special duties
SUMMARY
The goals of physical controls are to prevent, delay, detect,
assess, and appropriately respond to a physical intrusion.
Natural or environmental, utility system, and human-made factors
can all pose threats to physical security.
The three key strategies for crime prevention through
environmental design are territoriality, surveillance, and access
control.
The most important concept to remember when implementing
physical security controls is to ensure the safety of people.
QUIZ