CPP Study Course - PowerPoint PPT Presentation

1 / 40
About This Presentation
Title:

CPP Study Course

Description:

CPP Study Course – PowerPoint PPT presentation

Number of Views:259
Avg rating:3.0/5.0
Slides: 41
Provided by: markbav
Category:
Tags: cpp | course | foss | study

less

Transcript and Presenter's Notes

Title: CPP Study Course


1
CPP Study Course
Protection of Assets Manual Physical
Security Part 1 Presented By Mark
Bavousett Director of Design and
Engineering Secure Concepts International
2
Barriers
  • Have Security in depth
  • Layers of security to delay and deter Natural
  • Water
  • Mountains
  • Marshes
  • Deserts
  • Other Terrain difficult to traverse

3
Barriers (Cont.)
  • Structural Barrier physically and
    psychologically deters or discourages the
    undetermined, delays the determined, and channels
    the flow of the traffic through entrances.

4
Barriers (Cont.)
  • Structural Barriers
  • Building Surfaces
  • Roofs, Floors and Walls
  • Building Openings
  • Doors
  • Windows
  • Drives
  • Grills
  • Utilities into and out of area
  • Metal, including drawn wire
  • Masonry

5
Barriers (Cont.)
  • Glass
  • Electrically Conductive Glass
  • Rough or patterned Glass
  • Mirrors and Transparent Mirrors
  • Tempered Glass
  • Laminated Glass
  • Bullet-Resisting Glass
  • Wired Glass
  • Acrylic Glass (Plexiglas) (polycarbonate)

6
Perimeter Barriers
  • Perimeter Barriers
  • Chain Link Fencing
  • Outriggers
  • Privacy slats
  • Barbed Wire
  • Concertina Wire
  • Barbed Tape
  • Expanded Metal and Welded wire Fabric

7
Locking
  • Mechanical Lock
  • Warded Lock
  • Lever Locks
  • Pin Tumbler Lock
  • Interlocking Pins
  • Multiple Axes Tumblers
  • Wafer Tumbler
  • Key Accountability
  • The use of a single Grand Master combination for
    any mechanical locking system is not a sound
    security practice.
  • Electromagnetic Lock
  • Electro-Mechanical Locks (breakaway strikes)
  • Electronic Lock (Crash bars)
  • Dial Type Combination Locks (Safe Locks)

8
Alarm sensors
  • Alarm sensors
  • Perimeter or point of entry
  • Area
  • Object
  • Or
  • Electro-mechanical
  • Foil
  • Switches
  • Wire and Screen Detectors
  • Pressure Mats

9
Alarm sensors (Cont.)
  • Sound wave-Microwave
  • Ultrasonic Detectors
  • Capacitance (Safe Detection Mainly)
  • Vibration (Typically installed inside of safe or
    controlled areas.)
  • Audio (Glass break detectors)
  • Light (Infra-red Beam detectors)
  • Other
  • Pressure
  • Thermal
  • Chemical

10
Sensor Integration
  • Types of Systems
  • Local Alarm
  • Central Station
  • Direct Connection
  • Proprietary

11
Engineering Design
  • Protection Improvement
  • Patrol Reduction
  • CCTV and Personal Reduction
  • The Automated Security System
  • Centrally- Controlled Systems
  • Control Center Equipment
  • Costs
  • Personnel Control
  • Identification
  • Access
  • Monitoring Sensors
  • Supervision of Protection Personnel
  • Time and Attendance Recording
  • Programming the Computer

12
Engineering Design (Cont.)
  • System Expansion
  • The Control Center
  • Emergency Power
  • Standby Power
  • Continuous Power
  • The System Design Task
  • System Objective
  • System and Subsystem Task Relationship
  • The Vulnerabilities Analysis
  • Determination of Functional Countermeasures
  • Countermeasures Network Relationships
  • Subsystem Importance
  • Complete Functional Statement

13
Engineering Design (Cont.)
  • Development of a Complete Functional
    Specification
  • Elements of a Typical Functional Specification
  • General Requirements
  • Bid or Cost Proposal
  • Relevant Standards
  • Subsystem Description
  • Summaries of Devices
  • Alternate Approaches
  • Evaluation of Proposals Responsive to Functional
    Specification
  • Selection of the Supplier and Negotiation of the
    System Contract

14
Communications
  • Line Protection
  • Wire Transmission of Alarm and Audio Signals
  • Loop
  • Point to Point
  • Multiplexing
  • Optical Fiber
  • Video Transmission by Wire
  • Radio
  • Radio-Telephone
  • Cellular Telephone
  • Radio Interference
  • Microwave Transmissions
  • Light
  • Interconnection
  • Communication Security

15
Communications (Cont.)
  • Scramblers
  • Frequency inverters
  • Bandsplitters
  • Rolling Bandsplitters
  • Frequency or Phase Modulators
  • Masking
  • Vocoder
  • Rolling Codes
  • Digital Coding and Encryption

16
Identification
  • To include or exclude someone or something from a
    group (employee, police officer , welfare
    recipient)
  • To grant or Deny admittance
  • To Issue or Withhold material or information
  • To permit, Deny or qualify in some way a privilege

17
Identification (Cont.)
  • Security Applications of Access Control
  • Permit or deny entrance to or presence in a given
    place.
  • Increase or reduce the rate or density of
    movement to, from or with in a defined place.
  • Protect persons, materials, or information
    against unauthorized observation or removal.
  • Prevent injury to persons or damage to things.
  • Performance Requirements
  • It is valid.
  • It is reliable
  • It is easy to use.
  • It should be resistive to surreptitious
    substitution or counterfeiting.
  • It should be rugged and long-lived.

18
Identification (Cont.)
  • Performance Criteria
  • It should be physical adequate.
  • It should be valid and reliable
  • If mechanical or electro-mechanical, it should be
    easily maintained.
  • Manual Access Control Systems
  • Personal Recognition
  • Prior Familiarity
  • Opportunity to observe
  • Frequency of observation
  • Verifiable Authorization
  • Controllable

19
Identification (Cont.)
  • Document Criteria
  • Obviously distinctive
  • Resistive to surreptitious changes
  • Watermark
  • Laminate the document.
  • Holograms
  • Document Criteria Cont.)
  • Unique to the authorized holder
  • Photograph
  • Description of holder
  • Positive if coded or access
  • Adaptable for display wearing.
  • Of limited valid period.

20
Access Control
  • Automated Personnel Identification and Control
  • A device or artifact which can be possessed, such
    as a key or coded card
  • Information which can be remembered, such as a
    personal identification number (PIN) and/or
  • A uniquely personal characteristic, such as a
    fingerprint, voice pattern, signature
    characteristics or retinal vascular pattern - the
    biometric approach.

21
Access Control (Cont.)
  • Coded Card System Elements
  • The card or token.
  • The sensing or point of entry device.
  • The control processor
  • The communications links between those twoand
  • The local or central database.

22
Access Control (Cont.)
  • Magnetic Stripe
  • ANSI/ ISO 7810 and 7811/2
  • Track 1 used by International Air Traffic
    Association (IATA)
  • Track 2 used By American Bankers Association
    (ABA)
  • Coercivity
  • 300 oersteds (early card system usually)
  • 4000 oersteds
  • Encoded data is read when the card is passed over
    the reader head.
  • Insertion reader
  • Swipe reader
  • Watermark (usually on Track 3 or 4)

23
Access Control (Cont.)
  • Magnetic Matrix
  • Advantages
  • Cards and readers are relatively inexpensive
  • Card codes are user changeable.
  • The card life is fairly long.
  • There is a low read error rate
  • Disadvantages
  • Cards can be duplicated.
  • Interference from other magnetic energy fields
    may occur.

24
Access Control (Cont..)
  • Optical Matrix (Transparent Bar Code)
  • Advantages
  • Low cost
  • Difficult to counterfeit
  • A low read error rate.
  • Avoidance of electromagnetic interference.
  • A relatively long life for the card and reader.
  • Disadvantages
  • Cannot be user coded
  • Vulnerable to obscuring markings on card or
    dirt/dust in reader

25
Access Control (Cont..)
  • Hollerith Code (Hole Pattern)
  • Advantages
  • very inexpensive
  • Large coding capacity
  • No read errors
  • Not vulnerable to electromagnetic interference
  • Disadvantages
  • Codes not user changeable
  • Easy to duplicate
  • Short card life

26
Access Control (Cont..)
  • Electrical Matrix
  • Advantages
  • None
  • Disadvantages
  • Not durable
  • Easily Decoded
  • Not user Changeable
  • Bulky

27
Access Control (Cont..)
  • Capacitance Code
  • Advantages
  • Difficult to read or counterfeit
  • Low cost
  • Disadvantages
  • User cannot change codes
  • Limited data carrying capacity

28
Access Control (Cont..)
  • Proximity Code
  • Advantages
  • Hands-free operation
  • Low maintenance
  • Difficult to decode or counterfeit
  • Disadvantages
  • Limited data coding capability.
  • Bulky
  • Substantially higher cost per card
  • Codes are not user changeable

29
Access Control (Cont..)
  • Wiegand Coding
  • Advantages
  • Highly secure and resistive to alteration or
    counterfeiting.
  • Durable cards.
  • Not vulnerable to radio frequency or
    electromagnetic interference.
  • Disadvantages
  • Cards are expensive
  • Codes not user changeable

30
Access Control (Cont..)
  • Bar Coding
  • Advantages
  • Inexpensive
  • Cards and readers have long live
  • A large amount of data can be coded
  • A low error rate
  • Disadvantages
  • Can be easily decoded and reproduced

31
Access Control (Cont..)
  • BioMetric Access
  • Fingerprint Identification
  • Speech Identification
  • Hand Geometry
  • Handwriting
  • Retinal Scan
  • Detection of Weapons and Metal
  • Metal Detectors
  • X-ray Detectors
  • Detection of Explosives
  • Vapor Trace Detection
  • Electron Detection

32
Parking and Traffic Control
  • Vehicular Access
  • Driveways and Ramps
  • Vehicle Checkpoints
  • Locally Operated
  • Remotely Operated
  • Signs and Placards
  • On-Premises Vehicle Safety
  • Vehicle Identification and Registration
  • Identifying Employee Vehicles
  • Identifying Delivery Vehicles
  • Identifying General Visitors
  • The Goal - All Vehicles Identified

33
Parking and Traffic Control (Cont..)
  • It is suggested that as many vehicles as
    possible be assigned general parking
    authorization and as few as possible be given
    reserved parking.
  • General On-Premises Parking
  • Lot Layout
  • Smaller-than-Standard Cars
  • Larger-than-Standard Vehicles
  • Reserved On-Premises Parking
  • Lot or Area Control
  • General Areas
  • Oversubscription
  • Mechanized Control
  • Differential Counter
  • Visitor Parking

34
Parking and Traffic Control (Cont..)
  • Violations and Sanctions
  • Parking Area Censuses
  • Personal Safety (Emergency Stations)

35
Sample Exam Questions
36
The degree of protection desired in any
installation is predicated upon an analysis of
the following two factors
  • A. Cost and environmental conditions
  • B. Criticality and vulnerability
  • C. Cost and vulnerability
  • D. Cost and Criticality

37
Excluding the top guard, standard barbed wire
fencing intended to prevent human trespassing
should not be less than
  • A. 7 Feet High
  • B. 6 Feet High
  • C. 10 Feet High
  • D. 8 Feet High

38
Which of the following is not true with regard to
lock and key systems?
  • A. The lock is the most accepted and widely used
    security device of the basic safeguards in
    protecting installations.
  • B. The locking system should be backed up with
    other security.
  • C. A high-quality, pick-proof lock is considered
    a positive bar to entry.
  • D. Most key locks can be picked by an expert in a
    few minutes

39
The symbol TRTL indicates
  • A. Safe is resistant to torches
  • B. Safe is resistant to tools
  • C. Safe is resistant to both torches and tools
  • D. Nothing pertaining to torches or tools

40
The type of sensor which is not influenced by
exterior noise which reacts only to movement
with in a protected area and which can be
adjusted so the movement of air caused by fire
will activate an alarm is known as
  • A. Proximity detector
  • B. Ultrasonic sensor
  • C. Electro-mechanical sensor
  • D. Audio sensor
Write a Comment
User Comments (0)
About PowerShow.com