Interior and Exterior Security Concerns - PowerPoint PPT Presentation

1 / 57
About This Presentation
Title:

Interior and Exterior Security Concerns

Description:

CCTV Camera's. Variables to be considered during a site survey. Is the camera to be visible and used as a deterrent to crime or hidden and used ... – PowerPoint PPT presentation

Number of Views:360
Avg rating:3.0/5.0
Slides: 58
Provided by: WSE958
Category:

less

Transcript and Presenter's Notes

Title: Interior and Exterior Security Concerns


1
Interior and Exterior Security Concerns
  • Chapter 10

2
Introduction
  • This chapter deals with security concerns that
    could be either interior or exterior problems
    depending on the type of facility
  • Example
  • a freestanding retail outlet store has problems
    of perimeter security that include windows,
    doors, and roof
  • the same store located within the confines of a
    mall may not be as concerned with the windows and
    doors or with perimeter defense

3
Buildings On Or As The Perimeter
  • The building forms part of the perimeter barrier
  • The building walls are the entire perimeter of
    the facility
  • When a fence joins the building as a continuation
    of the perimeter
  • there should be no more than two inches between
    the two structures
  • may be wise to double the fence height

4
Windows and Doors
  • Windows and other openings larger than 96 square
    inches
  • be protected by grilles, metal bars, or heavy
    screening
  • when they are less than 18 feet from the ground
  • when they are less than 14 feet from structures
    outside the barrier

5
Windows
  • Most forced break-ins are through window glass
  • Windows should be protected with grillwork, heavy
    screening, or chain-link fencing

6
Burglary-Resistant Glass
  • Uses UL-listed burglary-resistant glass
  • A laminate of two sheets of flat glass (usually
    3/16 inch thick) held together by a 1/16-inch
    layer of polyvinyl butyl, a soft transparent
    material
  • One of the brands of UL-listed polycarbonate
    glazing material
  • Other options
  • Coating glass with a four- to six-mil cover of
    mylar
  • Plastic glazing

7
Doors
  • The required security measures at specific door
    will be determined by
  • The operations in progress within the facility
  • By the value of the assets stored or available in
    the various areas

8
Door Construction and Hardware
  • Locks
  • The operating mechanism
  • The keying device
  • The latch or bolt
  • The locking bolt must throw at least an inch into
    the jamb for security applications
  • Use heavy wood or metal doors with reinforced
    jambs
  • Employ a hardened steel key cylinder guard
  • Hinges should be installed
  • With the screws concealed
  • With the hinge pins either welded or flanged to
    prevent removal

9
Attacks Against Locks
  • Picking the lock or making a key by impression
    are the methods generally used
  • Picking
  • Metal picks are used to align the levers, pins,
    discs or tumblers as an authorized key would
  • Keying
  • Making a key by taking impressions

10
Locks as Delaying Devices
  • Install special pick-resistant,
    impression-resistant lock cylinders
  • More expensive
  • Every lock will eventually yield to an attack
  • Should be thought of as only a delaying device
  • The longer the delay the better

11
Removable Cores
  • Used where locks are changes often
  • Made to be removed if necessary with a core key,
    allowing a new core to be inserted

12
Keying Systems
  • The change key
  • One key to a single lock within a master-keyed
    system
  • The submaster key
  • Will open all the locks within a particular area
    or grouping in a given facility
  • The master key
  • Where two or more submaster systems exist, a
    master key system is established
  • The grand master key
  • One that will open everything in a system
    involving two or more master-key groups

13
Rekeying
  • Outer or perimeter locks usually be changed first
  • Old locks can be moved to interior spaces
    requiring
  • Lower level of security

14
Key Control
  • Try to keep keys in the hands of security or
    management personnel
  • Keys should never be issued on a long-term basis
    to outside janitorial personnel
  • It is bad practice to issue entrance keys to
    tenants of an office building
  • A guard or building employee should control entry
  • The security department must maintain a careful,
    strictly supervised record of all keys issued
  • When a key is lost, the circumstances should be
    investigated
  • Master keys should be kept to a minimum

15
Other Operating Mechanisms for Access Control
  • Combination locks
  • Have three dials that must be aligned in the
    proper order before the lock will open
  • Code-operated locks
  • Opened by pressing a series of numbered buttons
    in the proper sequence
  • Card-operated locks
  • Presenting a card and code to open lock

16
Advantages of Access Control Systems
  • Security staff no longer need to spend hours
    rotating key cores and keeping detailed logs.
  • Card keys can be programmed to function in a
    variety of ways.
  • Lost cards can be deactivated in a matter of
    seconds.
  • The systems often allows tracking of the time and
    number of entries at a given site

17
Types of Card-Operated Systems
  • Magnetic coded cards
  • Contains a flexible magnetic sheet sealed between
    two sheets of plastic
  • Wiegan Effect cards
  • Short-length magnetic wires embedded within the
    card
  • Optical coded cards
  • Contain bar codes
  • Proximity cards
  • Send a code to a receiver via magnetic, optical,
    or ultrasonic pulses
  • Radio Frequency Identification (RFID)
  • Radio frequency identification

18
Types of Card-Operated Systems (Cont.)
  • Biometric systems
  • Designed to recognize biological features
  • Fingerprint recognition systems
  • Optically scan a chosen fingerprint area and
    compare the scanned area with a file
  • Hand geometry recognition systems
  • Use the geometry of the hand

19
Locking Devices
  • Electromagnetic locking devices
  • Hold doors closed by magnetism
  • Double-cylinder locking devices
  • Installed in doors that must be secured from both
    sides, requiring a key to open them from either
    side
  • Most common application is in doors with glass
    panels
  • Emergency exit locking devices
  • Panic-bar installations

20
Roofs and Common Walls
  • Often overlooked part of the perimeter is the
    roof
  • Entry can be made through skylights or by
    chopping through the roof
  • Common Wall
  • Frequently been entered by breaking through the
    wall from a poorly secured neighboring occupancy

21
Surveillance Devices
  • Normally conducted by patrolling security
    personnel
  • Technology can be used
  • Motion picture cameras
  • Sequence cameras
  • Closed- circuit television (CCTV) monitors with
    video cameras

22
Effective Surveillance Systems
  • Should produce an identifiable image of persons
    engaging in criminal behavior
  • CCTV systems coupled with recording equipment or
    computers should be used

23
Technological Advances In CCTV
  • Reduced size of the camera
  • Reduced price of color cameras
  • Improved reliability of color cameras
  • Starlight cameras
  • Allow for good video reproduction in low light
    situations

24
CCTV Cameras
  • Variables to be considered during a site survey
  • Is the camera to be visible and used as a
    deterrent to crime or hidden and used in civil or
    criminal prosecutions?
  • What effect, if any, will the sun have on the
    operation of the system?
  • Where is the best location for a camera?
  • Should the placement of the camera be high?
  • What type of lighting is in use?

25
New Construction
  • Modern construction creates offices that are
    essentially open-top boxes
  • Any given floor of a building has a crawl space
    that runs from exterior wall to exterior wall

26
Security at the Building Design Stage
  • Architects interest in design for protection of
    buildings and grounds is usually minimal
  • Recent events may prompt designers to consider
    the incorporation of security in their designs.

27
Security Principles in Design
  • Considerations
  • The number of perimeter and building openings
    should be kept to a minimum consistent with
    safety codes.
  • Perimeter protection should be planned as part of
    the overall design.
  • Exterior windows, if they are less than 14 feet
    above ground level, should be constructed of
    glass brick, laminated glass, or plastic
    materials, or they should be shielded with heavy
    screening or steel grilles.

28
Security Principles in Design (Cont.)
  • Points of possible access or escape that breach
    the exterior of the building or the perimeter
    protection should be protected. Points to be
    considered are skylights, air conditioning vents,
    sewer ducts, manholes, or any opening larger than
    96 square inches.
  • 5High-quality locks tied to smart card technology
    should be employed on all exterior and restricted
    area doors for protection and quick-change
    capability in the event of cardkey loss.
  • Protective lighting should be installed.
  • Shipping and receiving bays should be widely
    separated from each other.

29
Security Principles in Design (Cont.)
  • Exterior doors intended for emergency use only
    should be fitted with alarms.
  • Exterior service doors should lead directly into
    the service area so that non-employee traffic is
    restricted in its movement.
  • Dock areas should be designed so that drivers can
    report to shipping or receiving clerks without
    moving through storage areas.
  • Employment offices should be located so that
    applicants either enter directly from outside or
    move through as little of the building as
    possible.

30
Security Principles in Design (Cont.)
  • Employee entrances should be located directly off
    the gate to the parking lot
  • Employee locker rooms should be located by
    employee entrance and exit doors.
  • Doors in remote areas should be fitted with
    alarms.
  • Dock areas should be designed so that drivers can
    report to shipping or receiving clerks without
    moving through storage areas.
  • Employment offices should be located so that
    applicants either enter directly from outside or
    move through as little of the building as
    possible.

31
Security Principles in Design (Cont.)
  • Employee entrances should be located directly off
    the gate to the parking lot.
  • Employee locker rooms should be located by
    employee entrance and exit doors.
  • Doors in remote areas should be fitted with alarms

32
Chapter 11
  • The Inner Defences Intrusion and Access Control

33
Introduction
  • Minimize or control access to the facilitys or
    the buildings interior
  • Control traffic without interfering with the
    function of the business
  • Consider
  • The need to protect against the internal thief as
    well as the potential intruder

34
Points of Examination
  • Doors
  • Doors to Sensitive Areas
  • Telephone equipment rooms
  • Computer installations
  • Research and development
  • Equipped with automatic door-closing devices
  • Fitted with strong dead bolts and heavy latches
  • Supply room
  • Test room
  • Secured whenever those rooms are not in use

35
Points of Examination (Cont.)
  • Office Area Doors
  • Minimum-security areas during regular working
    hours
  • When there is little or no use of the office
    area, these doors should be secured
  • Traffic Patterns
  • Doors must be examined in an effort to establish
    a schedule for their use
  • Authorized employee entrances
  • To protect against surreptitious use, a door
    should be fitted with at least a local alarm

36
Points of Examination (Cont.)
  • Traffic Control
  • Traffic in and out and within a facility
  • Perimeter barriers
  • Locked doors
  • Screened windows
  • Identification of employees and visitors
  • Directing or limiting their movements
  • The control of all incoming and outgoing packages
  • The control of trucks and private cars

37
Visitors
  • All visitors should be required to identify
    themselves
  • Sales, service, and trade personnel should
    receive clearance in advance on making an
    appointment
  • All traffic patterns involving visitors should be
    short, physically confined to keep them from
    straying

38
Employee Identification
  • Identification of employees by guards or
    receptionists
  • Large businesses the opportunity for error high
  • The use of badges or identification cards
  • Should designate when, where, how, and to whom
    passes
  • Should contain a clear and recent photograph of
    the bearer
  • Photograph should be at least one inch square
  • Should be laminated and of sturdy construction 3

39
Package Control
  • Control of packages entering or leaving the
    premises
  • Must be dealt with in order to prevent
  • Theft
  • Misappropriation of company property
  • concealment of dangerous materials
  • Packages brought in should be checked for content

40
Files, Safes, and Vaults
  • The high- security storage areas
  • Papers
  • Records
  • Plans
  • Cashable instruments
  • Precious metals
  • Choice of the proper security container
  • Protective containers are designed to secure
    against either burglary or fire

41
Files
  • Filing cabinets with a fire rating of one hour
  • Filing cabinets should be fitted with a
    combination lock

42
Safes
  • Record safe (fire-resistant)
  • Money safe (burglary-resistant)
  • Safes are rated to describe the degree of
    protection they afford
  • The more protection provided, the more expensive
    the safe

43
Record Safes
  • Fire-resistant containers
  • UL rating of 350-4 (formerly designated A) can
    withstand exterior temperatures building to
    2000F for four hours without permitting the
    interior temperature to rise above 350F
  • Explosion impact containers
  • Computer media storage containers
  • Insulated vault-door

44
Money Safes
  • Burglary-resistant safes
  • Heavy metal boxes without wheels
  • Weighs at least 750 pounds
  • Have a limited holding capacity

45
Securing the Safe
  • Safe should be securely fastened to the structure
  • It is becoming a common practice to install the
    safe in a concrete floor
  • Only the door and its combination are exposed

46
Vaults
  • Basically enlarged safes
  • The door is usually of high-quality, reinforced
    concrete
  • 6 inches thick
  • May be as much as 24 inches thick
  • Walls, ceiling, or floor
  • Never less than 12 inches thick
  • A difficult architectural problem
  • Situated at or below ground level

47
Inspections
  • Guard Patrols
  • Visual inspections by irregular patrols through
    office spaces
  • Sweep the facility after closing time
  • Patrols should be made at least once each hour
  • More often if the area and the size of the guard
    force permit

48
Alarms
  • Alarm systems permit more economical use of
    security personnel
  • Alarm systems may also substitute for costly
    construction of barriers

49
Kinds of Alarm Protection
  • Intrusion alarms
  • Signal the entry of persons into a facility or an
    area while the system is in operation
  • Fire alarms
  • Warn of fire dangers in various stages of
    development
  • Special-use alarms
  • Warn of a process reaching a dangerous
    temperature
  • The presence of toxic fumes
  • That a machine is running too fast

50
Alarm System Elements
  • An alarm sensor
  • A device that is designed to respond to a certain
    change in condition
  • A circuit or sending device
  • A device that sends a signal about whatever is
    sensed to some other location
  • An enunciator or sounding device
  • A sounding device, which is used to alert someone
    that the sensor has detected a change in
    conditions

51
Boundary-Penetration Sensors
  • Vibration Sensors
  • Passive line sensors, either visible or covert
  • Detect the movement of the surface to which they
    are fastened
  • Sudden impact to a surface cause vibrations at
    certain frequencies which are picked up by the
    sensor

52
Vibration Sensors
  • Provide early warning of a forced entry
  • Some detectors may create nuisance alarms if
    mounted on walls or structures that are exposed
    to external vibration

53
Interior Motion Sensors
  • Microwave Sensors
  • Ultrasonic Sensors
  • Active Sonic Sensors
  • Passive Infrared Sensors
  • Dual Technology Sensors
  • Video Motion Detectors

54
Alarm Monitoring Systems
  • The central station
  • This is a facility set up to monitor alarms
    indicating fire, intrusion, and problems in
    industrial processes
  • Proprietary system
  • This functions in the same way as does a central
    station system except that it is owned and
    operated by the company rather than a contractor

55
Alarm Monitoring Systems (Cont.)
  • Local alarm system
  • The sensor activates a circuit that in turn
    activates a horn, a siren, or even a flashing
    light located in the immediate vicinity of the
    area fitted with alarms
  • Auxiliary system
  • Installation circuits are connected to local
    police or fire departments or 911 Centers by
    leased telephone lines

56
Alarm Monitoring Systems (Cont.)
  • Local alarm-by-chance system
  • This is a local alarm system in which a bell or
    siren is sounded with no predictable response
    (car alarms)
  • Dial alarm system
  • This system is set to dial a predetermined
    telephone number or numbers when the alarm is
    activated

57
Cost Considerations
  • The effectiveness of any alarm procedure lies in
    the response it commands
  • Most alarms takes no action it only notifies
    that action should be taken
  • Cost can be substantial
  • Alarm installations are made in order to reduce
    the size of the guard force
Write a Comment
User Comments (0)
About PowerShow.com