Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
15Activity

Table Of Contents

THE MANAGEMENT FUNCTION
Asset Protection — A Historical Perspective
DEFINITION OF ASSETS PROTECTION
BASIC CONSIDERATIONS
Countermeasures Planning
Management Support
Communicating the Plan
Statutory and Regulatory Requirements
THE SYSTEMS APPROACH
COUNTERMEASURES
People
Hardware
Software
THE SYSTEM TEST
Selected Bibliography
Protection of Assets Scoring Sheet
INTRODUCTION
DEFINING THE PROBLEM
LOSS EVENT PROBABILITY OR FREQUENCY
Probability Factors
Historical Experience
Application of Probability Factors Analyses
Checklists
Risk Matrix
Probability Ratings
Rating Symbols
LOSS EVENT CRITICALITY
The Criticality Concept
Kinds of Costs to Be Considered
Permanent Replacement
Temporary Substitute
Related or Consequent Cost
Lost Income Cost
Cost Abatement
A Cost-of-Loss Formula
Criticality Ratings
ALTERNATIVE APPROACHES TO CRITICALITY
Establishing Priorities
PREPARING A SOLUTION
Threat Analysis
Leverage
NETWORK DESIGN
SOLVING THE PROBLEM
Countermeasures
Systems Evaluation Technique
Part 4: Internal Activity
Part 5:Physical Safeguards
Part 6:Fire and Disaster
Part 7:Controls
Part 8:Indemnity
APPENDIX B BASIC MATRIX
BARRIER CATEGORIES
BUILDING SURFACES
Roofs, Floors and Walls
Roofs
Exterior Walls
Concrete Structures
Floors
Interior Walls
Ceilings
EVALUATION OF BUILDING SURFACES
BUILDING OPENINGS
Doorways
Windows
Other Openings
Concrete Block Barriers
BOMB PROTECTION
VEHICLE BARRIERS
BASIC LOCK GROUPING
Mechanical Locks
The Warded Lock
The Lever Lock
The Pin Tumbler Lock
The Wafer Tumbler Lock
Dial-Type Combination Locks
Electronic Dial-Type Combination Lock
MASTER KEYING MECHANICAL LOCKS
Master Keying the Lever Lock
Master Keying the Wafer Lock
Master Keying the Pin Tumbler Lock
SECURITY VULNERABILITIES OF MECHANICAL LOCKS
Attack by Force
Surreptitious Attack
Picking
Attack by Impression Making and “Try” Keys
Rearranging Mechanical Locks
Rotation of Cylinders
Electric Lockset
Exit Device
Electromagnetic Lock
SENSOR APPLICATIONS
Security Applications
UL Standards
ASTM Standards
Other Standards and Specifications
CATEGORIES OF SENSORS
Passive Infrared (PIR) Sensors
PIR Design
Application and Installation
Glass Break Sensors
Acoustic Sensors
Shock Sensors
Dual-Technology Sensors
Electromechanical Sensors
Foil
Magnetic and Mechanical Switches
Wire and Screen Detectors
Pressure Mats
Ultrasonic Sensors
Microwave Sensors
Capacitance Sensors
Shock and Vibration Sensors
Audio Sensors
Photoelectric Sensors
Other Sensors
Closed-Circuit Televsion
Balanced Pressure Sensor
Chemical Sensors
Alarm Transmission and Control Panels
Combinations Of Sensors
SENSORS FOR FIRE DETECTION
Stages of Fire
Sensor Types and Selection
Fixed-Temperature Sensors
Rate-of-Rise Sensors
Smoke or Combustion Product Sensors
Water Flow Indicators
Emerging Technology
ALARM TERMINATION
Local Alarm Termination
Central Station Termination
Reliability
Direct Police or Fire Department Termination
Proprietary Termination
Termination Combinations
SYSTEMS DESIGN
COST REDUCTION AND PROTECTION IMPROVEMENT
Protection Enhancement
Patrol Reduction
Closed-Circuit TV and Personnel Reductions
THE AUTOMATED SECURITY SYSTEM
Centrally Controlled Systems
Systems Computer Applications
Control Center Equipment
Costs
Personnel Control
Identification
Physical Control at Access Points
Other Security System Tasks
Monitoring of Sensors
Supervision of Protection Personnel
Time and Attendance Recording
Programming the System
System Expansion and Flexibility
The Control Center
EMERGENCY POWER
Standby and Continuous Emergency Power
Standby Power
Continuous Power
APPENDIX A GLOSSARY OF FREQUENTLY USED SECURITY TERMS
APPENDIX B GLOSSARY OF FREQUENTLY USED FIRE TERMS
BASIC ACCESS CONTROL OBJECTIVES
GRANTING/DENYING ENTRY
Locks
Push-Button Locks
Touchpads
Telephone Entry Systems
Turnstiles
Pedestrian Passageway
Exit Control
Exit Hardware
Delayed Exit
AUTHORIZED ACCESS CONTROL
Large Systems
The Access Control Sub-System
Operational Requirements
Equipment Requirements
Durability
Maintainability
CODED CARD TECHNOLOGY
Magnetic Stripe Cards
Watermark Magnetics
Barium Ferrite
Wiegend Wire
Proximity/Contact Readers
Resonant Circuits
Radio Frequency Readers
Biometric Technology
Dielectric Readers
Embossing Readers
Hollerith Readers
Optical Character Readers
Smart Card
Smart Card Encryption
DISTRIBUTED INTELLIGENCE SYSTEMS
SPECIAL ACCESS FEATURES AND APPLICATIONS
Anti-Passback
Two-Man Rule
Mantrap
Sally Port
Gatehouse
Vehicle Parking Garages
Limit Operating Hours
No Guard Placed at the Entrance
User-Friendly Entry and Exit
Accommodating Visitors and Contractors
Accommodating Car Pools
Traffic Control
Excluding Unauthorized Pedestrians
Controlling Garage-to-Building Access
Emergency Alarms
CCTV in Garages and Parking Lots
Mixing Employee and Public Parking
Campus Parking
Elevator Control
Janitor’s Privileges
Other Miscellaneous Applications
Office Equipment
Tools and Inventory
Personal Equipment at Work
Personal Safety
Monitoring Prisoners
Hotels and Motels
Dressing Rooms at Performing Art Centers
WEAPONS AND CONTRABAND SCREENING
Physical Configuration
Screening Policies and Procedures
Metal Detectors
X-Ray Inspection
Explosives Detectors
Periodicals
Organizations Associated with Smart Cards
THE FIRST STEP
ADVANCE PLANNING
Stages of an Incident
Types of Threats and Contingencies
Types of Contingency Plans
Planning Formats
Development of the Plan
Planning Process
Special Planning Needs
Components of an Emergency Plan
PLANNING ISSUES AND CONSIDERATIONS
Priorities
Planning Assumptions
Command/Management and Control
Crisis or Emergency Management Team
Alternate designations
Management/Command Succession
Continuity of Operations (COOP)
External Liaison and Coordination
Planning Liaison
Emergency Response Agencies
Mutual Aid
Public Affairs/Media Relations
Family/Victim Support
Emergency Medical Services
Security and Fire Protection
Alert and Warning System
Emergency Evacuation
Emergency Shutdown and Restoration
Resources and Logistics
Transportation
Other Considerations
AFTER THE PLAN IS WRITTEN
Training, Drills and Exercises
Keeping the Plan Up-to-Date
APPENDIX A COMPANY DISASTER CONTROL PROGRAM POLICY
General
Procedure
Equipment to Consider:
Services to Consider:
ENCODING DIGITAL DATA
PROCESSING DIGITAL DATA
A TYPICAL CENTRAL PROCESSING UNIT
THE IMPACT OF LARGE-SCALE INTEGRATION
A TYPICAL INFORMATION SYSTEM
The Computer and Network Hardware
Computer System Software
The Application Programs
Physical Facilities
An Operating Staff
User Training
Activity Monitoring
CLASSES OF COMPUTERS
Mainframe Computers
Minicomputers
Personal Computers
Laptop Computers
THE EVOLUTION OF INFORMATION SYSTEMS
The 1960s: Batch Processing Mainframe Systems
The 1970s: Online Information Processing Systems
Local Area Networks
Wide Area Networks
Internet: The Public Network
Distributed, Three-Tier Information Systems
WHAT IS INFORMATION SYSTEMS SECURITY?
IS INFORMATION SYSTEMS SECURITY IMPORTANT?
THE EVOLUTION OF INFORMATION SYSTEM RISKS
Batch System Risks
Online Information Systems Risks
Local and Wide Area Network Risks
Internet Risks
Distributed Systems
MANAGEMENT OF INFORMATION SYSTEMS SECURITY
FUNCTIONAL DEFINITION OF INFORMATION SYSTEMS SECURITY
ROLES AND RESPONSIBILITIES
Senior Management
Information Systems Security Program Management
Information Systems Operational Management
Supporting Functions
Users
Policy Implementation
Standards
Procedures
INFORMATION SYSTEMS SECURITY PROGRAM MANAGEMENT
Risk Assessment Techniques
Threat Occurrence Rate Estimates
The Spectrum of Expected Losses
The Spectrum of Risk Management Actions
Four Reasons for Adopting a Security Measure
How to Address Low–High Risks
INFORMATION SYSTEMS SECURITY AND PLANNING
Initiation
Development and Acquisition
Implementation
Operation and Maintenance
Disposal
OPERATING AND USER CONTROLS
Staffing
Job Descriptions
Work Schedules
Personnel Selection
Personnel Reassignment or Termination
AUDIT TRAILS AND TRANSACTION LOGS
Audit Trail Integrity
Operational Use of Audit Trails
THE INTERNET
Confidentiality and Authentication
Reliability and Response Time
Using a Value-Added Network
Hacker Attacks
Making Wise Use of the Internet
PUBLIC- AND PRIVATE-SECTOR INVESTIGATIONS
INVESTIGATIONS — IN GENERAL
QUALITIES OF AN EFFECTIVE INVESTIGATION
Objectivity
Thoroughness
Relevance
Accuracy
Timeliness
Investigative Resources
Cost Elements
Sources of Information
Online Investigations
LEGAL GUIDELINES
Local Licensing Statutes
Civil and Criminal Suits and Actions
Defamation
False Imprisonment
INVESTIGATIVE REPORTS
Types of Reports
Initial Report
Progress Report
Special Report
Final Report
Parts of the Report
Administrative
Summary
Narrative
Conclusions and Recommendations
Enclosures
Report Distribution
APPENDIX A SELECTED INTERNET INVESTIGATIVE RESOURCES
APPENDIX B
LIGHTING SYSTEMS
LIGHTING ECONOMICS
STARTING AND RE-STRIKE
SECURITY LIGHTING APPLICATIONS
Perimeter Fencing
Site Landscape and Perimeter Approaches
Building Facade
Parking Structures
Open Parking
Loading Docks
Security Control and Monitoring Rooms
Guard and Gate Houses
SECURITY LIGHTING AND CLOSED-CIRCUIT VIDEO SYSTEMS
STANDARDS FOR SECURITY LIGHTING LEVELS
CPTED Fundamentals
UNDERSTANDING CPTED: THEORY, HISTORY AND PRACTICE
BASIC CRIME PREVENTION ASSUMPTIONS
CONTEMPORARY THINKING ON CRIME AND CRIMINALS
Target Selection
Concept of Capable Guardian
Criminal Choice
Situational Crime Prevention
Potential Offenders’ Perspective
Defensible Space
Tim Crowe and CPTED
CPTED Survey
CONCEPTS OF RISK MANAGEMENT
REDUCING CRIME THROUGH PHYSICAL DESIGN
Introduction to Planning the Building
The Architectural Planning Process
Effective Access Control
SITE DEVELOPMENT AND SECURITY ZONING
Privacy versus Security
SECURITY DESIGN CRITERIA FOR PARKING FACILITIES
DESIGN CONSIDERATIONS FOR INDUSTRIAL BUILDINGS
DESIGN CONSIDERATIONS FOR OFFICE BUILDINGS
Asset to Be Protected: People
Asset to Be Protected: Information
Asset to Be Protected: Property
SUMMARY
FEDERAL AND STATE CONSTITUTIONS
STATUTORY LAW
DEFINITION AND CLASSIFICATION OF CRIMES
Federal Criminal Law
Definition of Federal Crimes
Definition of State Crimes
The Essential Character of a Crime
Criminal Intent
Establishing Guilt for Crime
Formal Charge
Arraignment
Trial
Sentence
Confinement
CASE OR DECISIONAL LAW
Federal and State Constitutions
RELEVANCE TO ASSET PROTECTION
Crimes Based upon Unauthorized Entry or Presence
Crimes Based upon Theft or Larceny
Permissible Use of Force
IMPORTANT PROCEDURAL CONSIDERATIONS
Arrests
Federal or State Law
With or Without a Warrant
Interviews and Interrogations
Searches and Seizures
Entrapment
SPECIFIC CRIMINAL STATUTES OF SECURITY INTEREST
The Economic Espionage Act
Eavesdropping Statutes
Pertinent Federal Law
Summary of Federal Law
State Laws
Number of Government Interceptions
DECEPTION DETECTION INSTRUMENTS
Federal Polygraph Legislation
Broad Interpretations of the EPPA
Definitions
Exemptions
Admissibility of Polygraph Results in Evidence
Voice Stress Analyzer
CONCLUSION
MAJOR BRANCHES
Federal Statutory Law
State Statutory Law
Important Areas of Statutory Law
Administrative Law
CIVIL COMMON LAW
Major Areas of Civil Common Law
Contract Law
Express Contract
Implied Contract
Agency
How Agency Is Determined
The Significance of an Agency
Vicarious Liability
TORTS IN GENERAL
Willful Torts
Negligence
Civil Rights under Statute
The Trend in Civil Rights
Discrimination Based on Disability
DEVELOPING THE ORGANIZATION
Who Is the Customer?
DEFINITION OF RESPONSIBILITIES
PROGRAM IMPLEMENTATION
Top Management Responsibility
Involvement of Others
COMMUNICATIONS
STAFFING THE PROTECTION ORGANIZATION
Article I
Article II
Article III
Article IV
Article V
Article VI
Article VII
DIFFERENT TYPES OF RESPONSES
SOME PRELIMINARY CAUTIONS
VERBAL RESPONSES
Verbal Profiles
NONVERBAL RESPONSES
Activities Suggesting Deception
Comparative Postures
Eye Contact
THE BEHAVIOR ANALYSIS INTERVIEW
What Is a Behavior Analysis Interview?
Behavior-Provoking Questions
THE REID NINE STEPS OF INTERROGATION
The Positive Confrontation
Theme Development
Handling Denials
Overcoming Objections
Keeping a Suspect’s Attention
Handling a Suspect’s Passive Mood
Presenting an Alternative Question
Having the Suspect Relate Details
Converting an Oral Confession
OVERVIEW
THE CONCEPT OF THREAT MANAGEMENT
The Focus of a Threat Management Program
LIABILITY AND LEGAL CONSIDERATIONS
THE PSYCHOLOGICAL DYNAMIC OF WORKPLACE VIOLENCE
PRE-EMPLOYMENT SCREENING
PHYSICAL SECURITY
Employee and Visitor Identification
Lighting
Closed-Circuit Television (CCTV)
Furniture and Equipment Configuration
POLICY STATEMENT AND REPORTING PROCEDURE
THE INCIDENT MANAGEMENT PROCESS
Notification of a Potential or Actual Problem
ASSESSMENT PHASE
Initial Information Collection by the DMR
Initial Contact
Additional Interviews
Decision to Interview in Person or by Phone
Selection of the Interview Site
Decision to Secure the Interview Site
Analysis of Initial Information
Extensive Background Investigation of the Offender
Location of Any Prior Relevant Data
Information Sources
Law Enforcement Liaison
Decision to Interview the Offender
Site Selection
Site Preparation
Training of Interview Participants
Summary Assessment and Plan for Further Action
Plan in Event of Termination
Company Personnel Selected for Interview
Site Selection and Preparation
Time of the Interview
Planning Communications with the Offender
Plan for Exit of Offender from Company Property
Extended Security and Incident Monitoring
Sizing Up the Threat
Establishment of the Reaction Response Plan
Protective Team’s Responsibility
0 of .
Results for:
No results containing your search query
P. 1
Asset Protection and Security Management Handbook

Asset Protection and Security Management Handbook

Ratings: (0)|Views: 1,133 |Likes:
Published by COREeye67
CURRICULUM
CURRICULUM

More info:

Published by: COREeye67 on Feb 08, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/21/2013

pdf

text

original

You're Reading a Free Preview
Pages 12 to 65 are not shown in this preview.
You're Reading a Free Preview
Pages 77 to 119 are not shown in this preview.
You're Reading a Free Preview
Pages 131 to 484 are not shown in this preview.
You're Reading a Free Preview
Pages 502 to 582 are not shown in this preview.

Activity (15)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
andokolampung liked this
Granger Miller liked this
doubleedgemirrow liked this
nolimitdoom liked this
Joseph Andy liked this
Amata P liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->