You are on page 1of 42

Company Name

Your company tagline

Mission
statement: Your
companys mission
goes here

20XX

20XX

20XX

20XX

Physical security is a

The solution

combination of physical and


procedural measures
designed to prevent or
mitigate threats or attacks
against people, information
and assets. Often a measure
designed to meet one
particular physical security
goal that may address
others.

1.Deter
2.Detect
3.Delay
4.Assess

5.Respond

Goals of Physical
Security

1. Deter - these are measures that adversaries perceive as too


difficult or needing special tools and training to defeat.
2. Detect - these are measures implemented to determine if an
unauthorised action is occurring or has occurred.
3. Delay - these are measures implemented to:
impede an adversary during an attack
slow the progress of a detrimental event to allow a response
before agency information or physical assets are compromised.
4. Assess- these are measures taken once an agency is aware
of an attack or event to prevent, resist or mitigate the attack or
event.
5. Respond - these are measures taken to restore operations to
normal (as possible) following an incident.

It should address all hazards an agency may face in the


protection of people, information, functions and physical assets
including:
1. civil disturbance, for example, riots, insurrections and protests
2. crime, including personal and property crimes
3. workplace violence such as assault, harassment and revenge attacks
4. terrorism, including bombing, extortion, white powder incidents and
kidnapping
5. natural disasters such as flood, bush fire, earthquake and pandemics
6. industrial disasters, including explosions, building fires, structural collapse
and other major accidents
*other risks, for example, disturbed persons and traffic accidents.

Personnel
Security

Major
Elements

Physical Security

Information
Security

The team

Customers

Employees

Visitors

Contractors
and
Consultant

Interruption of services

Information
Security

Theft
Physical damage
Unauthorized disclosure
Loss of system integrity

Theft
HVAC
Access

Six key
Threats

Shoulder
Surfing

Espionage

Dumpster
Diving
Social Engineering

Before the theft


Establish a line of succession for this function; trains all people in that
line to conduct the responsibilities of this function.
Maintains and regularly updates contact information for staff members.
Maintains and regularly updates contact information for workers
compensation insurance carrier and clinics, and employee assistance
program (EAP) or other counseling services to assist in dealing with staff
injuries or trauma.
Maintains and regularly updates contact information for bank contacts
and other financial agencies.
Working with Security, establishes policy on background checks for
personnel with access to collections.

After the theft


If staff members are suspected in the incident, coordinates with Legal on employee relations
issues.Coordinates with workers compensation carrier and clinics to assist with any staff
injuries.
Coordinates with EAP or other counseling services to assist with response to staff trauma or
emotional needs. In coordination with the Director and Board, makes financial resources
available to respond to the incident, including for Private Investigators, public relations firms,
psychological assistance, etc.
With Director and Communications/PR, coordinates and disseminates appropriate
information to staff.
Cooperates with law enforcement and develops a plan for lockout pay, as needed.
Coordinates with Communications/PR to update staff on when to return to work. In the
event of closure to visitors, coordinates with Director and Communications/PR to consider
refunds to public for admission, food service, etc. Keeps records of expenses incurred in
responding to and investigating incident, including for additional security, private investigator,
etc. Regularly reports progress and actions to Director. Administrator

Layered Defense Model


Crime Prevention Through
Environmental Design

Personnel
Security

Site Location
Facility Construction
Impacts
Infrastructure Support
Systems

Crime Prevention Through


Environmental Design
The physical environment of a building is changed or managed to produce
behavioral effects that will assist in reducing the incidence and fear of
crime.
Focuses on the relationships between the social behavior of people and
the environments.

Crime Prevention Through


Environmental Design
Three Key Strategies
Territoriality - people protect territory that is their own
Surveillance - high degree of visual control
Access Control - limit access and control the flow of
access

Site Location
Security should include where the building is and how it
should be built.

Crime?
Riots?
Natural disasters?
Adjacent buildings?

Airport?
Highway?
Military Base?
Emergency support
systems?

How it works
Step 3
Step 1

Facility and
Construction
Issues

Step 2

Infrastructure
Support System

Fire and
Ventilation System

Infrastructure Issues
Walls, Windows, and Doors
Entry Points
Primary & secondary entrances
Windows
Roof access
Maintenance entrance
Emergency exits
Loading docks

Doors
Do not block exit doors
Provide sufficient and appropriate
lock mechanics
Hinges securely fixed to the frames
Frame securely fixed to the
adjoining wall.

Infrastructure Support
System
Infrastructure Support Systems include
electrical power, water/plumbing, steam,
gas lines, and heating, ventilation, air
conditioning (HVAC), and refrigeration.

Support System Threats

Fire
Best Practices
Fire Containment System (floors, vents, HVAC)
Fire Extinguishing System (permanent & mobile)
Abiding by the Fire Codes
Fire Prevention Training and Drills

Fire
Fire Prevention reduce causes of fire.
Fire Detection - receive warnings of fire
before it becomes a problem.
Fire Suppression - how to extinguish and
contain a fire to minimize damage.

Fire Prevention
Use fire resistant materials for walls, doors, furnishings, etc.
Reduce the amount of combustible papers around electrical
equipment.
Provide fire-prevention training to employees - remember, life
safety is the most important issue.
Conduct fire drills on all shifts so that personnel know how to
safely exit a building.

Fire Detection
Ionization-type smoke detectors detect charged particles in
smoke.
Optical (Photoelectric) detectors react to light blockage caused by
smoke.
Fixed or rate-of-rise temperature sensors - heat detectors that
react to the heat of a fire.
Combinations are usually used for the best effectiveness in
detecting a fire.

Fire Types and Suppression

Fire Suppression
Water Sprinkler Systems
Water could be a conductor of electricity - it may compound the
problems in computer rooms.
Water can cause damage to electrical equipment.
Pre-action or dry-pipe system - water is held back by a valve
and is released when the sensor activates.

Electrical Power
Disruptions in electrical power can have a serious business
impact.
Goal is to have clean and steady power.
Dedicated feeders
Alternate power source
Access Controls
Secure breaker and transformer rooms

Heating, Ventilation and Air


Conditioning Practices
HVAC
Temperature Controls Protection
Emergency Detection System
Auto Shutoff Mechanisms
Proper Maintenance

Earthquake Preparedness
1.
2.
3.
4.

Eliminate Potential Hazards


Train Employees
Business Emergency Plan
Emergency Supplies

Sexual harassment in the


workplace
Sexual harassment is unwelcome sexual behaviour, which could be
expected to make a person feel offended, humiliated or intimidated. It can
be physical, verbal or written.
Sexual harassment is covered in the workplace when it happens:
1. at work
2. at work-related events
3. between people sharing the same workplace
4. between colleagues outside of work.

The law
Sexual harassment is against the law. Some types of sexual
harassment may also be offences under criminal law and should
be reported to the police, including indecent exposure, stalking,
sexual assault and obscene or threatening communications,
such as phone calls, letters, emails, text messages and postings
on social networking sites.

Republic Act 7877 Anti-Sexual Harassment


Act of 1995

Guidelines and Security


Policies
Id Badges worn at all times in visible location.
Escort visitors both to and from your office.
Prevent access of unauthorized visitors (tailgating and piggybacking).
Do not prop secured doors open.
Tailgating occurs when an unauthorized person enters a secure area by
following closely behind an authorized cardholder.
Piggybacking occurs when an authorized person gains access to a
secure area and allows others to followby holding open a secured
door, for example.

Dont let anyone in if they cant get in themselves.


Everyone must show ID and insist on seeing ID from people you dont
know.
Dont let strangers mess with anything even if they do have an ID.
Escort visitors to departments. Dont let them wander around.
Lock office doors while not there.
Lock your workstation when away from desk or cubicle.
Be attentive to any visitors who seem confused or out of place.
Address anyone you don't know who may be wandering or looking
around your office. Note their appearance, behavior, etc., and report
any unusual activity immediately.

Duties and Responsibilities of


a Security personnel
1 . To be clearly visible
2. To be vigilant
3. To respond quickly and correctly during crisis
4. Observing and reporting
5. Getting help
6. Checking and monitoring
7. Maintain order among people
8. Receiving guests
9. Offer safety warnings and tips
10. Performing other special duties

SUMMARY
The goals of physical controls are to prevent, delay, detect,
assess, and appropriately respond to a physical intrusion.
Natural or environmental, utility system, and human-made factors
can all pose threats to physical security.
The three key strategies for crime prevention through
environmental design are territoriality, surveillance, and access
control.
The most important concept to remember when implementing
physical security controls is to ensure the safety of people.

QUIZ

You might also like