You are on page 1of 45

ACCESS CONTROL SYSTEMS

Lesson #13 – Cyber Attacks


Vital Installation Security

Lesson #13 – Cyber Attacks -2


Vital Installation Security
Version 1.00 04/2003
Objectives
• Define access control
• Explain basic access
control concepts
• Describe access
control systems
• Common methods used
to control access
• Access control
guidelines
• Identify equipment
used in access control
• Entry/exit search
Lesson #13 – Cyber Attacks
ACCESS CONTROL SYSTEMS
 Part of the overall security systems used to
determine who and what is permitted to enter
a facility.
 A method used to identify individuals,
packages or vehicles as they pass through a
controlled entrance or exit.

Lesson #13 – Cyber Attacks -4


Vital Installation Security
Version 1.00 04/2003
Access Authorization

 Access Authorization: A process of


making a decision to grant access or
otherwise after proper verification and
identification of a person, package or
vehicle.

Lesson #13 – Cyber Attacks -5


Vital Installation Security
Version 1.00 04/2003
 Manning the entrance
 Controlling traffic
 Vetting of all guests and
staff
 Recording entries/exits
 Detecting surveillance
 Conducting Searches
 Customer care (first
impression)

Objective: control the movement


of vehicles, people and
packages.

Lesson #13 – Cyber Attacks -6


Vital Installation Security
Version 1.00 04/2003
Lesson #13 – Cyber Attacks -7
Vital Installation Security
Version 1.00 04/2003
“ ONYO”
MBWA KALI

BEWARE OF
PICKPOCKETS

Lesson #13 – Cyber Attacks -8


Vital Installation Security
Version 1.00 04/2003
BASIC CONCEPTS

• Must serve the intended


purposes
• Perceived difficulty
• Security zones
(insider/outsider threat)
• Used in tandem with other
physical security systems
• Systems employed
should be commensurate
with the asset protected

Lesson #13 – Cyber Attacks -9


Vital Installation Security
Version 1.00 04/2003
The more difficult it appears
to an intruder to gain access
into a facility, the less he is
likely to attempt to gain
unauthorized entry.

Lesson #13 – Cyber Attacks - 10


Vital Installation Security
Version 1.00 04/2003
A good access control system coupled with other physical
security elements can create a psychological deterrent.

Lesson #13 – Cyber Attacks - 11


Vital Installation Security
Version 1.00 04/2003
ACCESS CONTROL GUDELINES
 Minimum number of
entrances
 Clearly defined barriers
 Complies with the
country’s safety codes
and regulations
 Access control systems
employed must be
commensurate with the
asset protected.
 Security in depth
(concentric rings)
Lesson #13 – Cyber Attacks - 12
Vital Installation Security
Version 1.00 04/2003
Factors to consider

 Cost of the system


 User compatibility
 Enrolment time and effort
 The operating speed
 Error rate
 Imposter resistance
 Profile storage

Lesson #13 – Cyber Attacks - 13


Vital Installation Security
Version 1.00 04/2003
Methods used to control access

 Visual/physical identification
 Unique possession
 Unique knowledge
 Unique biometric

Lesson #13 – Cyber Attacks - 14


Vital Installation Security
Version 1.00 04/2003
Various components of A.C.S

• Locks & key.


• guards
• Identification system.
• Barriers
• Search

Lesson #13 – Cyber Attacks - 15


Vital Installation Security
Version 1.00 04/2003
SEARCH TECHNIQUES

Lesson #13 – Cyber Attacks - 16


Vital Installation Security
Version 1.00 04/2003
• Why do we carry out search?

• How should it be done?

• Do we need equipment?

• When should we carry out search?

• Who do you think needs to be searched?

• What should we be looking for?

• What if we come across what we are looking for?

• What if the subject doesn’t want to be searched?

N/B; Think about customer care vs security

Lesson #13 – Cyber Attacks - 17


Vital Installation Security
Version 1.00 04/2003
Reasons for search
• Prevent entry of prohibited items/unauthorized
people
• Prevent theft

Lesson #13 – Cyber Attacks - 18


Vital Installation Security
Version 1.00 04/2003
This is why we conduct search

Lesson #13 – Cyber Attacks - 19


Vital Installation Security
Version 1.00 04/2003
Search Equipment

• Metal detectors.

• Belly scope mirrors

• X-ray machines

• Explosive detector

machines

• Search dogs

• Manual inspection
Lesson #13 – Cyber Attacks - 20
Vital Installation Security
Version 1.00 04/2003
Points to consider
• Position of entry.

• Gender – female officials for female’s luggage.

• What to search for - Confirm

• Serviceability of detectors/scanner

• Search conduct – tact, quick but thorough, systematic &


methodical approach
• Human rights - avoid violation

• Professionalism – act in accordance with the law.

• Courtesy - compliments

Lesson #13 – Cyber Attacks - 21


Vital Installation Security
Version 1.00 04/2003
Important points to consider during
search.
 Be professional-remain focussed throughout
the search.
 Be systematic in your search.
 Confirm everything
 Consult when you are not sure of anything.
 Consider decency-don’t be too intrusive.
 Record in your notebook anything that is
recovered during search, time among other
details.
 Remain alert all the time.

Lesson #13 – Cyber Attacks - 22


Vital Installation Security
Version 1.00 04/2003
Seacrch observations

 Person Demeanor - blushing

 Eye Contact – evasive glances

 Body Movements – restless, nervous

 Mode of dressing - bulky Clothing

 Protruding object or exposed wires etc

 Peculiarities – frowning

 Any other conduct which is suspicious in


appearance and behavior.
Lesson #13 – Cyber Attacks - 23
Vital Installation Security
Version 1.00 04/2003
Things to avoid during search
 Chewing Gum, eating and drinking.
 Making Phone calls.
 Using abusive or obscene language.
 Sitting.
 Quarrelling-act with decorum.
 Searching clients’ bags or luggage in private;
involve them and your colleagues.
 Searching the opposite gender.
 Begging for money and other materials i.e for
Bank Guards manning ATMs.
Lesson #13 – Cyber Attacks - 24
Vital Installation Security
Version 1.00 04/2003
Factor determining the nature of search

• Prevailing situation
• Environment
• Suspicion
• Find
• Intel

Lesson #13 – Cyber Attacks - 25


Vital Installation Security
Version 1.00 04/2003
How Far can we go during search?

Lesson #13 – Cyber Attacks - 26


Vital Installation Security
Version 1.00 04/2003
Reception desk

• Identity check – names, IDs,


Passports, physical appearance
• Luggage check
• Record/log in
• Observation – detect surveillance
• Movements (give directions)
• Guest friends
• Report suspicion

Lesson #13 – Cyber Attacks - 27


Vital Installation Security
Version 1.00 04/2003
Vehicle Searches

Lesson #13 – Cyber Attacks - 28


Vital Installation Security
Version 1.00 04/2003
Vehicle searches are defensive searches. They are
meant to find explosives or other threats before that
vehicle gets close to a target.

What are the targets: VIPs, government buildings,


special events, hotels, military and police facilities.

Lesson #13 – Cyber Attacks - 29


Vital Installation Security
Version 1.00 04/2003
Vehicle Search Plan

 Stand off distance - how far from the target do


I search

 Exclusion zone - do have barriers to stop a


vehicle from driving around my checkpoint?

 What do I do if:
1. a vehicle does not stop for the checkpoint?
2. a driver suddenly turns around when it sees
the checkpoint?

Lesson #13 – Cyber Attacks - 30


Vital Installation Security
Version 1.00 04/2003
Vehicle Exclusion Zone

 How close to a
building are you
going to set your
checkpoint to
search vehicles?
 Minimum distance
is 30 meters. 100
meters is better.

Lesson #13 – Cyber Attacks - 31


Vital Installation Security
Version 1.00 04/2003
Do you have plans/barriers to stop vehicles
from driving through/around your
checkpoint?

Lesson #13 – Cyber Attacks - 32


Vital Installation Security
Version 1.00 04/2003
Checkpoint Considerations
 Vehicles appearing to signal others.
 Passengers exiting vehicles or turning around after
discovery of a checkpoint.
 Occupants that are overly polite and cooperative.
 Windows down during bad weather or strong cover
scents
 Vehicles that appear overloaded.
 Indications of forced entry or stolen vehicle.
 Driver unable to approximate the contents of the
vehicle trunk or not familiar with vehicle.

Lesson #13 – Cyber Attacks - 33


Vital Installation Security
Version 1.00 04/2003
Vehicle Screening (Quick Looks)

DO NOT TOUCH ANYTHING


CONSIDERED SUSPECT
Screening (Quick Looks) are
Appropriate When:
When the Threat is Low to
Moderate
When Time is a Limiting Factor
Screening (Quick Looks) Consist of:
External Visual Inspection of
Stopped or Moving Vehicles
Making Eye Contact with
Occupants
Visually Scanning Passenger
Compartment/Interior of Vehicle
Checking the Trunk/Cargo
compartment

Lesson #13 – Cyber Attacks - 34


Vital Installation Security
Version 1.00 04/2003
Detailed Vehicle Search

Detailed Search are Appropriate


When:
When Suspicion is Aroused
In High Threat Areas
When Time Is Not a Limiting
Factor
Detailed Searches Consist of:
Stopping and interrogating
the vehicle occupants
A detailed search will focus
on 5 areas:
•Exterior
•Trunk or cargo area
•Engine compartment
•Undercarriage
•Interior

Lesson #13 – Cyber Attacks - 35


Vital Installation Security
Version 1.00 04/2003
Detailed Vehicle Search Procedures

Eight Point Search


1.Front Bumper/Hood
1
2.Front Left Wheel Wheel
2 8
3.Left Between Wheels
4.Rear Left Wheel Wheel
3 7
5.Rear Bumper/Trunk
6.Rear Right Wheel Wheel
4 6
7.Right Between Wheel 5

8.Front Right Wheel W


Lesson #13 – Cyber Attacks - 36
Vital Installation Security
Version 1.00 04/2003
Detailed Vehicle Inspection Checklist

 Driver and passengers exit vehicle.

 Always watch the hands of the driver and


passengers to make sure they do not activate any
switches or have a weapon.

 Search the driver and passengers. They may be


wearing a suicide vest or have a weapon. Do not
allow use of mobile phones.

 Have the driver open the doors, hood and trunk.

Lesson #13 – Cyber Attacks - 37


Vital Installation Security
Version 1.00 04/2003
Separate driver and passengers. Question each one
individually. Compare their stories to see if they match:
 Where are they coming from?
 Where are they going?
 How do they know each other?
 What is in the car?
Maintain control of the passengers and driver at all times.
Check all identification.
Have passengers face away from the vehicle while it is being
searched.

Lesson #13 – Cyber Attacks - 38


Vital Installation Security
Version 1.00 04/2003
• Inspect area behind rear
seat for packages and
wires.
• Inspect under dashboard.
• Look under carpet and floor
mats for wires.
• Never touch wires or
switches.
• Inspect and look under
spare tire.

Lesson #13 – Cyber Attacks - 39


Vital Installation Security
Version 1.00 04/2003
• Inspect all luggage and
packages.
• Be aware of innocent items
(newspapers, envelopes,
etc).

• Inspect bumpers, wheels,


covers.

• Inspect complete chassis


with mirrors.

• Inspect gas tank closely

Lesson #13 – Cyber Attacks - 40


Vital Installation Security
Version 1.00 04/2003
Detailed Vehicle Inspection:
Possible indicators of a IED

• Any large containers


• Any military ordnance or
explosives
• Alterations to the CNG or gas
tank
• New paint or parts
• Shiny or new screws and bolts
• New or broken welds
• Fresh caulk or epoxy
• Wires that are not part of the car
• New battery
• Extra wires connected to the
battery

Lesson #13 – Cyber Attacks - 41


Vital Installation Security
Version 1.00 04/2003
Possible indicators of a IED

 Switches that are not original to the car


 Clean engine in a dirty car
 Areas that are dirtier or cleaner than the rest of the
vehicle
 False compartments in or under the vehicle
 Head lights or tail lights that do not work
 Unusual bulges in front or rear seats
 Interior or cargo area floor that is higher than normal
 Doors, trunk, or hood that are heavier than normal

Lesson #13 – Cyber Attacks - 42


Vital Installation Security
Version 1.00 04/2003
Lesson #13 – Cyber Attacks - 43
Vital Installation Security
Version 1.00 04/2003
If you find an IED or Explosives:

 Do Not Touch or Disturb it


 Tell other checkpoint personnel what you
have found
 Control driver and passengers
 Evacuate the area
 Report and request EOD
 Cordon off the area

N/B 5c’s

Lesson #13 – Cyber Attacks - 44


Vital Installation Security
Version 1.00 04/2003
QUESTIONS

END
Lesson #13 – Cyber Attacks - 45
Vital Installation Security
Version 1.00 04/2003

You might also like