ASIS CPP - Physical Security (Part 1) Flashcards
CPTED
8 Main categories of Physical Security Measures
- CPTED (Crime-Prevention Through Environmental Design
- Physical barriers & site hardening
- Physical entry & access control
- Security Lighting
- Intrusion Detection
- Video Surveillance
- Security Personnel
- Security policies & procedures
CPTED
What can lead to a reduction in the opportunity fear & incidence of predatory, stranger-to-stranger type crime?
Proper design & effective use of the built environment
CPTED
Should be divided into smaller, more clearly defined areas or zones (defensible space, per Oscar Newman)
CPTED
What can also result in an improvement of the quality of life - how & where we live, work, & play?
CPTED
CPTED
CPTED should be integrated into…?
The design & function of the buildings or location
CPTED
All Human Space…
Has some designated purpose
Has social, cultural, legal or physical definitions that prescribe the desired & acceptable behaviors
Is designed to support & control the desired & acceptable behaviors
CPTED
CPTED is the design or redesign of a venue to reduce crime opportunity & fear of crime through?
Natural Means
Mechanical Means
Procedural (organizational) means
CPTED
At its core, CPTED is based on common sense & a heightened awareness about how people use their space for legitimate & criminal intentions
CPTED
3 Classes of CPTED Strategies
- Mechanical measures
- Organizational measures
- Natural or architectural measures
CPTED Strategies
Natural access control
Natural surveillance
Natural territorial reinforcement
Management & maintenance
Legitimate activity support
Compartmentalization
CPTED
Methods for implementing CPTED
Organized methods (staffing)
Mechanical methods (technical products)
Natural methods (site planning, design, landscaping, signage)
CPTED
Once the first window is broken, vandalism and/or other crime quietly follow if it is not prepared
Broken Window Theory
CPTED
CPTED is congruent with the 3 D’s
Deterring
Detecting
Delaying aggressors
CPTED
Preventing crime & losses is inherent in many human functions behaviors & activities
CPTED
CPTED security standards focus on 4 categories
- Perimeter & exterior security
- Entry security
- Interior security
- Security planning
CPTED
Types of CPTED Security Zones
- Unrestricted zones
- Controlled zones - authorized personnel in these general areas
- Restricted zones - authorized personnel in these specific areas
CPTED
Deterrence is achieved through…?
Measures that potential adversaries perceive as too difficult to defeat
CPTED
For the security professional, CPTED is a set of management tools targeting…?
Places
Behavior
Design & Use of Space
CPTED
What is more cost-effective than making changes after construction starts
Integrating CPTED during the initial planning
CPTED
Whenever possible, security planning should begin during…?
Site Selection
CPTED
CPTED is intended to be integrated throughout the construction process
Programming
Schematic Design (SD)
Design Development (DD)
Construction documents or working drawings (CD)
Bids for construction & selection of contractor (RFP)
Security needs should be addressed int he programming phase
CPTED
Establish a secure perimeter around the building as far out as possible… setbacks how far?
100 ft. is suggested
CPTED
Where should you position concrete flower planters etc…?
Near curbs less than 4 ft between them to block cars
CPTED
Locate parking as far from the building as practical & place it within view of occupied rooms or facilities
CPTED
Landscaping Considerations
Low growing plants should be set back 1 yard from the edge of paths or walkways
Low-growing shrubs should be kept no higher than 32” in height
Tree canopies should be trimmed up to 8’ to provide a clear line of the site & reduce hiding spots
CPTED
Parking garages should be equipped with what?
- 3 ft. or higher shrubs/trees should be 10-15 ft. from the structure
- Booths should have 360 degrees visibility & a means of communication
- No public restrooms but should be within view of the booth
- One vehicle entry/exit should be used if possible (based on traffic volume)
- Open-walled, upper levels to allow natural surveillance & permit hearing of calls for help
- Egress only exterior pedestrian doors
CPTED
Parking Garages (ctd…)
- Potholes in solid walls for visibility
- Stairwells & elevators in a central location visible from both
- Stairwells visible from exterior & offering no hiding place & no roof access
- Elevators with glass for exterior visibility along the exterior of the facility
- Access only to the lobby from the garage elevators or stairs
- Adequate lighting
Access Control
Refers to the process of managing databases or other records & determining the parameters of authorized entry, such as who or what will be granted access when they may enter where access will occur
Access Control
Access Control
Categories of Access Control
Manual
Machine Aided
Automated
Access Control
Types of attacks used to defeat access controls
Deceit
Direct Physical Attack
Technical Attack
Entry Control
An entry control subsystem includes the following performance measures…
Throughout
Error Rates
Entry Control
An Entry Control Subsystem
- is not an access control system
- Is part of the detection system
- Allows the movement of authorized personnel & material into & out of facilities
- Detects & possibly delays movement of unauthorized personnel & contraband
- Refers to the physical equipment used to control the movement of people or material into an area
Entry Control
Objections of an entry control system used for physical protection are…
- To permit authorized persons to enter & exit
- To detect & prevent the entry or exit of contraband material (weapons, explosions, unauthorized tools, or critical assets)
- To provide information to security personnel to facilitate assessment & response
Entry Control
Verification of authorization of personnel to enter a controlled area is usually based on…
- Carrying a valid credential (what you have)
- Knowing a valid PIN (what you know)
- Possessing the proper, unique physical characteristics on file (who you are)
Badge Technologies
Magnetic Stripe (“mag stripe”)
- Widely used in commercial credit/debit cards
- Low-coercivity (“LoCo”) cards are 300 oersteds; easy to erase; typical of credit/debit cards
- High-coercivity (Hi - CO) cards are 2500 to 4000 oersteds; hard to erase, but can be done with rare_earth magnets; typical of company badges
- Easily forged, duplicated (can use proprietary encoding schemes but not common)
Access & Entry Control
Badge Technologies
- Magnetic Stripe
- Bar Code
- Proximity
- Smart Card
Access/Entry Control
Badge Technologies Proximity…
- Small RF transponder/transmitter is powered by an onboard battery (active) or it is energized by the card reader (passive)
- Low-frequency badges are in the 125 KHz range
- High-frequency badges range from 2.5 MHz to over 1 GHz
Access/Entry Control
Badge Technologies - Smart Card
- Gold contacts on the surface of the card allow for communication with a reading device
- Contactless smart cards use RF communications & do not have the gold contacts
- Main advantages: Large memory & its high degree of resistance to forgery or compromise
- Ability to encrypt communications
- Can be prohibitively expensive
- Homeland Defense Presidential Directive (HSPD 12)
Access/Entry Control
Personal Identity Verification System
Biometrics
- Corroborate claimed identities on the basis of one or more unique physical biometric characteristics of the individual
- Can differentiate between: verification & recognition
Access/Entry Control
Personal identify verification systems
All personal identity verification systems consider 3 things
- The uniqueness of the feature used for identification
- The variability of the characteristic
- The difficulty of implementing the system that processes the characteristic
Personal identity verification systems
Type 1 error rate:
False rejection of a valid user
Personal identity verification systems
Type II Error rate
False acceptance of an invalid user
Access/Entry Control
Personal identity verification systems
Equal error rate
- Cross-over point where Type 1 & Type 2 errors are equal
- Not necessarily the point at which the device should be operated
- Not the lowest point for either type of error
Access/Entry Control
Personal identity verification systems
Finger Prints
- Still considered one of the most reliable means of distinguishing one individual from another
- Most systems use image processing & pattern recognition
Minutia points
Ridge endings
Bifurcations
Access/Entry Control
Personal identity verification systems
Hand/Finger Geometry
- Characterizes the shape of the hand
- Measures 3-dimensional features of the hand such as the widths & lengths & the thickness of the hand
Personal Identity Verification System
Eye Pattern
- Imaging of iris by a video camera
- Operates in the recognition mode
- 10 - 12” read distance (no physical contact)
- 2% of population cannot be enrolled due to blindness or other eye issues
Personal identity verification system
Face
- Utilize distinguishing characteristics of the face
- Captured with video camera or thermal image
Personal identity verification system
Voice
- Speech measurements: waveform envelope, voice pitch period, relative amplitude spectrum, resonant frequencies of the vocal tract
- Low security, easily deployed, more public acceptance (low distrust)
Personal identity verification system
Handwriting
- Used for many years by the bank
- Signatures can be easily forged
- Handwriting dynamics include displacement velocity & acceleration
Access/Entry Control
Access control barriers include…
Doors
Gates
Turnstiles
Elevators
Access/Entry Control
Vehicle access controls are…
Manual
Electronic
Access/Entry Control
Electro-Mechanical Lock Types
- Electric deadbolts
- Electric latch
- Electric strike
- Electric lockset
- Exit device
- Electromagnetic lock
Access/Entry Control
Device unlocks upon loss of power (but may stay latched - “positive latching”)
Fail Safe
Access/Entry Control
Device locks upon loss of power
Fail Secure
Access/Entry Control
Single action / motion egress
One action/motion required to release door to exit