CPTED, Design, and Metrics Flashcards
Key Points 1
Crime Prevention Through Environmental Design (CPTED) is a set of concepts based upon the idea that the proper design and use of the environment can reduce the fear, opportunity, and incidence of crime and improve our quality of life (C. Ray Jeffery, 1971).
Key Points 2
Defensible Space is where the environment is compartmentalized (divided) into smaller areas or into zones that are clearly defined, which makes them easier to protect. (Oscar Newman, 1972).
Key Points 3
CPTED targets three main areas: 1) places, 2) behaviors, and 3) use of space.
Key Points 4
CPTED uses three main controls: 1) mechanical measures, 2) organizational measures, and 3) natural/architectural measures.
Key Points 5
CPTED Strategies: Territoriality, Natural Surveillance, Natural Access Control, Management and Maintenance, Legitimate Activity Support, and Compartmentalization
Key Points 6
Corner locations and ground floor apartments have higher victimization rates.
Key Points 7
Situational Crime Prevention - Focuses on reducing opportunity to commit crime in all behavioral concepts. It addresses both motives and opportunity.
Key Points 8
Second Generation CPTED - There are four components: 1) cohesion, 2) capacity threshold, 3) community culture, and 4) connectivity.
Key Points 9
CPTED 3D - There are three areas: 1) designation of space, 2) definition in terms of management and identity, 3) design of desired function and behaviors.
Key Points 10
There are 1) architectural, 2) systems, and 3) procedural considerations when it comes to graphics and signage.
Key Points 11
There are three levels of security defense planning: 1) site analysis, 2) exterior of building, and 3) interior space.
Key Points 12
he building design process comprises of the following:
Programming
Schematic design
Design development
Construction documents (drawings)
Bids for construction/selection of contractor
Key Points 13
A compound that allows for non-employee access (visitors, etc.) should locate the public access building towards the front of the site, while the more secure buildings should be located towards the back.
Key Points 14
High security areas should be placed in the middle layers of the building while lower security areas can be placed on the outer layers of the building.
Key Points 15
Standoff distance and structural hardening are two ways to protect against an explosive threat.
Key Points 16
Security zones may be used to establish appropriate standoff and protections layers: 1) perimeter, 2) non-exclusive zone and 3) exclusive zone.
Key Points 17
Serpentine patterns may be a cost-effective way to protect from a speeding vehicle when installed in front of retractable bollards or other active vehicle barriers.
Key Points 18
The building structure must also be designed to prevent progressive collapse for buildings that are three or more stories tall.
Key Points 19
The pairing of assets against known vulnerabilities, which is often referred to as threat vectors.
Key Points 20
It takes a “systems approach” to effectively protect organization assets.
Key Points 21
An integrated system integrates the following into one seamless system: 1) architectural aspects (most significant factor in design), 2) security systems, and 3) operational aspects.
Key Points 22
Enterprise risk management (ERM) uses a multidisciplinary approach in developing protection strategies and is designed to integrate crime prevention and antiterrorism as program objectives.
Key Points 23
Physical Security Information Management (PSIM). A PSIM manages and collects data from different security systems.
Key Points 24
The Security Metrics Evaluation Tool (Security MET) evaluates 1) technical criteria, 2) operational (security) criteria, and 3) strategic criteria.
Key Points 25
All metrics should use the SMART process; 1) specific, 2) measurable, 3) attainable or achievable, 4) repeatable and 5) time-bounded.
Mechanical Measures.
Using hardware and technology systems such as locks, security windows, fences, key control systems, video surveillance, and target hardening. These measures act as a deterrent and provide physical protection but must not be used alone; other measures should be used in conjunction with mechanical measures.
Organizational Measures
Using staffing, policies, and activities to encourage observation, reporting, and intervention when appropriate. It includes activities such as educating people and performing routine patrols.
Natural or Architectual Measures
Designing space (terrain, layout, landscaping, and other non-mechanical objects) so that it is more user friendly to the intended audience but not for potential adversaries. Provides a demarcation between public, semi-public, and private spaces.
Natural surveillance
Improving visibility by use of clear zones, lighting, windows, and other means that allow users of the area to witness on-going activities and possible detection of criminal acts.
Natural access control
Physical or symbolic barriers to prevent or discourage access or to direct movement of people and vehicles to specific access points. Spatial definition, circulation patterns, and target hardening measures can all play a part in natural access control. Plants such as the carissa, emerald blanket, and boxwood blanket are thorny and may help to form a natural barrier but may not be acceptable near areas where small children play. Residence applications may use plants such as the pygmy date palm, Jerusalem thorn and cinnecord to discourage criminal activities such as burglary. Natural access control may also employ the use of moats, walls, water, terrain, rocks/stones, berms, and vegetation as part of the strategy. A few areas to consider:
Management and maintenance
Spaces or buildings that are well maintained usually have a lower incidence of crime. The “broken windows” theory (Wilson and Kelling, 1982) suggests that if a window in a building is broken, it will lead to more vandalism of the building. Therefore, quickly repairing damage and maintaining a building could reduce the number of criminal acts.
Legitimate activity support
Having legitimate users in the space or building - using it for its intended purpose - may reduce criminal acts in the space or building.
Compartmentalization
The design of the environment into smaller areas or zones that are clearly defined. This normally consists of multiple layers (protection-in-depth) of security features to protect people and other assets.
Natural territorial support (territoriality)
Establishing a sense of ownership and vigilance of the space by routine users. May be structural or psychological in composition and could consist of demarcations of colors, texture, surface variations, signage/graphics, and fences/walls. Effective training and awareness programs are the most basic tools of territoriality.
Signage and Graphics should:
Consider architectural design
Be systematic in deployment
Consider procedures
Reflective Pressure
the energy or shock wave that is redirected by objects along the initial pathway of a detonated explosive; reflective pressure is greater than the initial (incident) shock wave over the same distances.
Standoff Distance
The distance between the asset and the threat. Typically regarding explosive, vehicle, or ballistic threats.
Risk Profile
The description or depiction of risk based on situational or influencing factors.
Bollard
A vehicle barrier, typically in cylindrical form, often made of steel and concrete, placed to prevent vehicles from passing, while allowing pedestrians and bicycles to enter.
Threat Vector
Any path by which a threat action can be carried out. This may be a physical path, logical path, or a sequence of events. Includes the action, as well as the individual performing the action.
Four Levels of Integration
Integration of physical security
Electronic security systems integration
Security program integration
Integration of Enterprise Risk Management (ERM)
Security Metrics Evaluation Tool (Security MET)
Technical Criteria - reliability, validity, generalizability
Operational (Security) Criteria - cost, timeliness, manipulation
Strategic Criteria - ROI, relevance, communication
Enterprise Performance Framework
Effectiveness
Efficiency
Strategic Improvement
PACS Metrics
Forced doors Door held open Device malfunction User error Unauthorized attempt to gain access Card misread or expired Communications failure
Compliance Metrics
Initial assessment Reoccurring assessment Low security site - may require reassessment every 5 years Higher security site - may require reassessment every 3 years Systems compliance Configuration Network communications Disaster recovery
Security Program Metrics
Number of security requests
External dependencies responsiveness
Security cost per square foot
Security cost per employee
Security assessments performed
Security system maintenance inspections performed
Accordion. Select each button to expand the content.
Key Points