Logo


1. Introduction
  1. Risk Management

  2. Who Are You, and Why Are You Here?

  3. Finding a Solution

2. Problem Definition
  1. What Needs Protecting?

  2. Who is Allowed Where?

3. Methods of Identification
  1. Reliability vs. Cost

  2. Combining Methods to Increase Reliability

  3. Security System Management

4. Access Control
  1. What You Have

  2. What You Know

  3. Who You Are

5. Other Security Systems Elements

  1. Building Design

  2. Piggybacking and Tailgating: Mantraps

  3. Camera Surveillance

  4. Security Guards

  5. Sensors and Alarms

  6. Visitors

6. The Human Element
  1. People: The Weakest Link

  2. People: The Strongest Backup

7. Site Design
  1. Layers

  2. Components

  3. Tactics

8. Controlling Site Access
  1. Entry Control Facility

  2. Zones of an Entry Control Facility

  3. Utilities and Automatition

9. Chosing the Right Solution
  1. Risk Tolerance vs. Cost

  2. Security System Design Considerations

  3. Building Security Design Considerations

Physical Security Design Consulting

An ideal building or facility protective system:

• Deters
• Detects
• Defends against
• Defeats Aggressors

The primary design objectives are defense (delay and shielding) and detection (sense, assess, and communicate aggression)

The main focus in site design is improving detection, adding delay, and providing defense from some threats through standoff

Minimum Measures for Site Design are:

  • Clear zone - eliminate potential hiding places to improve site visibility
  • Maximize standoff from the outer perimeter and parking areas
  • Eliminate roadways or drives that approach perpendicular to a building
  • Minimize the number of access points to the facility
  • Avoid parking under a facility
  • Provide adequate security lighting
  • Reduce or avoid vantage points

Defense-in-Depth is the preferred method of Security Design.

  • For many threats and tactics the best defense if standoff.
  • In addition, you can minimize risk and increase your chances of success by layering your defense.
  • Each layer presents an opportunity to add detection or delay elements to foil an adversary.

Source FEMA 428

Let us review your site design plans for assesment of your site security posture and improvement needs. We will review specific tactics followed by suggestions on how to mitigate that tactic possible impact.

To receive your Physical Vulnerability Assessment, please submit your payment of $999.00
B E T T E R: Please submit your payment of $1999.00 for a complete Physical Vulnerability Assessment or Design covering a single location.
Business Name:
Contact Information:
Email Address:
URL or IP address:
  

Other members of our business group:
Cloud-Security.us

COPYRIGHT (C) 2000 - 2013 InfoSecPro.com ALL RIGHTS RESERVED