Logo


1. Introduction
  1. Risk Management

  2. Who Are You, and Why Are You Here?

  3. Finding a Solution

2. Problem Definition
  1. What Needs Protecting?

  2. Who is Allowed Where?

3. Methods of Identification
  1. Reliability vs. Cost

  2. Combining Methods to Increase Reliability

  3. Security System Management

4. Access Control
  1. What You Have

  2. What You Know

  3. Who You Are

5. Other Security Systems Elements

  1. Building Design

  2. Piggybacking and Tailgating: Mantraps

  3. Camera Surveillance

  4. Security Guards

  5. Sensors and Alarms

  6. Visitors

6. The Human Element
  1. People: The Weakest Link

  2. People: The Strongest Backup

7. Site Design
  1. Layers

  2. Components

  3. Tactics

8. Controlling Site Access
  1. Entry Control Facility

  2. Zones of an Entry Control Facility

  3. Utilities and Automatition

9. Chosing the Right Solution
  1. Risk Tolerance vs. Cost

  2. Security System Design Considerations

  3. Building Security Design Considerations

People: The Strongest Backup

Protection from a security breach often comes down to the recognition and interpretation of unexpected factors — a skill in which technology is no match for alert people. Add an unwavering resistance to manipulation and shortcuts, and human presence can be a priceless adjunct to technology.

Beyond an alert staff, the incomparable value of human eyes, ears, brains, and mobility also qualifies people for consideration as a dedicated element in a security plan — the old-fashioned security guard. The presence of guards at entry points and roving guards on the grounds and inside the building, while expensive, can save the day when there is failure or hacking of technological security. The quick response of an alert guard when something “isn’t right” may be the last defense against a potentially disastrous security breach.

In protecting against both accidental and deliberate harm, the human contribution is the same: constant vigilance and strict adherence to protocols. Having kept out all but those essential to the operation of the facility, the remaining staff — well trained, following well-designed practices and procedures — are the final firewall of an effective physical security system.

To receive your Physical Vulnerability Assessment, please submit your payment of $999.00
B E T T E R: Please submit your payment of $1999.00 for a complete Physical Vulnerability Assessment or Design covering a single location.
Business Name:
Contact Information:
Email Address:
URL or IP address:
  

Other members of our business group:
Cloud-Security.us

COPYRIGHT (C) 2000 - 2013 InfoSecPro.com ALL RIGHTS RESERVED