Logo


1. Introduction
  1. Risk Management

  2. Who Are You, and Why Are You Here?

  3. Finding a Solution

2. Problem Definition
  1. What Needs Protecting?

  2. Who is Allowed Where?

3. Methods of Identification
  1. Reliability vs. Cost

  2. Combining Methods to Increase Reliability

  3. Security System Management

4. Access Control
  1. What You Have

  2. What You Know

  3. Who You Are

5. Other Security Systems Elements

  1. Building Design

  2. Piggybacking and Tailgating: Mantraps

  3. Camera Surveillance

  4. Security Guards

  5. Sensors and Alarms

  6. Visitors

6. The Human Element
  1. People: The Weakest Link

  2. People: The Strongest Backup

7. Site Design
  1. Layers

  2. Components

  3. Tactics

8. Controlling Site Access
  1. Entry Control Facility

  2. Zones of an Entry Control Facility

  3. Utilities and Automatition

9. Chosing the Right Solution
  1. Risk Tolerance vs. Cost

  2. Security System Design Considerations

  3. Building Security Design Considerations

Site Design - 1 - Layers

Defending the Perimeter - 1st Layer:

Outermost perimeter is line of demarcation.

  • Crossing the boundary establishes intent - marks an aggressor.
  • It is the first opportunity to provide detection.
  • Usually provides minimal delay.

Exclusion Zone - 2nd Layer:

Defined inner perimeter or open space.

  • Obstruction free or clear zone.
  • Allows detection of aggressors or threats.
  • Supports sensor based detection.

Traveling across intermediate space is vulnerability for aggressor and provides delay.

Building Exterior - 3rd Layer:

Depending on level of public access, building exterior may be significant layer of the protective system. It defines the end of site security. The remaining layers are defined within the building as appropriate for the assets within.

To receive your Physical Vulnerability Assessment, please submit your payment of $999.00
B E T T E R: Please submit your payment of $1999.00 for a complete Physical Vulnerability Assessment or Design covering a single location.
Business Name:
Contact Information:
Email Address:
URL or IP address:
  

Other members of our business group:
Cloud-Security.us

COPYRIGHT (C) 2000 - 2013 InfoSecPro.com ALL RIGHTS RESERVED