Logo


1. Introduction
  1. Risk Management

  2. Who Are You, and Why Are You Here?

  3. Finding a Solution

2. Problem Definition
  1. What Needs Protecting?

  2. Who is Allowed Where?

3. Methods of Identification
  1. Reliability vs. Cost

  2. Combining Methods to Increase Reliability

  3. Security System Management

4. Access Control
  1. What You Have

  2. What You Know

  3. Who You Are

5. Other Security Systems Elements

  1. Building Design

  2. Piggybacking and Tailgating: Mantraps

  3. Camera Surveillance

  4. Security Guards

  5. Sensors and Alarms

  6. Visitors

6. The Human Element
  1. People: The Weakest Link

  2. People: The Strongest Backup

7. Site Design
  1. Layers

  2. Components

  3. Tactics

8. Controlling Site Access
  1. Entry Control Facility

  2. Zones of an Entry Control Facility

  3. Utilities and Automatition

9. Chosing the Right Solution
  1. Risk Tolerance vs. Cost

  2. Security System Design Considerations

  3. Building Security Design Considerations

Security System Design Considerations

Security system design can be a complicated equation with many variables. While specific strategies for security system design are beyond the scope of this paper, any design will likely consider these issues:

  • Cost of equipment — Budget constraints ordinarily limit the extensive use of high-confidence identification equipment. The usual approach is to deploy a range of techniques appropriate to various security levels.


  • Combining of technologies — The reliability of identification at any level can be increased by combining lower-cost technologies, with the innermost level enjoying the combined protection of all the outer concentric perimeters that contain it.


  • User acceptance — (The “nuisance” factor.) Ease of use and reliability of identification are important in preventing the system from becoming a source of frustration and a temptation for subversion.


  • Scalability — Can the design be implemented incrementally as necessity, funding, and confidence in the technology increase?


  • Backwards compatibility — Is the new design compatible with elements of an older system already in place? Keeping all or part of an existing system can significantly reduce deployment cost.


To receive your Physical Vulnerability Assessment, please submit your payment of $99.00
B E T T E R: Please submit your payment of $999.00 for a complete Physical Vulnerability Assessment or Design covering a single location.
Business Name:
Contact Information:
Email Address:
URL or IP address:
  

Other members of our business group:
Cloud-Security.us | US-scada.com

COPYRIGHT (C) 2000 - 2013 InfoSecPro.com ALL RIGHTS RESERVED