Logo


1. Introduction
  1. Risk Management

  2. Who Are You, and Why Are You Here?

  3. Finding a Solution

2. Problem Definition
  1. What Needs Protecting?

  2. Who is Allowed Where?

3. Methods of Identification
  1. Reliability vs. Cost

  2. Combining Methods to Increase Reliability

  3. Security System Management

4. Access Control
  1. What You Have

  2. What You Know

  3. Who You Are

5. Other Security Systems Elements

  1. Building Design

  2. Piggybacking and Tailgating: Mantraps

  3. Camera Surveillance

  4. Security Guards

  5. Sensors and Alarms

  6. Visitors

6. The Human Element
  1. People: The Weakest Link

  2. People: The Strongest Backup

7. Site Design
  1. Layers

  2. Components

  3. Tactics

8. Controlling Site Access
  1. Entry Control Facility

  2. Zones of an Entry Control Facility

  3. Utilities and Automatition

9. Chosing the Right Solution
  1. Risk Tolerance vs. Cost

  2. Security System Design Considerations

  3. Building Security Design Considerations

Security Considerations in Building Design

When building a new facility or renovating an old one, physical security can be addressed from the ground up by incorporating architectural and construction features that discourage or thwart intrusion. Security considerations in the structure and layout of a building generally relate to potential entry and escape routes, access to critical infrastructure elements such as HVAC and wiring, and potential sources of concealment for intruders.

• Position the door in such a way that only traffic is near the door.

• Use steel doors and frames, with solid doors instead of hollow-core. Make sure that hinges cannot be removed from the outside.

• Data center walls should use materials sturdier than the typical sheet rock used for interior walls.

Sensors can be imbedded in the walls to detect tampering.

• The room used for the data center should not abut any outside walls.

• Allow long and clear lines of sight for any security stations or cameras within the data center.

• Make use of barriers to obstruct views of the entrances and other areas of concern from the outside world. This prevents visual inspection by people who wish to study the building layout or its security measures.

• Be aware of the placement of ventilation ducts, service hatches, vents, service elevators and other possible openings that could be used to gain access. Tamper-proof grills should be installed on all such openings that exceed 12 inches in width, to prevent human entry.

• Avoid creating spaces that can be used to hide people or things. For example, the space beneath raised floors could be a hiding place. Make sure that potential hiding places are secured and not easily noticed by someone walking through the facility.

• Install locks and door alarms to all roof access points so that security is notified immediately upon attempted access. Avoid points of entry on the roof whenever possible.

• Take note of all external plumbing, wiring, HVAC, etc., and provide appropriate protection. If left in plain site or unprotected, these infrastructure components can be used to sabotage the facility without having to disable security measures.

To receive your Physical Vulnerability Assessment, please submit your payment of $999.00
B E T T E R: Please submit your payment of $1999.00 for a complete Physical Vulnerability Assessment or Design covering a single location.
Business Name:
Contact Information:
Email Address:
URL or IP address:
  

Other members of our business group:
Cloud-Security.us

COPYRIGHT (C) 2000 - 2013 InfoSecPro.com ALL RIGHTS RESERVED