LEA 3 Chapter 4 6
LEA 3 Chapter 4 6
LEA 3 Chapter 4 6
IV
PHYSICAL
SECURITY
GROUP 1
At the end of this chapter, the student will
OBJECTIVES be able to:
- Define physical security
- Explain the purpose and advantages of
physical barriers
- Explain the three lines of defense and
enumerate examples;
- Illustrate protective alarm sensors
- Characterize protective lighting and
enumerate examples
Physical Security
-Refers to a logical set of tangible elements and
measures adopted to prevent unauthorized access to
equipment, facilities, materials, documents and
personnel.
- The main objective is to protect these assets from
damage, compromise and loss.
- Example; fence, sensors, and protective lighting.
Principles of
Physical Security
1. The type of access necessary depends on the number of variable factors, thus, may
be obtained in different ways.
2. There is no such thing as an impenetrable barrier.
3. The installation of a barrier varies from another.
4. There is defense in barrier depth.
Factors in Selecting Security Safeguards
1. Site Characteristics
election of safeguards can be influenced by the nature of the site such as the
size, layout, utilities, internal activities and assets in the site. Other factors
may include company philosophy and workforce culture.
2. Environment
- This refers to the area surrounding the facility.
3. Forces of Nature
-Also at play in the selection of safeguards are the environment's
climate, weather, and natural forces.
4. Crime
-Crime patterns must be considered in selecting the necessary
countermeasures. Decisions should be preceded by a risk asses of
that includes a study on the nature, intensity, and repetitiveness or
criminal acts that have occurred in or near the facility during the
recent past.
Physical Barriers
A barrier is a natural or manufactured obstacle to the movement of
persons, animals, vehicles or materials. It defines physical limits to
and delays or prevents penetration of an area (POA Publishing LLC,
2003).
- It is impossible to build a barrier that cannot be compromised.
- The idea is to cause as much delay as possible by designing a series
of layers, or concentric circles, so that highly protected assets are
within a configuration of multiple barriers.
A concentric protection of a high-security facility allows for
several rings of barriers, as explained by John J. Fay in his book
Contemporary Security Management.
Advantages of Physical Barriers
1. Physical barriers become a psychological deterrence when a
potential intruder is discouraged from accessing a facility
because the barriers appear to present difficulties.
2. Actual difficulty in getting through physical barriers.
3. Reducing the cost of security staffing by substituting barriers for
people, and placing security posts in locations that complement
barriers.
Purpose of Physical Barriers
1. To control the movement of people and vehicles into, out of, and within the
facility.
2. To segregate or compartmentalize sensitive areas
3. To provide physical protection to objects, materials, and processes of critical
nature
2. Building Walls
Roofs
The roof usually has sheathing placed over the rafters,
often horizontal wooden boards placed flush on the
rafters. Sheathing may be covered with felt or other
insulating material, foundation and these layers covered
with shingles, metal sheet, tar paper, tile or other
weather-resistant material.
Exterior Walls
Ceilings
Other Openings
In addition to doors and windows, a wide variety of other
openings in the roof, walls and floor may require
consideration. These include openings for shafts, vents,
ducts or fans; utility tunnels or chases for heat, gas,
water, electric power and telephone, sewers and other
types of drains; and other small service openings.
Third Line of Defense: Interior Controls
Establishing interior controls not only maximizes the
efforts of security guards. Such measures also allow or
deny access to facilities or areas within the facility, as well
as track the identity and times of entry and exit.
Locks
Installing locks on doors is the easiest line of defense
inside a facility. It is the simplest way to impose a physical
restraint as well as grant entry. However, locks can also be
vulnerable to physical force.
-A key operated lock can be picked, or its keys can be
duplicated illegitimately.
Below are factors to consider in using locks (Vellani, 2007).
1. Locks are only as good as the door, jambs, and walls around
them. A lock is therefore useless if an intruder can simply kick
a weak door to access a facility.
2. Key management is important when dealing with a complete
lock system. It is important to make sure that only authorized
personnel can obtain or make a key to the lock.
3. All locks can be compromised by an expert in a very short
period of time. It is therefore wise to use locks together with
other security measures and as part of an overall physical
protection system.
Telephone Entry Systems
Telephone entry systems are commonly used
in apartment buildings and condominiums.
They are typically located outside the
building, with a panel, handset and touchpad.
Each tenant has a special entry code that a
visitor dials. For added security, some
systems add a CCTV camera in the entry
lobby with small monitors provided to each
occupant.
Identification Systems
Controlled entry into a business facility
usually begins with the identification of the
person entering
The identity of employees or visitors can be determined through
the following types of identification verification and access
control."
Protective Lighting
intruders
* To present psychological fear
* To serve as deterrent to thieves, pilferer, trespasser and saboteurs
- The glare projection type produces bright white light with its intensity
focused on the intruder who is made highly visible but unable to easily see
what lies ahead. Glare lighting also adds protection to security officers posted
behind the light source.
- Controlled lighting is focused on certain objects than the background.
PERSONNEL
SECURITY
.Among the major threats confronting an organization are employee crime and
employee misconduct. In fact, internal theft surpasses the losses that can be attributed
to robberies, theft, frauds and other criminal acts committed by outsiders.
.It is the employer's duty to maintain a safe and secure working environment.
Employers conduct pre-employment background checks of job applicants in order to
protect existing workers, guests, and the public from the harmful acts of employees.
. An employee with legitimate access to corporate systems also has the potential to
wreck the organization's reputation by simply using a USB memory stick or a
webmail account to steal confidential information.
Purpose of Personnel Security:
-To identify security measures in proportion to the risk
-To reduce the risk of employing personnel likely to present a security concern
-To establish that applicants and contractors are who they claim to be
-To close down opportunities for abuse of the organization's assets
Pre-Employment Screening
Personnel security measures are usually undertaken during the recruitment process, This is
because companies believe that it is better to spot dangerous or dishonest, individuals before they
are hired. This means that the human resource department should not simply trust the correctness
of information written in a very impressive resume Hence, a proper background employment
screening on job applicants must be carried out.
- Apparently, companies in financial services have long been carrying out such background
checks, and only recently have other industries followed.
- The objective is to collect information and use that information to identify individuals who present
security concerns.
The pre-employment screening should include checks on the following
• Proof of identity and address
• Details of education and employment
• Criminal records check
• Financial check
• Checking of at least two character references
Pre-employment Screening Policy Checklist (CPNI, 2011)
1. Make pre-employment screening an integral part of the recruitment process.
2. Ensure that applicants are informed in writing that any offer of employment will be subject to the
satisfactory completion of pre-employment screening checks, whether or not the individual has
already been granted access to the site.
3. Ensure that the screening processes are legally compliant at all stages (including the wording of
application forms).
4. Involve all the relevant departments in the organization, and ensure they
communicate and share data effectively."
5. Identify the specific office responsible for the pre- employment screening process.
6. Incorporate specialist businesses into your strategy if appropriate.
7. Ensure that the application form requests all relevant information, including
consent for further checks, and outlines your screening policies.
8. Establish decision making guidelines for consistent and transparent judgments
about information.
9. Have a clear understanding of the thresholds for denying someone employment.
10. Be clear about how fake or forged documents will be dealt with.
11. Collect data on the results of the pre-employment screening process (e.g.
incidence of false qualifications or criminal record).
Application Form
Using a standardized application form to be completed by job applicants requires
them to provide all relevant information and confirm its correctness with a
signature.
Interviews
The job interview portion of the application also helps in the screening process
because it provides an opportunity to discuss the candidate's suitability for
employment. This interview is important because:
-A face to face discussion encourages applicants to be honest.
-It allows the employer to clarify information in the application form, ask for
other information not covered in the application form, and probe candidates about
their responses.
-It also provides a good opportunity to add to the overall assessment of the
applicant's reliability and integrity.
Identity Verification
Verifying the applicant's identity is a critical measure in the screening process. In
fact, other measures in the screening process should only come second after the
applicant's identity has been satisfactorily proven. The key is to verify that the
individual is not committing fraud by using false identities.
There are four main reasons why individuals use false identities:
• To avoid detection - Individuals like crooks, terrorists or wanted criminals may
wish to remain anonymous or undetected.
• For dishonest financial gain- This involves individuals who have ill intentions
to commit credit fraud or unqualified applicants who falsify educational
qualifications to obtain employment.
• To avoid financial liability - This includes individuals who have failed to pay
debts and are avoiding financial liabilities.
• To leally obtain genuine documents such as passports by using false
breeder'documents (ie. those documents required to obtain passports, such as birth
certificates which can have few or no security features).
Purpose of verifying identity is to ascertain the correctness of the information they
have given about themselves by:
• Determining that the identity is genuine and relates to a real person.
• Establishing that the individual owns and is rightfully using that identity.
One method of verifying identity, which is called the paper-based approach,
involves requesting original documents such as those that corroborate the
applicant's full name, signature, date of birth and full permanent address.
A second method called the electronic approach involves checking the applicant's
personal details against external databases. This method requires checking and
cross-referencing information from databases such as criminal records or credit
reference agencies.
Qualification and Employment Checks
-involves the verification of information regarding educational employment check
involve the verification of the applicant's employment or professional qualifications,
while an history in terms of dates of employment and position. The purpose of such
confirmations on the applicant's qualifications and previous employment is to help the
employer in evaluating the candidate's reliability and integrity. It also helps to discover
whether applicants are hiding negative information such as a criminal record or dismissal
from previous employment for suspicious reasons.
Media searches
-involve the evaluation of an individual based on their online reputation. It includes
searching for what they say or what on others say about them on the internet.
-can also help verify identity, confirm or resolve concerns about suspicious behavior, or
establish how security aware the applicant is.
-An individual who posts photos of drunkenness in parties and allows public
viewing of such photos could indicate poor judgment, especially if the position
being applied for involves working in a religious foundation or a prominent
conservative politician.
-There are risks, however, in using media searches. Employers might obtain
information about someone with the same name as the applicant. It is also
possible that the positive information available online were staged by the
applicant in order to appear qualified.
-Encourage staff to see those in security as friendly and approachable. Provide a contact
number or email address for reporting security concerns. .
-Demonstrate unconditional support for the security policy (particularly from
management)
-Explain the organization's security policies openly. If there some areas that are more
sensitive than others and where access is restricted this should be clearly stated.
-Give employees a realistic picture of the threats to the organization.
-Encourage cultures which resolve and correct rather than focus on establishing blame.
-Avoid exaggerating the risks and threats faced by the organization to gain more
credibility.
-Avoid making false claims about security to frighten employees into compliance.
-Provide regular refresher trainings to incorporate new security procedures in order to
help maintain standards and ensure that employees understand why these are important
to follow.
Addressing Behaviors of Concern
Managers play a key role in addressing negative behavior and ensuring that
security measures are followed. Managers sometimes fail to act on poor
performance and this could worsen the problem because other employees
might become dissatisfied for compensating on their co-worker's poor
performance. Another negative result is when employees assume that poor
performance is acceptable and follow that example.
Exit Procedures
An employee who leaves an organization could possibly have considerable knowledge
about its assets, operations and security vulnerabilities. If the reason for the employee's
departure is not amicable, he might maliciously give sensitive information to the
organization's competitor. A thorough procedure on personnel departures is therefore critical
to ensure that appropriate actions are taken to protect the organization without unnecessarily
disrupting the relationship with the departing employee. Standard procedures could include
changes in the combinations for secure cabinets, termination of IT accounts, or changes in
generic passwords and remote access codes so that an employee will no longer have access
when he leaves the organization.
The Exit Interview
CHAPTER VI
-Protecting crucial documents has become progressively more critical in
this age of fast growing technology. The loss of document and information
can cost a company huge amounts of money.
3. Storage and Retrieval - Used information should be put away for future use.
Storage and retrieval methods must ensure the integrity of the information, its
timely accessibility to authorized users, and its protection from criminal
intervention and disastrous circumstances.
The security measures that must be taken depend on the type of storage center,
the storage means and the storage technologies used. More importantly, the
experience and dependability of the personnel who will handle the storage and
retrieval of information must be considered.
Sensitive Information
Sensitive information refers to information that has value and should be
protected, including the following:
- Proprietary business and technical information.
- Personal data concerning applicants, employees, and former employees.
- Proprietary information owned by partners and obtained through an
agreement.
Classification of Sensitive Information
Security Screening
Job applicants, current employees, contractors and other individuals who could be
sharing sensitive information with the organization may have their backgrounds
checked for affiliation with known activist or dissident groups or for any potential
for insider activity.
Restricted Areas and Identification
physical barriers that control access to restricted areas can serve as a deterrent
and increase the likelihood of identifying unauthorized individuals. The
organization can employ a series of identification methods from photographic
identification card, bar codes, voice analysis, and retinal scans the enhance
entry restrictions within high security areas inside the facility.