| |
| |
Part One | |
| |
| |
| |
Design and Evaluation of Physical Protection Systems | |
| |
| |
Introduction | |
| |
| |
Safety vs. Security Deterrence Process | |
| |
| |
Overview Physical Protection System | |
| |
| |
Design PPS Functions | |
| |
| |
Design Goals | |
| |
| |
Design Criteria | |
| |
| |
Analysis | |
| |
| |
Physical Protection System | |
| |
| |
Design and the Relationship to Risk Summary | |
| |
| |
| |
Facility Characterization | |
| |
| |
Introduction | |
| |
| |
Physical Conditions | |
| |
| |
Facility Operations | |
| |
| |
Facility Policies and Procedures | |
| |
| |
Regulatory Requirements | |
| |
| |
Safety Considerations | |
| |
| |
Legal Issues | |
| |
| |
Corporate Goals and Objectives | |
| |
| |
Other Information | |
| |
| |
Summary | |
| |
| |
Security Principle | |
| |
| |
| |
Threat Definition [extensively updated] | |
| |
| |
Introduction | |
| |
| |
Steps for Threat | |
| |
| |
Definition List | |
| |
| |
Threat Information | |
| |
| |
Collect Threat Information | |
| |
| |
Organize Threat Information | |
| |
| |
Example Threat Statements | |
| |
| |
| |
Target Identification | |
| |
| |
Introduction | |
| |
| |
Undesirable Consequences | |
| |
| |
Consequence Analysis Targets | |
| |
| |
Techniques for Target | |
| |
| |
Identification Vital Area | |
| |
| |
Identification | |
| |
| |
Summary | |
| |
| |
Security Principle | |
| |
| |
Part Two | |
| |
| |
| |
Physical Protection System Design | |
| |
| |
Introduction | |
| |
| |
Physical Protection System | |
| |
| |
Design PPS Functions | |
| |
| |
Relationship of PPS Functions | |
| |
| |
Characteristics of an Effective PPS | |
| |
| |
Design Criteria | |
| |
| |
Additional Design Elements | |
| |
| |
Summary | |
| |
| |
Security Principles | |
| |
| |
| |
Exterior Intrusion Sensors | |
| |
| |
Introduction | |
| |
| |
Performance Characteristics | |
| |
| |
Sensor Classification | |
| |
| |
Sensor Technology | |
| |
| |
Perimeter Sensor Systems | |
| |
| |
Design Concepts and Goals | |
| |
| |
Effects of Physical and Environmental Conditions | |
| |
| |
Integration with Video | |
| |
| |
Assessment System | |
| |
| |
Integration with Barrier Delay System | |
| |
| |
Exterior Sensor Subsystem | |
| |
| |
Characteristics Procedures | |
| |
| |
Summary | |
| |
| |
Security Principles | |
| |
| |
| |
Interior Intrusion Sensors | |
| |
| |
Introduction | |
| |
| |
Performance Characteristics | |
| |
| |
Sensor Classification | |
| |
| |
Sensor Technology | |
| |
| |
Effects of Environmental Conditions | |
| |
| |
Sensor Selection | |
| |
| |
Procedures System Integration | |
| |
| |
Summary | |
| |
| |
Security Principles | |
| |
| |
| |
Alarm Assessment | |
| |
| |
Introduction | |
| |
| |
Assessment vs. Surveillance | |
| |
| |
Video Alarm Assessment | |
| |
| |
System Alarm Assessment by Response Force | |
| |
| |
Integration with Safety Systems | |
| |
| |
Legal issues | |
| |
| |
Procedures Acceptance Testing | |
| |
| |
Summary Security | |
| |
| |
Principles | |
| |
| |
| |
Alarm Communication and Display | |
| |
| |
Introduction | |
| |
| |
Evolution of Alarm Reporting Systems | |
| |
| |
AC&D Attributes Alarm Communication Subsystem | |
| |
| |
Alarm Control and Display Offline Systems | |
| |
| |
AC&D System Design | |
| |
| |
Summary | |
| |
| |
Security Principles | |
| |
| |
| |
Entry Control | |
| |
| |
Introduction | |
| |
| |
Personnel Entry Control | |
| |
| |
Personnel Entry Control | |
| |
| |
Bypass Contraband Detection Locks System | |
| |
| |
Integration and Installation Issues | |
| |
| |
Procedures Administrative Procedures | |
| |
| |
Summary | |
| |
| |
Security Principles | |
| |
| |
| |
Access Delay | |
| |
| |
Introduction | |
| |
| |
Barrier Types and Principles System | |
| |
| |
Considerations Aspects of Penetration | |
| |
| |
Perimeter Barriers Structural | |
| |
| |
Barriers Dispensable | |
| |
| |
Barriers Procedures | |
| |
| |
Summary | |
| |
| |
Security Principles | |
| |
| |
| |
Response [extensively updated] | |
| |
| |
Introduction | |
| |
| |
General Considerations | |
| |
| |
Contingency Planning Communication | |
| |
| |
Interruption Procedures | |
| |
| |
Summary | |
| |
| |
Security Principles | |
| |
| |
Part Three | |
| |
| |
| |
Analysis and Evaluation | |
| |
| |
Introduction | |
| |
| |
Adversary Paths | |
| |
| |
Effectiveness Measures | |
| |
| |
Quantitative Analysis | |
| |
| |
Critical Path Qualitative Analysis | |
| |
| |
Summary | |
| |
| |
Security Principles | |
| |
| |
| |
EASI Computer Model for Analysis | |
| |
| |
Introduction | |
| |
| |
Quantitative Analysis Tools | |
| |
| |
EASI Model | |
| |
| |
Using the Model Adversary | |
| |
| |
Sequence Diagrams | |
| |
| |
Summary | |
| |
| |
Security Principle | |
| |
| |
| |
Risk Assessment | |
| |
| |
Introduction | |
| |
| |
Risk Management Approaches | |
| |
| |
Risk Equation Vulnerability Assessment Process | |
| |
| |
Risk Assessment | |
| |
| |
Performance Testing | |
| |
| |
Summary | |
| |
| |
Security Principle | |
| |
| |
| |
Transportation System application [New] | |
| |
| |
| |
Threat ta | |