| |
| |
Acknowledgments | |
| |
| |
About the Author and Contributors | |
| |
| |
Introduction | |
| |
| |
| |
Risk Assessment and Security Planning | |
| |
| |
| |
People and Property | |
| |
| |
People | |
| |
| |
Property | |
| |
| |
Communications Security | |
| |
| |
Conflicts Between Security and Safety | |
| |
| |
Conclusion | |
| |
| |
| |
Identifying Security Threats | |
| |
| |
What Can Happen | |
| |
| |
Threats to Personnel Safety | |
| |
| |
Theft of Property | |
| |
| |
Vandalism and Sabotage | |
| |
| |
Conclusion | |
| |
| |
| |
Assessing the Risks | |
| |
| |
Assigning the Assessment and Response Team | |
| |
| |
Periodic Review of Documentation | |
| |
| |
Assembling a Risk Assessment Group | |
| |
| |
Deciding Where to Focus Security Measures | |
| |
| |
Assessing the Facility | |
| |
| |
Assessment of Specific Risks | |
| |
| |
Probability of Occurrence | |
| |
| |
Assessing Facilities by Type | |
| |
| |
Conclusion | |
| |
| |
| |
Crisis Management | |
| |
| |
Making Crisis Management Plans | |
| |
| |
Who Prepares the Plan? | |
| |
| |
What Are the Critical Objectives? | |
| |
| |
Teams and Teaming | |
| |
| |
| |
Security through Planning, Design, and Operations | |
| |
| |
The Urban Setting | |
| |
| |
Three Approaches to Physical Protection | |
| |
| |
Public Space Versus Private Space | |
| |
| |
Creating and Updating a Security-Conscious Building Plan | |
| |
| |
Single-User Versus Multi-User Facilities | |
| |
| |
A Word of Caution | |
| |
| |
Storage of Volatile Materials | |
| |
| |
Protecting Utilities | |
| |
| |
Ingress Concerns | |
| |
| |
Establishing a New Physical Security Plan | |
| |
| |
Budgeting and Startup | |
| |
| |
The Security Station | |
| |
| |
Points of Egress and Refuge | |
| |
| |
Fire Suppression and Alarm | |
| |
| |
Interior Planning and Design | |
| |
| |
Other Interior Spaces | |
| |
| |
Conclusion | |
| |
| |
| |
Chemical, Biological, and Radiological Agents | |
| |
| |
Biological Agents | |
| |
| |
Chemical Agents | |
| |
| |
Radiation | |
| |
| |
Conclusion | |
| |
| |
| |
Responses to Emergency Events | |
| |
| |
Emergency Response Teams and Plans | |
| |
| |
Evacuation | |
| |
| |
Alert Systems | |
| |
| |
Shelter from Severe Weather | |
| |
| |
Weather Forecasting Sources | |
| |
| |
Emergency Equipment | |
| |
| |
Health, Safety, and Security | |
| |
| |
Fresh Air and Lighting | |
| |
| |
Conclusion | |
| |
| |
| |
Security Devices and Systems | |
| |
| |
Controlling Access | |
| |
| |
Review of Security Devices and Systems | |
| |
| |
Emergency Communications | |
| |
| |
A Word About Privacy and Security | |
| |
| |
Conclusion | |
| |
| |
| |
Integration of Security and Related Systems | |
| |
| |
Information Technology Security | |
| |
| |
Monitoring | |
| |
| |
Proprietary or On-Site Systems | |
| |
| |
Off-Site Monitored Systems | |
| |
| |
Components of Security Monitoring Stations | |
| |
| |
Integration and Enterprise Security and Safety | |
| |
| |
What Components Should Be Integrated? | |
| |
| |
Integrated Components | |
| |
| |
Deciding Which Systems to Integrate, and When | |
| |
| |
Conclusion | |
| |
| |
| |
Security Cost Data | |
| |
| |
Introduction to the Cost Data | |
| |
| |
Quick Start | |
| |
| |
How to Use the Cost Data: The Details | |
| |
| |
How to Use the Unit Price Pages | |
| |
| |
Unit Price Section | |
| |
| |
How to Use the Assemblies Cost Tables | |
| |
| |
Assemblies Section | |
| |
| |
Crews | |
| |
| |
Location Factors | |
| |
| |
| |
Appendix, Resources, Glossary, and Index | |
| |
| |
Introduction | |
| |
| |
Appendix | |
| |
| |
Resources | |
| |
| |
Glossary | |
| |
| |
Index | |