| |
| |
| |
Overview | |
| |
| |
Threat Assessments | |
| |
| |
The Role of Threat Assessments in Physical Security | |
| |
| |
Physical Security | |
| |
| |
The Role of Technology in Physical Security | |
| |
| |
Summary of the Chapters | |
| |
| |
| |
Threat Assessment and Risk Analysis Basics | |
| |
| |
How to Do a Threat Assessment | |
| |
| |
Identify the Risks | |
| |
| |
Analyze the Risk for Probability of Occurrence | |
| |
| |
Calculating The Cost of a Loss | |
| |
| |
The Survey Form | |
| |
| |
The Crime Statistics | |
| |
| |
Risk Analysis Steps | |
| |
| |
Choosing the Method to Mitigate the Risk | |
| |
| |
Planning and Designing | |
| |
| |
| |
Security Overview | |
| |
| |
Conducting and Using Threat Assessments | |
| |
| |
How to Do a Threat Assessment | |
| |
| |
Identify the Risks | |
| |
| |
Analyze the Risk for Probability of Occurrence | |
| |
| |
Calculating the Cost of a Loss | |
| |
| |
The Survey Form | |
| |
| |
Physical Security | |
| |
| |
Security Lighting | |
| |
| |
Intrusion Detection for Job Trailers | |
| |
| |
Balanced Magnetic Switches | |
| |
| |
Alarm Systems | |
| |
| |
Controlling Vehicular and Pedestrian Traffic Flow | |
| |
| |
Clear Zones | |
| |
| |
Locks and Key Control | |
| |
| |
Equipment Security | |
| |
| |
Job Site Security Surveys | |
| |
| |
The Security Officer's Role | |
| |
| |
POST Orders | |
| |
| |
Closed Circuit Television (CCTV) | |
| |
| |
Access Control Systems | |
| |
| |
Information Security | |
| |
| |
Investigations | |
| |
| |
Eco-Terror | |
| |
| |
The Security Survey and Security Planning | |
| |
| |
| |
The Security Survey | |
| |
| |
Tenant Improvement (TI) jobs | |
| |
| |
Access Points and the Perimeter Fence | |
| |
| |
Remote Job Sites | |
| |
| |
The Security Survey | |
| |
| |
Lighting | |
| |
| |
Tools and Equipment | |
| |
| |
Security Officers | |
| |
| |
Intrusion Detection Systems | |
| |
| |
The Security Survey Form | |
| |
| |
Benefits of Doing a Security Survey | |
| |
| |
How to Conduct a Security Survey | |
| |
| |
| |
Perimeter Security | |
| |
| |
Types of Perimeter Fences | |
| |
| |
Chain Link | |
| |
| |
Wrought Iron | |
| |
| |
Wood Fences | |
| |
| |
Concrete Walls | |
| |
| |
Fence Openings | |
| |
| |
Roll/Slide Gates | |
| |
| |
Cantilever Gates | |
| |
| |
Motorized Gates | |
| |
| |
Swing Gates | |
| |
| |
Barbed Wire | |
| |
| |
Razor Wire | |
| |
| |
| |
Intrusion Detection for Job Trailers | |
| |
| |
Alarm Categories | |
| |
| |
Sensor Technology | |
| |
| |
Switches | |
| |
| |
Volumetric Sensors | |
| |
| |
Ultrasonic Sensors | |
| |
| |
Infrared | |
| |
| |
Glass Breaks | |
| |
| |
Microwave | |
| |
| |
Vibration Sensors | |
| |
| |
Fence Vibration Sensors | |
| |
| |
Fiber Optic | |
| |
| |
Electric Field | |
| |
| |
Capacitance | |
| |
| |
Taut Wire | |
| |
| |
Photo Electric Beam | |
| |
| |
Video Motion Detection | |
| |
| |
Appendix | |
| |
| |
Intrusion Detection System Design Specifications | |
| |
| |
Instructions to Bidders | |
| |
| |
| |
Locks and Key Control | |
| |
| |
Types of Locks | |
| |
| |
Cylindrical Locks | |
| |
| |
Deadbolt Locks | |
| |
| |
Mortise Locks | |
| |
| |
Drop Bolt Locks | |
| |
| |
Rim Cylinder Locks | |
| |
| |
Disc Tumbler Locks | |
| |
| |
Pin Tumbler Locks | |
| |
| |
Unit Locks | |
| |
| |
Cipher Locks | |
| |
| |
Fingerprint Locks | |
| |
| |
Padlocks | |
| |
| |
Electric Strike Locks | |
| |
| |
Electric Locks | |
| |
| |
Magnetic Locks | |
| |
| |
High Security Locks | |
| |
| |
Keying Systems | |
| |
| |
Specifications | |
| |
| |
| |
Video Surveillance | |
| |
| |
CCTV System Components-Camera | |
| |
| |
Video Transmission-Coaxial Cable | |
| |
| |
Fiber Optic Cable | |
| |
| |
Microwave | |
| |
| |
Multiplexer (MUX) | |
| |
| |
Displaying Video-Monitor | |
| |
| |
Recorders-VCR | |
| |
| |
Digital Video Recorders (DVR) | |
| |
| |
Wireless Cameras | |
| |
| |
IP Addressable Cameras | |
| |
| |
Basic System Design Considerations | |
| |
| |
The Selection of the Lens | |
| |
| |
Selection of the Housing | |
| |
| |
Camera Placement | |
| |
| |
Lighting | |
| |
| |
| |
Heavy Equipment Security | |
| |
| |
Hardening the Job Site | |
| |
| |
Protecting Equipment | |
| |
| |
Protecting Tools and Portable Equipment | |
| |
| |
National Databases | |
| |
| |
Investigate All Job Site Thefts | |
| |
| |
| |
Electronic Access Control | |
| |
| |
Biometric Systems-Hand Geometry | |
| |
| |
Fingerprint Reader | |
| |
| |
Iris Scan | |
| |
| |
Retina Scan | |
| |
| |
Voice Recognition | |
| |
| |
Signature Recognition | |
| |
| |
Facial Recognition | |
| |
| |
Combination Systems | |
| |
| |
Access Control Systems Cards | |
| |
| |
Magnetic Stripe | |
| |
| |
Proximity Cards | |
| |
| |
Smart Cards | |
| |
| |
Dual Technology Cards | |
| |
| |
Designing the Access Control System | |
| |
| |
Types of Access Control System Locks | |
| |
| |
Request to Exit Device (REX) | |
| |
| |
Door Contacts | |
| |
| |
Automatic Door Closer | |
| |
| |
Access Control System Panels | |
| |
| |
Sample Design Specifications for Electronic Security Systems | |
| |
| |
| |
Role of the Security Officer | |
| |
| |
Security Officer Selection | |
| |
| |
Security Officer Company Contracts | |
| |
| |
Post Orders | |
| |
| |
Security Officer Reports | |
| |
| |
Appendix A | |
| |
| |
Appendix B | |
| |
| |
Appendix C | |
| |
| |
| |
Security Policies | |
| |
| |
Developing Policies | |
| |
| |
Site Access Control for Job Sites | |
| |
| |
Equipment Security | |
| |
| |
Workplace Violence Prevention | |
| |
| |
Bomb Threats | |
| |
| |
| |
Investigations | |
| |
| |
Pre-employment Screening | |
| |
| |
Investigations for Theft of Company Property | |
| |
| |
| |
Information Security | |
| |
| |
Document Classification | |
| |
| |
Physical Security Countermeasures | |
| |
| |
Physical Access | |
| |
| |
Security Lighting | |
| |
| |
Marking Documents | |
| |
| |
Securing Laptop and Desk Top Computers | |
| |
| |
Disposing of Confidential Documents | |
| |
| |
Security Awareness | |
| |
| |
Security Website | |
| |
| |
Security Bulletins | |
| |
| |
Security Slogans | |
| |
| |
Physical Security Audits | |
| |
| |
Physical Protection for Cables and Closets | |
| |
| |
Technical Security Countermeasures | |
| |
| |
Computer and Network Access Control | |
| |
| |
Installing Firewalls on Job Sites | |
| |
| |
Virus Protection | |
| |
| |
Encryption | |
| |
| |
| |
Security Lighting | |
| |
| |
Foot-Candle Power | |
| |
| |
Categories of Security lighting | |
| |
| |
Types of Lamps (Luminaries) | |
| |
| |
Types of Security Lighting | |
| |
| |
Lighting Requirements for security Protection | |
| |
| |
Lighting Requirements for CCTV | |
| |
| |
Electrical Power Sources for Security Lighting | |
| |
| |
Wiring and Lighting Controls | |
| |
| |
Maintenance of Lighting Systems | |
| |
| |
Security Lighting Design Considerations | |
| |
| |
| |
Animal Rights and Eco-Terrorism | |
| |
| |
The Groups: ALF and ELF | |
| |
| |
Protecting the Job Site | |
| |
| |
| |
Developing the Job Site Security Plan | |
| |
| |
Performing the Threat Assessment | |
| |
| |
The Elements of the Plan | |
| |
| |
| |
Where to Find Help with Job Site Security and Useful Forms | |
| |
| |
| |
Where to Find Help with Job Site Security | |
| |
| |
| |
Useful Forms | |
| |
| |
Index | |