Skip to content

Vulnerability Assessment of Physical Protection Systems

Best in textbook rentals since 2012!

ISBN-10: 0750677880

ISBN-13: 9780750677882

Edition: 2006

Authors: Mary Lynn Garcia

List price: $70.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Vulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allow readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The book will address the full spectrum of a VA, including negotiating tasks with the customer, project management and planning of the VA, team membership, step-by-step details for performing…    
Customers also bought

Book details

List price: $70.95
Copyright year: 2006
Publisher: Elsevier Science & Technology
Publication date: 12/8/2005
Binding: Paperback
Pages: 400
Size: 7.00" wide x 10.00" long x 0.65" tall
Weight: 1.782
Language: English

Ms. Garcia is a Senior Member of the Technical Staff at Sandia National Labs. She has over 20 years experience in Science and Engineering research, development, application, teaching, and project management experience of security systems and technology. She has been a certified Protection Professional since 1997.

Preface
Introduction to Vulnerability Assessment
Risk Management and Vulnerability Assessment
Risk Assessment and the Vulnerability Assessment Process
Statistics and Quantitative Analysis
Vulnerability Assessment Process Overview
Planning the Vulnerability Assessment
Project Management
Establish the Vulnerability Assessment Team
Project Kick-Off Meetings
Protection Objectives
Facility Characterization
Data Collection-Detection
Intrusion Sensors
Alarm Assessment
Entry Control
Alarm Communication and Display
Data Collection-Delay
Data Collection-Response
Analysis
Reporting and Using the Vulnerability Assessment
Systems Engineering and Vulnerability Assessment
System Requirements
System Design and Analysis
System Installation and Test
System Replacement
Summary
References
Physical Protection Systems Principles and Concepts
Physical Protection Systems Overview
Physical Protection System Design
PPS Functions
Detection
Delay
Response
Relationship of PPS Functions
Characteristics of an Effective PPS
Protection-in-Depth
Minimum Consequence of Component Failure
Balanced Protection
Design and Evaluation Criteria
Additional Design Elements
Summary
Reference
Getting Started
Project Management
Phase One-Project Planning
Initial Customer Contact
Define the Project
Phase Two-Managing the Project
Project Status and Reporting
Recovery Plans
Project Management Tools
Project Closeout
Project Management Summary
Establish a Vulnerability Assessment Team
Vulnerability Assessment Project Leader
Systems Engineer
Security System Engineer
SME-Intrusion Sensing Subsystem
SME-Alarm Assessment Subsystem
SME-Alarm Communication & Display (AC&D) Subsystem
SME-Entry Control Subsystem
SME-Delay Subsystem
SME-Response Subsystem
SME-Communications Subsystem
SME-Analyst
Special Note for Response Force Simulations
Participation of On-Site Personnel
Kick-Off Meetings for Project Team and Customer
Project Team Kick-Off Meeting
VA Team Guide
Site Information
Customer Kick-Off Meeting
Summary
References
VA Process Inputs-Establish Protection Objectives
Defining the Threat
Listing Information Needed
Collecting Information
Organizing Information
Threat Definition Methods
Insider Threat
Other Notes on Threat Definition
Estimating Likelihood of Attack
Asset Identification
Asset Identification Methods
Manual Listing
Logic Diagrams
Criteria
Threat/Asset Matrix
Facility Characterization
Characterization Tools
Facility States
Security Checklists
Summary
References
Data Collection-Intrusion Detection Subsystem
Sensor Overview
Exterior Intrusion Sensor Technologies and Evaluation
Freestanding Sensors
Exterior Microwave Sensors
Electric-field Sensors
Freestanding Sensors Summary
Buried-Line Sensors
Ported Coaxial Sensors
Buried-Line Sensors Summary
Fence-Associated Sensors
Taut Wire Sensors
Fiber Optic Sensors
Fence-Associated Sensors Summary
Other Exterior Intrusion Sensing Technologies
General Exterior Intrusion Sensing Evaluation
Summary of Exterior Intrusion Sensing
Interior Intrusion Sensor Technologies and Evaluation
Boundary Penetration Sensors
Magnetic Switches
Glass-Break Sensors
Boundary Penetration Sensors Summary
Volumetric Sensing Technologies
Microwave Sensors
Passive Infrared Sensors
Video Motion Detection Sensors
Volumetric Sensors Summary
Proximity Sensing Technologies
Pressure Sensors
Proximity Sensors Summary
Other Technologies
General Interior Intrusion Sensing Evaluation
Summary of Interior Sensing Technologies
Intrusion Sensing by Humans
Estimating Intrusion Sensing Performance
Summary
Reference
Data Collection-Alarm Assessment Subsystem
Alarm Assessment Overview
Assessment versus Surveillance
Video Assessment Performance Factors
Evaluation Testing
Video Assessment Subsystem
Video Subsystem Equipment
Cameras and Lenses
Camera Housings
Camera Mounting
Lighting
Signal Transmission
Video Recording and Storage
Monitors
Other Equipment
Procedures
Estimating Performance
Summary
References
Data Collection-Entry Control Subsystem
Entry Control Subsystem Overview
Personnel Control
Tokens
Coded Credentials
Private Information
Badge Control Equipment Components and Functions
Biometrics
Locks
Material Control
Personnel Metal Detection
Trace Detection Systems
Package Material Control
Evaluation Criteria for Contraband Detection
Asset Tracking
Vehicle Control
Subsystem Integration Issues
Entry Control Subsystem Components
General Evaluation Criteria
Access Controls
Operator Training
Estimating Performance
Summary
Reference
Data Collection-Alarm Communication and Display Subsystem
Alarm Communication and Display Overview
Communication
High-Level Communications
Low-Level Communications
Information Handling
Control and Display
Offline Systems
Evaluation Techniques
Operator Workload
Displays
Video System Integration
Network Issues
Other Evaluation Aspects
Estimating Performance
Summary
Reference
Data Collection-Delay Subsystem
Delay Overview
Perimeter Barriers
Fences
Gates
Chain-link Gates
Turnstiles
Vehicle Barriers
Buildings
Walls
Floors and Roofs
Doors
Personnel Doors
Attack- and Bullet-Resistant Doors
Vehicle Doors
Vault Doors
Windows, Grilles, and Utility Ports
Windows
Grilles and Utility Ports
Windows, Grilles, and Utility Ports Summary
Other Barriers
Armor
Vaults
Earth and Overburden
Underground Facilities
Airborne-Attack Barriers
Waterborne-Attack Barriers
Tie-downs and Restraints
Nonlethal Weapons
Dispensable Materials and Deployable Barriers
General Delay Subsystem Evaluation Factors
Estimating Performance
Summary
Reference
Data Collection-Response Subsystem
Response Overview
Response Strategies
Deterrence
Denial
Containment
Recovery
Delayed Response
Equipment
Procedures
People
Immediate Response
General Warning Alarms
Observe-and-Report
Dispatch of Unarmed Security Personnel
Dispatch of Armed Security Personnel
Response Communications
Radio Communication System
Radio Maintenance
Operational Issues
Estimating Performance
Summary
References
Analysis
Analysis Overview
Analysis Tools
Analysis Process
Adversary Sequence Diagrams and Path Analysis
Scenario Analysis
Estimate Neutralization
Other Analysis
Calculate System Effectiveness
Upgrade Analysis
Qualitative Analysis
Facility Overview
Path Analysis
Scenario Analysis
Upgrade Analysis
Quantitative Analysis
Facility Description
Path Analysis
Scenario Analysis
Estimate Neutralization
Baseline System Effectiveness
Upgrade Analysis
Summary
Reporting and Using Results
Overview
Reporting Results
Briefings
Report Content and Format
Protecting Results
Reporting Summary
Using the Vulnerability Assessment
Design Stages
Project Closeout
Summary
Project Management forms and Templates
Initial Briefing Template
Threat and Facility Worksheets
Data Collection Sheets
Alarm Communication and Display Subsystem Criteria
Representative Delays
Results Briefing Template
Index