Skip to Content

The Complete Guide to Physical Security

By Paul R. Baker, Daniel J. Benny

Auerbach Publications – 2012 – 360 pages

Purchasing Options:

  • Add to CartHardback: $73.95
    978-1-42-009963-8
    November 19th 2012
    Currently out of stock

Description

To adequately protect an organization, physical security must go beyond the "gates, guns, and guards" mentality that characterizes most security programs. Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. The Complete Guide to Physical Security discusses the assets of a facility—people, building, and location—and the various means to protect them. It emphasizes the marriage of technology and physical hardware to help those tasked with protecting these assets to operate successfully in the ever-changing world of security.

The book covers specific physical security technologies, such as intrusion detection, access control, and video surveillance systems—including networked video. It addresses the reasoning behind installations, how to work with contractors, and how to develop a central station for monitoring. It also discusses government regulations for building secured facilities and SCIFs (Sensitive Compartmented Information Facilities). Case examples demonstrate the alignment of security program management techniques with not only the core physical security elements and technologies but also operational security practices.

The authors of this book have nearly 50 years combined experience in the security industry—including the physical security and security management arenas. Their insights provide the foundation for security professionals to develop a comprehensive approach to achieving physical security requirements while also establishing leadership roles that help further the overall mission of their organization.

Reviews

"There is much to like about this book with its definitions as well as the logical progression through the chapters on how to develop a physical security program … it is a good introduction to physical security concepts."

ASIS Dynamics

Contents

Physical Security Planning

Setting the Stage

Site Planning

Reviewing the Physical Design

Vulnerability Assessments

The Security Survey

Vulnerability Assessment

Developing a Vulnerability Assessment

Understanding the Threats

Making Adjustments

Security Design and Planning

Security Planning and Evaluation

Security Design Concepts

Security Technologies

EASI Model

Adversary Sequence Diagram

Working with Architects

Working with Contractors

Construction Review

Security Construction Projects

New Construction

Initial Point of Access

Roadway Design

Parking

Loading Docks

Signage

Retrofitting

Protection in Depth

Protection-in-Depth Concepts

Protection Plans

Evacuation Drills

Incident Response

Penetration Tests

Access Control Violation Monitoring

Perimeter Protection

Crime Prevention through Environmental Design (CPTED)

Protecting with CPTED Concepts

Barriers

Lighting

Access Control

Access Control

Anti-Passback

Access Control Head End

Turnstiles and Mantraps

Physical Protection Systems

Doors

Windows

Interior Intrusion Detection Systems

Perimeter Intrusion Detection Systems

CCTV and IP Video

The Essential Guide to Video Surveillance

Video Surveillance Use Cases

Video Surveillance System Classifications

Image Capture Video Sources—Cameras

Lenses

Lighting

HDTV

Recording Systems

Video Management Systems

Video Control, Analysis, and Video Content Analysis Systems

Using a Step-by-Step Approach to System Selection and Deployment

Upgrade Path

Manpower and Video Surveillance

Privacy and Legal Considerations—Video Surveillance Checklist

The Future of Video Surveillance

Keys, Locks, and Safes

Keys, Locks, and Safes

Developing a Master Locking System

Safes

Vaults

Containers

Biometrics

What Is Biometrics?

Multibiometric Systems

Deploying Biometrics

Privacy

Biometric Metrics

Attacks on Biometric Systems and Their Remedies

Security Guard Force

Establishing a Security Guard Force

Mission and Duties of the Security Guard Force

Profile of the Facility to Be Protected

Proprietary Security Guard Force

Contract Security Guard Force

Hybrid Force

Security Guard Uniforms

Security Guard Identification

Security Guard as an Authority Figure

Security Guard Protective Equipment

Security Guard Training

Professional Security Certifications

Personnel Issues

Central Station Design

Developing an Operation

Design Requirements

Secondary Amenities for an Operations Control Center

Alarm Assessment

Government Security

SCIF

Location

Design

Sound Masking

TEMPEST

Shielding

Filtering

Access

Security Alarm Requirements

Open Storage

Closed Storage

Dealing with Contractors

Appendix A: Fixed Facility Checklist

Financial Institutions and Banks

Vaults

Safes

ATMs

Night Depositories

Teller Cash Recyclers

Dye Packs

Barriers

Ambush Features

Video Systems

Holdup Alarms

Bank Guards

Data Center Protection

Data Centers

Fire Protection

Fire Detection/Alerting

Fire Suppression

Total System Cost

Determining Total System Cost

System Design Cost

System Installation Cost

System Operational Cost

IT-Related Cost

Maintenance Cost

Replacement Cost

Cost-Benefit Analysis

Cost of Loss

Cost of Prevention

Return on Investment

Cost Factors

Security Master Plan

Security Master Plan Strategy

Engaging the Stakeholders

What Should Your Security Philosophies Be?

Technology Migration Strategy

Equipment Replacement Schedules

Security Foresight

Strategic Foresight

Foresight Techniques

Security Leadership

What Is Leadership?

Purpose of Leadership

Effective Leadership

Why Security Leaders Are Important

Understanding the Basics

Are Leaders Born or Made?

Good Leadership

Bad Leadership

Going from Bad to Good

Forging the Future

New Definitions for Leaders in the Twenty-First Century

Index

Author Bio

Dr. Paul R. Baker began his security career in the U.S. Marine Corps as a military policeman. Upon discharge, he joined the Maryland State Police and worked in all phases of law enforcement, spending the majority of his career in the intelligence and narcotics areas. Upon retirement in 2001, he began the security management phase of his journey, working for the MITRE Corporation, Institute for Defense Analysis, Capital One Bank, and, finally, with the RAND Corporation.

Dr. Baker is board certified in security management as a certified protection professional (CPP) by ASIS (American Society for Industrial Security) International. He is an adjunct professor for University of Maryland University College in the homeland security field and an adjunct professor for Southwestern College in its security management curriculum. He is a contributor to the CRC Press books Official (ISC)2® Guide to the CISSP® CBK®, Second Edition and Official (ISC)2 Guide to the ISSAP CBK.

Dr. Daniel J. Benny is the security discipline chair at Embry-Riddle Aeronautical University. He served as a U.S. Navy intelligence officer and DOD Federal Police Chief and holds a Ph.D. in Criminal Justice from Capella University. He is board-certified in security management as a certified protection professional (CPP) and board-certified as a professional certified investigator (PCI)—both by ASIS International; certified fraud examiner (CFE) by the Association of Certified Fraud Examiners; certified confidentiality officer (CCO) by the Business Espionage Controls and Countermeasures Association; certified member (CM) airport certified employee-security (ACE); and airport security coordinator by the American Association of Airport Executives.

Dr. Benny is the author of the CRC Press books General Aviation Security: Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports; Cultural Property Security: Protecting Museums, Historic Sites, Archives, and Libraries; and the forthcoming book, Industrial Espionage: Developing a Counterespionage Program Security. He has authored over 300 articles on security administration, intelligence, aviation security, private investigation, and cultural property security topics.

Name: The Complete Guide to Physical Security (Hardback)Auerbach Publications 
Description: By Paul R. Baker, Daniel J. Benny. To adequately protect an organization, physical security must go beyond the "gates, guns, and guards" mentality that characterizes most security programs. Creating a sound security plan involves understanding not only security requirements but...
Categories: Estate and Facilities Management, Forensic Science - Law, Computing & IT Security