Title: Interior and Exterior Security Concerns
1Interior and Exterior Security Concerns
2Introduction
- This chapter deals with security concerns that
could be either interior or exterior problems
depending on the type of facility - Example
- a freestanding retail outlet store has problems
of perimeter security that include windows,
doors, and roof - the same store located within the confines of a
mall may not be as concerned with the windows and
doors or with perimeter defense
3Buildings On Or As The Perimeter
- The building forms part of the perimeter barrier
- The building walls are the entire perimeter of
the facility - When a fence joins the building as a continuation
of the perimeter - there should be no more than two inches between
the two structures - may be wise to double the fence height
4Windows and Doors
- Windows and other openings larger than 96 square
inches - be protected by grilles, metal bars, or heavy
screening - when they are less than 18 feet from the ground
- when they are less than 14 feet from structures
outside the barrier
5Windows
- Most forced break-ins are through window glass
- Windows should be protected with grillwork, heavy
screening, or chain-link fencing
6Burglary-Resistant Glass
- Uses UL-listed burglary-resistant glass
- A laminate of two sheets of flat glass (usually
3/16 inch thick) held together by a 1/16-inch
layer of polyvinyl butyl, a soft transparent
material - One of the brands of UL-listed polycarbonate
glazing material - Other options
- Coating glass with a four- to six-mil cover of
mylar - Plastic glazing
7Doors
- The required security measures at specific door
will be determined by - The operations in progress within the facility
- By the value of the assets stored or available in
the various areas
8Door Construction and Hardware
- Locks
- The operating mechanism
- The keying device
- The latch or bolt
- The locking bolt must throw at least an inch into
the jamb for security applications - Use heavy wood or metal doors with reinforced
jambs - Employ a hardened steel key cylinder guard
- Hinges should be installed
- With the screws concealed
- With the hinge pins either welded or flanged to
prevent removal
9Attacks Against Locks
- Picking the lock or making a key by impression
are the methods generally used - Picking
- Metal picks are used to align the levers, pins,
discs or tumblers as an authorized key would - Keying
- Making a key by taking impressions
10Locks as Delaying Devices
- Install special pick-resistant,
impression-resistant lock cylinders - More expensive
- Every lock will eventually yield to an attack
- Should be thought of as only a delaying device
- The longer the delay the better
11Removable Cores
- Used where locks are changes often
- Made to be removed if necessary with a core key,
allowing a new core to be inserted
12Keying Systems
- The change key
- One key to a single lock within a master-keyed
system - The submaster key
- Will open all the locks within a particular area
or grouping in a given facility - The master key
- Where two or more submaster systems exist, a
master key system is established - The grand master key
- One that will open everything in a system
involving two or more master-key groups
13Rekeying
- Outer or perimeter locks usually be changed first
- Old locks can be moved to interior spaces
requiring - Lower level of security
14Key Control
- Try to keep keys in the hands of security or
management personnel - Keys should never be issued on a long-term basis
to outside janitorial personnel - It is bad practice to issue entrance keys to
tenants of an office building - A guard or building employee should control entry
- The security department must maintain a careful,
strictly supervised record of all keys issued - When a key is lost, the circumstances should be
investigated - Master keys should be kept to a minimum
15Other Operating Mechanisms for Access Control
- Combination locks
- Have three dials that must be aligned in the
proper order before the lock will open - Code-operated locks
- Opened by pressing a series of numbered buttons
in the proper sequence - Card-operated locks
- Presenting a card and code to open lock
16Advantages of Access Control Systems
- Security staff no longer need to spend hours
rotating key cores and keeping detailed logs. - Card keys can be programmed to function in a
variety of ways. - Lost cards can be deactivated in a matter of
seconds. - The systems often allows tracking of the time and
number of entries at a given site
17Types of Card-Operated Systems
- Magnetic coded cards
- Contains a flexible magnetic sheet sealed between
two sheets of plastic - Wiegan Effect cards
- Short-length magnetic wires embedded within the
card - Optical coded cards
- Contain bar codes
- Proximity cards
- Send a code to a receiver via magnetic, optical,
or ultrasonic pulses - Radio Frequency Identification (RFID)
- Radio frequency identification
18Types of Card-Operated Systems (Cont.)
- Biometric systems
- Designed to recognize biological features
- Fingerprint recognition systems
- Optically scan a chosen fingerprint area and
compare the scanned area with a file - Hand geometry recognition systems
- Use the geometry of the hand
19Locking Devices
- Electromagnetic locking devices
- Hold doors closed by magnetism
- Double-cylinder locking devices
- Installed in doors that must be secured from both
sides, requiring a key to open them from either
side - Most common application is in doors with glass
panels - Emergency exit locking devices
- Panic-bar installations
20Roofs and Common Walls
- Often overlooked part of the perimeter is the
roof - Entry can be made through skylights or by
chopping through the roof - Common Wall
- Frequently been entered by breaking through the
wall from a poorly secured neighboring occupancy
21Surveillance Devices
- Normally conducted by patrolling security
personnel - Technology can be used
- Motion picture cameras
- Sequence cameras
- Closed- circuit television (CCTV) monitors with
video cameras
22Effective Surveillance Systems
- Should produce an identifiable image of persons
engaging in criminal behavior - CCTV systems coupled with recording equipment or
computers should be used
23Technological Advances In CCTV
- Reduced size of the camera
- Reduced price of color cameras
- Improved reliability of color cameras
- Starlight cameras
- Allow for good video reproduction in low light
situations
24CCTV Cameras
- Variables to be considered during a site survey
- Is the camera to be visible and used as a
deterrent to crime or hidden and used in civil or
criminal prosecutions? - What effect, if any, will the sun have on the
operation of the system? - Where is the best location for a camera?
- Should the placement of the camera be high?
- What type of lighting is in use?
25New Construction
- Modern construction creates offices that are
essentially open-top boxes - Any given floor of a building has a crawl space
that runs from exterior wall to exterior wall
26Security at the Building Design Stage
- Architects interest in design for protection of
buildings and grounds is usually minimal - Recent events may prompt designers to consider
the incorporation of security in their designs.
27Security Principles in Design
- Considerations
- The number of perimeter and building openings
should be kept to a minimum consistent with
safety codes. - Perimeter protection should be planned as part of
the overall design. - Exterior windows, if they are less than 14 feet
above ground level, should be constructed of
glass brick, laminated glass, or plastic
materials, or they should be shielded with heavy
screening or steel grilles.
28Security Principles in Design (Cont.)
- Points of possible access or escape that breach
the exterior of the building or the perimeter
protection should be protected. Points to be
considered are skylights, air conditioning vents,
sewer ducts, manholes, or any opening larger than
96 square inches. - 5High-quality locks tied to smart card technology
should be employed on all exterior and restricted
area doors for protection and quick-change
capability in the event of cardkey loss. - Protective lighting should be installed.
- Shipping and receiving bays should be widely
separated from each other.
29Security Principles in Design (Cont.)
- Exterior doors intended for emergency use only
should be fitted with alarms. - Exterior service doors should lead directly into
the service area so that non-employee traffic is
restricted in its movement. - Dock areas should be designed so that drivers can
report to shipping or receiving clerks without
moving through storage areas. - Employment offices should be located so that
applicants either enter directly from outside or
move through as little of the building as
possible.
30Security Principles in Design (Cont.)
- Employee entrances should be located directly off
the gate to the parking lot - Employee locker rooms should be located by
employee entrance and exit doors. - Doors in remote areas should be fitted with
alarms. - Dock areas should be designed so that drivers can
report to shipping or receiving clerks without
moving through storage areas. - Employment offices should be located so that
applicants either enter directly from outside or
move through as little of the building as
possible.
31Security Principles in Design (Cont.)
- Employee entrances should be located directly off
the gate to the parking lot. - Employee locker rooms should be located by
employee entrance and exit doors. - Doors in remote areas should be fitted with alarms
32Chapter 11
- The Inner Defences Intrusion and Access Control
33Introduction
- Minimize or control access to the facilitys or
the buildings interior - Control traffic without interfering with the
function of the business - Consider
- The need to protect against the internal thief as
well as the potential intruder
34Points of Examination
- Doors
- Doors to Sensitive Areas
- Telephone equipment rooms
- Computer installations
- Research and development
- Equipped with automatic door-closing devices
- Fitted with strong dead bolts and heavy latches
- Supply room
- Test room
- Secured whenever those rooms are not in use
35Points of Examination (Cont.)
- Office Area Doors
- Minimum-security areas during regular working
hours - When there is little or no use of the office
area, these doors should be secured - Traffic Patterns
- Doors must be examined in an effort to establish
a schedule for their use - Authorized employee entrances
- To protect against surreptitious use, a door
should be fitted with at least a local alarm
36Points of Examination (Cont.)
- Traffic Control
- Traffic in and out and within a facility
- Perimeter barriers
- Locked doors
- Screened windows
- Identification of employees and visitors
- Directing or limiting their movements
- The control of all incoming and outgoing packages
- The control of trucks and private cars
37Visitors
- All visitors should be required to identify
themselves - Sales, service, and trade personnel should
receive clearance in advance on making an
appointment - All traffic patterns involving visitors should be
short, physically confined to keep them from
straying
38Employee Identification
- Identification of employees by guards or
receptionists - Large businesses the opportunity for error high
- The use of badges or identification cards
- Should designate when, where, how, and to whom
passes - Should contain a clear and recent photograph of
the bearer - Photograph should be at least one inch square
- Should be laminated and of sturdy construction 3
39Package Control
- Control of packages entering or leaving the
premises - Must be dealt with in order to prevent
- Theft
- Misappropriation of company property
- concealment of dangerous materials
- Packages brought in should be checked for content
40Files, Safes, and Vaults
- The high- security storage areas
- Papers
- Records
- Plans
- Cashable instruments
- Precious metals
- Choice of the proper security container
- Protective containers are designed to secure
against either burglary or fire
41Files
- Filing cabinets with a fire rating of one hour
- Filing cabinets should be fitted with a
combination lock
42Safes
- Record safe (fire-resistant)
- Money safe (burglary-resistant)
- Safes are rated to describe the degree of
protection they afford - The more protection provided, the more expensive
the safe
43Record Safes
- Fire-resistant containers
- UL rating of 350-4 (formerly designated A) can
withstand exterior temperatures building to
2000F for four hours without permitting the
interior temperature to rise above 350F - Explosion impact containers
- Computer media storage containers
- Insulated vault-door
44Money Safes
- Burglary-resistant safes
- Heavy metal boxes without wheels
- Weighs at least 750 pounds
- Have a limited holding capacity
45Securing the Safe
- Safe should be securely fastened to the structure
- It is becoming a common practice to install the
safe in a concrete floor - Only the door and its combination are exposed
46Vaults
- Basically enlarged safes
- The door is usually of high-quality, reinforced
concrete - 6 inches thick
- May be as much as 24 inches thick
- Walls, ceiling, or floor
- Never less than 12 inches thick
- A difficult architectural problem
- Situated at or below ground level
47Inspections
- Guard Patrols
- Visual inspections by irregular patrols through
office spaces - Sweep the facility after closing time
- Patrols should be made at least once each hour
- More often if the area and the size of the guard
force permit
48Alarms
- Alarm systems permit more economical use of
security personnel - Alarm systems may also substitute for costly
construction of barriers
49Kinds of Alarm Protection
- Intrusion alarms
- Signal the entry of persons into a facility or an
area while the system is in operation - Fire alarms
- Warn of fire dangers in various stages of
development - Special-use alarms
- Warn of a process reaching a dangerous
temperature - The presence of toxic fumes
- That a machine is running too fast
50Alarm System Elements
- An alarm sensor
- A device that is designed to respond to a certain
change in condition - A circuit or sending device
- A device that sends a signal about whatever is
sensed to some other location - An enunciator or sounding device
- A sounding device, which is used to alert someone
that the sensor has detected a change in
conditions
51Boundary-Penetration Sensors
- Vibration Sensors
- Passive line sensors, either visible or covert
- Detect the movement of the surface to which they
are fastened - Sudden impact to a surface cause vibrations at
certain frequencies which are picked up by the
sensor
52Vibration Sensors
- Provide early warning of a forced entry
- Some detectors may create nuisance alarms if
mounted on walls or structures that are exposed
to external vibration
53Interior Motion Sensors
- Microwave Sensors
- Ultrasonic Sensors
- Active Sonic Sensors
- Passive Infrared Sensors
- Dual Technology Sensors
- Video Motion Detectors
54Alarm Monitoring Systems
- The central station
- This is a facility set up to monitor alarms
indicating fire, intrusion, and problems in
industrial processes - Proprietary system
- This functions in the same way as does a central
station system except that it is owned and
operated by the company rather than a contractor
55Alarm Monitoring Systems (Cont.)
- Local alarm system
- The sensor activates a circuit that in turn
activates a horn, a siren, or even a flashing
light located in the immediate vicinity of the
area fitted with alarms - Auxiliary system
- Installation circuits are connected to local
police or fire departments or 911 Centers by
leased telephone lines
56Alarm Monitoring Systems (Cont.)
- Local alarm-by-chance system
- This is a local alarm system in which a bell or
siren is sounded with no predictable response
(car alarms) - Dial alarm system
- This system is set to dial a predetermined
telephone number or numbers when the alarm is
activated
57Cost Considerations
- The effectiveness of any alarm procedure lies in
the response it commands - Most alarms takes no action it only notifies
that action should be taken - Cost can be substantial
- Alarm installations are made in order to reduce
the size of the guard force