Building Security Locking Systems - PowerPoint PPT Presentation

1 / 55
About This Presentation
Title:

Building Security Locking Systems

Description:

Myths & Challenges 'One size does NOT fit all.' Facilities often have unique challenges. ... Tornado. 3. X. 5. 15. Shooter. 1. X. 5. 5. Assault -person. 3. X. 5 ... – PowerPoint PPT presentation

Number of Views:67
Avg rating:3.0/5.0
Slides: 56
Provided by: Bru786
Category:

less

Transcript and Presenter's Notes

Title: Building Security Locking Systems


1
Building Security Locking Systems
  • Tennessee Board of Regents
  • Educational Seminar
  • April 16, 2009

2
Bruce HolmesChief of Police,Director of
Safety SecurityUniversity System of
Georgia404-656-2247404-831-2959
cellbruce.holmes_at_usg.edu
3
Challenges today
  • New student body
  • Increased attention, awareness of campus security
    status.
  • Shrinking budgets search for alternative, cost
    effective methods for accomplishing security
    objectives
  • Proliferation of technology based options
  • Merging IT infrastructure security systems
  • Pushing facility security systems to provide
    personal protection services

4
Myths Challenges
  • One size does NOT fit all.
  • Facilities often have unique challenges. (Data
    based decisions)
  • Perception is reality
  • Must be considered as a part of the evaluation
  • Maintaining security while maintaining access to
    education.
  • Processes/methods that appear overly difficult
    for users are not effective.

5
Facility security planning .
  • Must.
  • involve various campus constituents.
  • Faculty, staff, public safety, students, and
    others
  • Strive for consensus when possible
  • base decisions on facility specific data.
  • Gathering information is a simple process
  • employ a comprehensive approach.
  • Security Triangle

6
Security Triangle 3 Ps
  • Policies
  • Procedures
  • User-friendly processes

7
Building Access Control?
  • Access control is employing methods to restrict
    and/or limit ones access to a facility.
  • Preventative Measures
  • Staffed entrances
  • Campus police/security
  • Life-Safety and egress
  • Door control/access methods devices
  • Monitoring Surveillance

8
Physical Security Planning
  • Layer Approach
  • Security is planned using a layered approach
  • Outer Layer approach to building or access to
    campus
  • Inner Layer exterior area immediately adjacent
    to building including exterior doors and windows
  • Interior Layer inside areas

Outer Layer
Inner Layer
Interior Layer (Building)
9
Example
10
Data Driven Decision Making
  • Need adequate information from various sources
  • Crime statistics
  • Building occupancy loads
  • Programming information
  • Inventory information
  • Using data on which to base your decisions
    increases your odds of asking the right question.

11
Basic Planning Tools Info
Hazard/Vulnerability Analysis
May include mitigation factor to further
refine Relative Weight
12
Basic Planning Tools Info
Hazard/Vulnerability Analysis w/Mitigation Factor
13
Basic Planning Tools Info
  • Facility Risk Assessment-Williams Library

14
Basic Planning Tools Info
  • Facility use information
  • Users?
  • Technology consider alternate securing methods
  • Hours of facility operation
  • Often academic buildings are operational 20 hours
    a day.
  • Policies/Procedures/Practices
  • Existing procedures
  • Campus standards
  • Key control

15
Basic Planning Tools Info
User Matrix Barnes Science Building
16
Establish Facility Access Goals
  • Used to promote senior leadership buy-in and
    support.
  • Others will understand basic concepts
  • Better to understand and disagree vs. Not
    knowing and not understanding.
  • Focuses budgetary expenditures
  • Prevents rush to purchase latest-greatest
  • Develops consistency for application of security
    hardware, policies, procedures and processes

17
Side bar - signage
18
Locking Hardware
  • Two Categories
  • Technology based Non-technology based
  • Non-technology based methods
  • Barriers e.g. turn-styles, etc.
  • Crime Prevention through Environmental Design
  • Controlling access through staff receptionists,
    security officers, etc.

19
Physical Security Methods
  • Locking hardware
  • Door locks
  • Key control policies and procedures
  • Various forms of devices available
  • Standard key-in-knob (KIK)
  • Mechanical Combination (MC)
  • Latch and bolt

20
Pros Cons- Mechanical locks
Low to high security applications.
21
Mechanical locks
  • Majority of educational facilities are secured
    using mechanical, stand-alone locks. Combination
    systems are equally prevalent.
  • Common Security failures related to mechanical
    locks are
  • Maintaining grand master-key system integrity
  • Transfer of access
  • Not locking doors

22
Discussion - Mechanical system considerations
  • Eliminate Grand Master Keying Concept
  • Every door has a unique key.
  • No One key fits more than one door.
  • No suite masters, building masters, etc.
  • Can it be done? How would you approach the
    concept?
  • Obstacles? Difficulties?

23
No Grand Master
  • Resident Advisory Group (Rag) involved early in
    the decision process, (prior to building
    construction)
  • Security concerns and needs explained. Facility
    access/security plan, goals and objectives were
    shared with Rag.
  • Custodial Required to check out floor keys
  • One Dean had 47 keys to access her areas of
    responsibility.

24
Technology Security Systems
  • Costs dropping for high-tech solutions.
  • Security options being incorporated in fire
    surveillance/alarm systems, HVAC or building
    control systems, camera systems
  • Provider several options not afforded by
    mechanical systems.

25
Technology Based Systems
  • Systems increasingly move toward integrating
    existing network infrastructure in to security
    based systems.
  • Advantages
  • Cost savings through use of existing
    infrastructure
  • Service support through existing personnel and/or
    vendors

26
Technology Based Systems
  • Disadvantages
  • Taxing existing infrastructure
  • Confusion of mission for IT
  • Create additional security breach opportunities,
    e.g. hacking, vendors, repair personnel, etc.
  • Difficult to maintain network security of
    existing systems equivalent to security needs
  • Coordination of services across multiple
    disciplines, e.g. IT to Physical Plant to Public
    Safety to campus department to card office.

27
Implementation of technology
  • Technology provides opportunities in several
    areas
  • Increased surveillance w/o staff costs increasing
  • Provide records of ingress
  • Provide reporting of security issues such as door
    propping, entry/exit of individuals.
  • Provide timed access to facilities
  • Technology creates unique challenges
  • Purchase and installation costs
  • Maintenance/upkeep costs
  • Repair times increased
  • Reliance on additional technologies increases
    security concerns
  • Staff training requirements for operations and
    upkeep

28
Card Access Systems
  • Card access increasingly popular, and advances
    in technology are beginning to reduce costs for
    purchase
  • Card access forms
  • Magnetic Stripe
  • Barium Ferrite
  • Bar Code
  • Wiegand antenna card
  • Proximity card
  • Smart card

29
(No Transcript)
30
Card accessOperational challenges
  • Tail-gating
  • Perceived security
  • Life safety concerns and resulting operations
  • Monitoring vs. surveillance
  • Added security concerns with use of computer
    technology. E.g. readers susceptible to hacking,
    card information, etc.

31
Technology based considerations
  • Ability to incorporate card access in to existing
    financial card systems?
  • Need to identify
  • Who has access to card system(s)?
  • Who has authority to control card?
  • What if financial use is no longer needed?
  • What if access control is changed but not ?
  • Situations to discuss among campus groups
  • What if a public safety officer needs to
    confiscate an access card that has financial use?

32
Shared Card Method
One Card
Security Control
Retail Services Control
33
Card Access - Considerations
  • Identify limitations in emergency situations
  • Loss of power mag locks open for life safety
    needs?
  • Loss of connectivity
  • Establish procedures for denying access,
    allowing access to emergency responders, etc.

34
Biometric Devices
  • Technologies becoming increasingly affordable for
    more common applications
  • Biometrics include
  • Voice
  • Finger geometry
  • Handwriting
  • Hand-print
  • Face geometry
  • Iris retinal scanning
  • Biometrics introduce individual verification to
    security access

35
Biometric Devices
  • Advantages
  • Identify individual versus a key, card or other
    device
  • Costs are coming down
  • Becoming more acceptable to consumer
  • Unique identifiers
  • Use to protect data, network log-ins, in addition
    to facility access.

36
Biometric Devices
  • Disadvantages
  • Not as reliable
  • Operation impacted by environment
  • e.g. lotion, temperature, dust, etc.
  • Often require secondary access method for
    verification
  • Increased reliance on third party vendors for
    support
  • Network infrastructure requirements

37
Biometric Advantages/disadvantages
38
Considerations when evaluating technology based
systems
  • Add complexity to facility access
  • Reliance on vendors maintenance costs
  • Competing campus systems may conflict
  • Multiple cards, mixed use cards, multiple locking
    methods
  • Increased training needs for staff
  • Prevent accidental security lapses
  • Ability to adequately utilize system services

39
Simple System COMPLICATED?
40
Future Trends - Concerns
  • Single Solution systems
  • One system to provide
  • HVAC controls, Life safety functions, door access
  • Advantages
  • One vendor, one call for concerns
  • No confusion on responsibilities
  • Challenges
  • Reliance on a sole vendor all eggs in one
    basket
  • Increased uses increased potential for failure
  • System access roles

41
Future Trends-Concerns
  • Multiple Platforms, one card system
  • Mag stripe cards
  • Use of multiple, separate systems with one card.
  • Advantages
  • Allows separation of key roles/responsibilities,
    reducing confusion, and/or turf wars.
  • Challenges
  • Clearly establishing base-line specifications
    early
  • Vendor resistance

42
Future Trends - Opportunities
  • Notification/User Interaction Systems
  • Available with several systems, capabilities
    continue to expand.
  • Tracking systems ability to track items or
    people.
  • Costs are quickly dropping as it becomes a
    software capability.
  • Continued push to reduce costs through security
    technology
  • Challenges are the reliance on technologies where
    decisions are required.

43
Discussion Specific Applications
  • Ability to lock classroom doors from inside?

44
Ability to lock classrooms from inside?
  • Unfortunately, the answer to this question will
    vary from institution to institution and
    potentially facility to facility.
  • Concerns w/classroom locking method
  • Costs
  • Potential for other crimes to be committed
  • Disruption of classes/operations if door is
    accidentally secured
  • Consider
  • Type of doors and locking systems in place
  • dead-bolt system accessibility, etc.

45
Lock Classrooms
  • Things to do
  • Study committee
  • Gather all data
  • Crime Reports
  • Interview w/campus mental health professionals
  • Virginia Tech after action review
  • Evaluate on a facility specific or program
    specific level

46
Shooter scenarios, how can building, facility
access reduce potential injuries?
  • Consider the security triangle when evaluating
    facility security issues.
  • People suspects from past incidents primarily
    have been members of the community
  • Processes allowed facility/security access was
    afforded to all suspects. Policies would not have
    prevented access.
  • Physical Security no preventative value.
    Protective value would have been increased
  • Concerns
  • Implementation of locking mechanisms may increase
    opportunities for other crimes

47
Shooter situations
  • Predominately have had levels of pre-planning.
  • Columbine video, purchases days weeks in
    advance of needed materials/supplies
  • Virginia Tech locking doors, video messages,
    preparation.

48
Discussion
  • Establishing facility access restrictions?
  • No faculty/staff/students from 1100 pm to
    600am. NO EXCEPTIONS

49
Establishing facility access restrictions?
  • Clearly identified time periods where
    faculty/staff are not authorized in a facility.
  • Concerns
  • Research faculty requiring access at varying
    times
  • Maintaining experiments during power outages
  • Tasks
  • Involve impacted faculty and staff
  • Identify needs based on facility
  • Accommodate where possible
  • Use information gathered for future
    construction/renovation projects

50
Camera technology
  • Camera technology has evolved dramatically over
    the past 10 years reducing costs for consumers.
  • Internet Protocol based cameras offer an
    inexpensive option that utilizes existing IT
    infrastructure.
  • Installation is becoming easier as equipment
    becomes more, Use and replace

51
Camera Surveillance Monitoring
  • Monitoring vs. Surveillance
  • Monitoring staff intensive to watch camera
    outputs
  • Surveillance images being recorded, often only
    events that trigger camera activity
  • Majority of camera installations, primary
    objective is not monitoring.
  • Primary uses for camera systems
  • Crime solving
  • Person identification
  • Perceived deterrent
  • Legal use as a record of events
  • Security/Police patrols are not reduced through
    deployment of cameras.

52
Camera use
  • Need to clearly establish intended use and
    expectations
  • Monitoring vs. surveillance
  • Identify expectation of privacy concerns
  • Camera systems are easily employed to replace
    locking mechanisms, staffing for entry points,
    but are a great supplement for recording of
    events.

53
Camera Systems
  • Camera systems are becoming user-friendly
    making operation and upkeep easier.
  • Consider using cameras in a support role for
    locking systems, staff support, and in
    high-security applications as supporting
    documentation.

54
Questions
55
Bruce HolmesChief of Police,Director of
Safety SecurityUniversity System of
Georgia404-656-2247404-831-2959
cellbruce.holmes_at_usg.edu
Write a Comment
User Comments (0)
About PowerShow.com