Vulnerability Assessment of Physical Protection Systems -  Mary Lynn Garcia

Vulnerability Assessment of Physical Protection Systems (eBook)

eBook Download: PDF
2005 | 1. Auflage
400 Seiten
Elsevier Science (Verlag)
978-0-08-048167-8 (ISBN)
Systemvoraussetzungen
50,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Vulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allow readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The book will address the full spectrum of a VA, including negotiating tasks with the customer, project management and planning of the VA, team membership, step-by-step details for performing the VA, data collection and analysis, important notes on how to use the VA to suggest design improvements and generate multiple design options. The text will end with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools will be introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact.

- Guides the reader through the topic of physical security doing so with a unique, detailed and scientific approach
- Takes the reader from beginning to end and step-by-step through a Vulnerability Assessment
- Over 150 figures and tables to illustrate key concepts
Vulnerability Assessment of Physical Protection Systems guides the reader through the topic of physical security with a unique, detailed and scientific approach. The book describes the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. It draws heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allows readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The text covers the full spectrum of a VA, including negotiating tasks with the customer; project management and planning of the VA; team membership; and step-by-step details for performing the VA, data collection and analysis. It also provides important notes on how to use the VA to suggest design improvements and generate multiple design options. The text ends with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools are introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact. This book will be of interest to physical security professionals, security managers, security students and professionals, and government officials. Guides the reader through the topic of physical security doing so with a unique, detailed and scientific approach Takes the reader from beginning to end and step-by-step through a Vulnerability Assessment Over 150 figures and tables to illustrate key concepts

Front Cover 1
Title Page 4
Copyright Page 5
Table of Contents 8
Preface 16
CHAPTER 1 Introduction to Vulnerability Assessment 18
Risk Management and Vulnerability Assessment 19
Risk Assessment and the Vulnerability Assessment Process 21
Statistics and Quantitative Analysis 23
Vulnerability Assessment Process Overview 25
Planning the Vulnerability Assessment 27
Project Management 27
Establish the Vulnerability Assessment Team 28
Project Kick-Off Meetings 28
Protection Objectives 29
Facility Characterization 30
Data Collection„Detection 30
Intrusion Sensors 31
Alarm Assessment 32
Entry Control 33
Alarm Communication and Display 34
Data Collection„Delay 35
Data Collection„Response 37
Analysis 39
Reporting and Using the Vulnerability Assessment 40
Systems Engineering and Vulnerability Assessment 41
System Requirements 44
System Design and Analysis 46
System Installation and Test 48
System Replacement 48
Summary 49
References 49
CHAPTER 2 Physical Protection Systems Principles and Concepts 50
Physical Protection Systems Overview 50
Physical Protection System Design 51
PPS Functions 52
Detection 52
Delay 54
Response 54
Relationship of PPS Functions 55
Characteristics of an Effective PPS 56
Protection-in-Depth 57
Minimum Consequence of Component Failure 57
Balanced Protection 57
Design and Evaluation Criteria 58
Additional Design Elements 59
Summary 60
Reference 61
CHAPTER 3 Getting Started 62
Project Management 62
Phase One„Project Planning 63
Initial Customer Contact 63
Define the Project 64
Phase Two„Managing the Project 66
Project Status and Reporting 67
Recovery Plans 70
Project Management Tools 71
Project Closeout 71
Project Management Summary 71
Establish a Vulnerability Assessment Team 72
Vulnerability Assessment Project Leader 72
Systems Engineer 72
Security System Engineer 73
SME„Intrusion Sensing Subsystem 73
SME„Alarm Assessment Subsystem 74
SME„Alarm Communication & Display (AC&
SME„Entry Control Subsystem 75
SME„Delay Subsystem 75
SME„Response Subsystem 75
SME„Communications Subsystem 76
SME„Analyst 76
Special Note for Response Force Simulations 77
Participation of On-Site Personnel 77
Kick-Off Meetings for Project Team and Customer 78
Project Team Kick-Off Meeting 78
VA Team Guide 78
Site Information 79
Customer Kick-Off Meeting 80
Summary 81
References 81
CHAPTER 4 VA Process Inputs - Establish Protection Objectives 82
Defining the Threat 82
Listing Information Needed 83
Collecting Information 83
Organizing Information 84
Threat Definition Methods 84
Insider Threat 85
Other Notes on Threat Definition 87
Estimating Likelihood of Attack 88
Asset Identification 89
Asset Identification Methods 89
Manual Listing 90
Logic Diagrams 90
Criteria 92
Threat/Asset Matrix 92
Facility Characterization 94
Characterization Tools 95
Facility States 96
Security Checklists 97
Summary 97
References 97
CHAPTER 5 Data Collection - Intrusion Detection Subsystem 100
Sensor Overview 101
Exterior Intrusion Sensor Technologies and Evaluation 102
Freestanding Sensors 103
Exterior Microwave Sensors 103
Electric-field Sensors 106
Freestanding Sensors Summary 109
Buried-Line Sensors 109
Ported Coaxial Sensors 110
Buried-Line Sensors Summary 112
Fence-Associated Sensors 112
Taut Wire Sensors 113
Fiber Optic Sensors 115
Fence-Associated Sensors Summary 117
Other Exterior Intrusion Sensing Technologies 117
General Exterior Intrusion Sensing Evaluation 117
Summary of Exterior Intrusion Sensing 121
Interior Intrusion Sensor Technologies and Evaluation 121
Boundary Penetration Sensors 122
Magnetic Switches 122
Glass-Break Sensors 125
Boundary Penetration Sensors Summary 126
Volumetric Sensing Technologies 126
Microwave Sensors 126
Passive Infrared Sensors 128
Video Motion Detection Sensors 129
Volumetric Sensors Summary 131
Proximity Sensing Technologies 132
Pressure Sensors 132
Proximity Sensors Summary 133
Other Technologies 133
General Interior Intrusion Sensing Evaluation 133
Summary of Interior Sensing Technologies 135
Intrusion Sensing by Humans 135
Estimating Intrusion Sensing Performance 135
Summary 138
Reference 139
CHAPTER 6 Data Collection - Alarm Assessment Subsystem 140
Alarm Assessment Overview 140
Assessment versus Surveillance 141
Video Assessment Performance Factors 142
Evaluation Testing 143
Video Assessment Subsystem 145
Video Subsystem Equipment 146
Cameras and Lenses 146
Camera Housings 150
Camera Mounting 150
Lighting 153
Signal Transmission 155
Video Recording and Storage 157
Monitors 159
Other Equipment 161
Procedures 163
Estimating Performance 165
Summary 166
References 167
CHAPTER 7 Data Collection - Entry Control Subsystem 168
Entry Control Subsystem Overview 169
Personnel Control 172
Tokens 173
Coded Credentials 173
Private Information 175
Badge Control Equipment Components and Functions 176
Biometrics 177
Locks 178
Material Control 178
Personnel Metal Detection 179
Trace Detection Systems 182
Package Material Control 182
Evaluation Criteria for Contraband Detection 184
Asset Tracking 185
Vehicle Control 185
Subsystem Integration Issues 187
Entry Control Subsystem Components 188
General Evaluation Criteria 190
Access Controls 193
Operator Training 194
Estimating Performance 194
Summary 195
Reference 196
CHAPTER 8 Data Collection - Alarm Communication and Display Subsystem 198
Alarm Communication and Display Overview 199
Communication 201
High-Level Communications 202
Low-Level Communications 202
Information Handling 203
Control and Display 204
Offline Systems 210
Evaluation Techniques 211
Operator Workload 213
Displays 214
Video System Integration 215
Network Issues 215
Other Evaluation Aspects 216
Estimating Performance 216
Summary 218
Reference 218
CHAPTER 9 Data Collection - Delay Subsystem 220
Delay Overview 220
Perimeter Barriers 223
Fences 223
Gates 225
Chain-link Gates 225
Turnstiles 226
Vehicle Barriers 227
Buildings 231
Walls 231
Floors and Roofs 232
Doors 233
Personnel Doors 234
Attack- and Bullet-Resistant Doors 236
Vehicle Doors 237
Vault Doors 237
Windows, Grilles, and Utility Ports 239
Windows 239
Grilles and Utility Ports 241
Windows, Grilles, and Utility Ports Summary 242
Other Barriers 242
Armor 242
Vaults 244
Earth and Overburden 245
Underground Facilities 245
Airborne-Attack Barriers 246
Waterborne-Attack Barriers 247
Tie-downs and Restraints 247
Nonlethal Weapons 248
Dispensable Materials and Deployable Barriers 249
General Delay Subsystem Evaluation Factors 250
Estimating Performance 251
Summary 251
Reference 252
CHAPTER 10 Data Collection - Response Subsystem 254
Response Overview 254
Response Strategies 256
Deterrence 256
Denial 257
Containment 257
Recovery 258
Delayed Response 258
Equipment 259
Procedures 259
People 260
Immediate Response 260
General Warning Alarms 261
Observe-and-Report 261
Dispatch of Unarmed Security Personnel 262
Dispatch of Armed Security Personnel 263
Response Communications 263
Radio Communication System 264
Radio Maintenance 266
Operational Issues 267
Estimating Performance 267
Summary 270
References 270
CHAPTER 11 Analysis 272
Analysis Overview 273
Analysis Tools 275
Analysis Process 276
Adversary Sequence Diagrams and Path Analysis 276
Scenario Analysis 278
Estimate Neutralization 282
Other Analysis 282
Calculate System Effectiveness 283
Upgrade Analysis 283
Qualitative Analysis 284
Facility Overview 284
Path Analysis 290
Scenario Analysis 291
Upgrade Analysis 293
Quantitative Analysis 294
Facility Description 295
Path Analysis 299
Scenario Analysis 303
Estimate Neutralization 305
Baseline System Effectiveness 306
Upgrade Analysis 306
Summary 310
CHAPTER 12 Reporting and Using Results 312
Overview 312
Reporting Results 313
Briefings 314
Report Content and Format 314
Protecting Results 322
Reporting Summary 322
Using the Vulnerability Assessment 323
Design Stages 323
Project Closeout 325
Summary 325
APPENDIX A Project Management Forms and Templates 326
APPENDIX B Initial Briefing Template 328
APPENDIX C Threat and Facility Worksheets 336
APPENDIX D Data Collection Sheets 344
APPENDIX E Alarm Communication and Display Subsystem Criteria 360
APPENDIX F Representative Delays 368
APPENDIX G Results Briefing Template 380
Index 390

Erscheint lt. Verlag 8.12.2005
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Recht / Steuern Strafrecht Kriminologie
Sozialwissenschaften
Technik Bauwesen
Technik Elektrotechnik / Energietechnik
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
ISBN-10 0-08-048167-1 / 0080481671
ISBN-13 978-0-08-048167-8 / 9780080481678
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Adobe DRM)
Größe: 5,0 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Eine Grundlegung

von Tobias Singelnstein; Karl-Ludwig Kunz

eBook Download (2021)
utb. (Verlag)
26,99