You are previewing Design and Evaluation of Physical Protection Systems, 2nd Edition.
O'Reilly logo
Design and Evaluation of Physical Protection Systems, 2nd Edition

Book Description

Design and Evaluation of Physical Security Systems, 2e, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.

* New chapter on transportation systems
* Extensively updated chapter on threat definition
* Major changes to response chapter

Table of Contents

  1. Cover Image
  2. Content
  3. Title
  4. Copyright
  5. Dedication
  6. Preface
  7. 1. Design and Evaluation of Physical Protection Systems
    1. Safety Versus Security
    2. Deterrence
    3. Process Overview
    4. Physical Protection System Design
    5. PPS Functions
    6. Design Goals
    7. Design Criteria
    8. Analysis
    9. Physical Protection System Design and the Relationship to Risk
    10. Summary
    11. Questions
  8. PART ONE. DETERMINING SYSTEM OBJECTIVES
    1. 2. Facility Characterization
      1. Physical Conditions
      2. Facility Operations
      3. Facility Policies and Procedures
      4. Regulatory Requirements
      5. Safety Considerations
      6. Legal Issues
      7. Corporate Goals and Objectives
      8. Other Information
      9. Summary
      10. Security Principle
      11. Questions
    2. 3. Threat Definition
      1. Steps for Threat Definition
      2. List Threat Information
      3. Collect Threat Information
      4. Organize Threat Information
      5. Sample Threat Statements
      6. Summary
      7. Security Principle
      8. Questions
    3. 4. Target Identification
      1. Undesirable Consequences
      2. Consequence Analysis
      3. Targets
      4. Techniques for Target Identification
      5. Vital Area Identification
      6. Summary
      7. Security Principle
      8. Questions
  9. PART TWO. DESIGN PHYSICAL PROTECTION SYSTEM
    1. 5. Physical Protection System Design
      1. Physical Protection System Design
      2. PPS Functions
      3. Relationship of PPS Functions
      4. Characteristics of an Effective PPS
      5. Design Criteria
      6. Additional Design Elements
      7. Summary
      8. Security Principles
      9. Questions
    2. 6. Exterior Intrusion Sensors
      1. Performance Characteristics
      2. Sensor Classification
      3. Sensor Technology
      4. Maturity Model for Security Technologies
      5. Perimeter Sensor Systems—Design Concepts and Goals
      6. Effects of Physical and Environmental Conditions
      7. Integration with Video Assessment System
      8. Integration with Barrier Delay System
      9. Exterior Sensor Subsystem Characteristics
      10. Procedures
      11. Summary
      12. Security Principles
      13. Questions
    3. 7. Interior Intrusion Sensors
      1. Performance Characteristics
      2. Sensor Classification
      3. Sensor Technology
      4. Effects of Environmental Conditions
      5. Sensor Selection
      6. Procedures
      7. System Integration
      8. Summary
      9. Security Principles
      10. Questions
    4. 8. Alarm Assessment
      1. Assessment Versus Surveillance
      2. Video Alarm Assessment System
      3. Alarm Assessment by Response Force
      4. Integration with Safety Systems
      5. Legal Issues
      6. Camera Selection Procedures
      7. Acceptance Testing
      8. Summary
      9. Security Principles
      10. Questions
    5. 9. Alarm Communication and Display
      1. Evolution of Alarm Reporting Systems
      2. AC&D Attributes
      3. Alarm Communication Subsystem
      4. Alarm Control and Display
      5. AC&D System Design
      6. Summary
      7. Security Principles
      8. Questions
    6. 10. Entry Control
      1. Personnel Entry Control
      2. Contraband Detection
      3. Locks
      4. System Integration and Installation Issues
      5. Procedures
      6. Administrative Procedures
      7. Summary
      8. Security Principles
      9. Questions
    7. 11. Access Delay
      1. Barrier Types and Principles
      2. System Considerations
      3. Aspects of Penetration
      4. Perimeter Barriers
      5. Structural Barriers
      6. Dispensable Barriers
      7. Procedures
      8. Summary
      9. Security Principles
      10. Questions
    8. 12. Response
      1. General Considerations
      2. Response Force Performance Measures
      3. Contingency Planning
      4. Communication
      5. Interruption
      6. Neutralization
      7. Procedures
      8. Summary
      9. Security Principles
      10. Questions
  10. PART THREE. ANALYSIS AND EVALUATION
    1. 13. Analysis and Evaluation
      1. Adversary Paths
      2. Effectiveness Measures
      3. Quantitative Analysis
      4. Critical Path
      5. Qualitative Analysis
      6. Summary
      7. Security Principles
      8. Questions
    2. 14. EASI Computer Model for Analysis
      1. Quantitative Analysis Tools
      2. EASI Model
      3. Using the Model
      4. Adversary Sequence Diagrams
      5. Summary
      6. Security Principle
      7. Questions
    3. 15. Risk Assessment
      1. Risk Management Approaches
      2. Risk Equation
      3. Vulnerability Assessment Process
      4. Risk Assessment
      5. Performance Testing
      6. Summary
      7. Security Principle
      8. Questions
    4. 16. Process Applications
      1. Executive Protection
      2. Determine Protection Objectives—Facility Characterization, Threat Definition, and Asset Identification
      3. Ground Transportation
      4. Cyber Systems (Computers and Networks)
      5. Summary
  11. APPENDIX A. Threat Tables
  12. APPENDIX B. Network Site Survey
  13. APPENDIX C. EASI Model
  14. Glossary
  15. Index