SlideShare a Scribd company logo
Physical Security Primer 
Dr. Eric Vanderburg 
Director, Information Systems and Security 
JURINNOV LTD
Objectives 
• Explain physical security strategies 
• Describe physical security controls 
• Understand the role of physical security
3 
4 Key Strategies 
1. Territoriality 
2. Natural Surveillance 
3. Activity Support 
4. Access Control
4 
Territoriality 
Most people tend to protect area that 
they feel is their own, and have a 
certain amount of respect for 
other’s. Fences, pavement 
treatments, signs and landscaping all 
help to express ownership.
5 
Natural Surveillance 
• This is almost entirely based off of the fact that 
criminals do not want to be seen. 
• Place physical activities, features and people in a 
way that they can be observed 
• Remove trees, sheds, bushes and other sight 
obstructions
6 
Access Control 
• Properly located entrances/exits 
• Fencing 
• Lighting 
• Receptionist at a front desk 
• A neighbor sitting on their front porch
7 
An Overview of Physical Controls 
Concentric Zone Theory – based on the premise 
that the more valuable an asset is, the more 
protection it needs 
3 Basic Lines of Physical Defense: 
1. The perimeter of the facility 
2. The building exterior 
3. The interior
8 
Locks 
• Key, key card or smart card 
operated 
• Remains one of the oldest, 
most commonly used 
methods of access control
Biometrics 
The science of using individual 
physiological features or behavioral 
characteristics to positively identify 
a person 
9 
Examples: fingerprint, iris/retinal 
scans, hand geometry, voice, et al.
Lighting 
• Intruders want darkness to cover their actions 
• 3 out of 4 commercial burglaries are committed within 
buildings with little or no light 
• Types: 
10 
1. Continuous 
2. Standby 
3. Moveable 
4. Emergency
11 
Lighting 
• Perimeter Lighting 
• Floodlights 
• Street lights 
• Fresnal units 
• Searchlights
12 
Alarm uses 
• Burglar 
• Fire 
• Temperature 
• Humidity 
•Water flow 
• Electrical power
13 
Alarm system types 
Local – sound on the premises only 
• Proprietary – a constantly-manned alarm 
panel operated by the owner 
• Central Station – similar to proprietary, 
except usually operated off premises by an 
alarm company 
• Police Connected – the alarm is directed via 
phone lines to the nearest police dept.
14 
Alarms – False Alarms 
• More than 90% of all intrusion alarms are false 
alarms, resulting in needless expense and risks 
on the part of responders. 
• Because of the high number of false alarms, 
many cities prohibit alarms connected directly 
to the police department.
15 
Closed Circuit Television (CCTV) 
• A generic term, generally meaning a system in 
which a number of video cameras are 
connected in a closed circuit or loop, where the 
images are sent to a central television monitor 
or recorded. 
• CCTV systems range from basic system to very 
complicated networks.
16 
Closed Circuit Television (CCTV) 
Cameras may be overt or covert, or semi-covert. 
• Overt – out in the open 
• Covert – hidden 
• Semi- Covert – cameras are in public view 
but behind a one-way transparent covering.
17 
CCTV other technology 
• Internet Protocol Video (IP) 
• Video can be sent across a company’s data network 
so that it can be viewed wherever the company 
chooses. 
• These can cause bandwidth and digital storage 
issues for a company’s network. 
• Thermal Imaging – operates on the principle that all 
objects emit infrared energy that can be seen using a 
thermal imager 
• Night Cameras – most popular kind use image 
intensification that amplifies available visible and near-infrared 
light to achieve better vision
Privacy concerns… 
• There is concern over the amount of, or rather lack 
of, privacy by private, non-criminal citizens 
through the extensive use of surveillance 
methods. 
• Some cities are passing legislation to govern these 
types of devices and their use. 
18
19 
The Perimeter 
• Fences – 2 basic types 
• Ornamental 
• Chain Link – 
effectiveness can be 
increased by adding 
razor wire, barbed wire, 
etc.
20 
The Perimeter 
• Surveillance Cameras 
• Vehicle Barriers 
• Active – require some action by a person 
or equipment to be raised into place 
• Passive – a fixed device with no moving 
parts, such as guard rails, concrete poles, 
etc.
21 
The Perimeter 
• Patrols 
• Security Officers 
• Patrol or Guard Dog units – roam 
alone inside a perimeter or building 
to deter intruders
22 
The Perimeter 
• Signs 
• Physical Layout 
When possible, we should always try to 
maintain a clear zone of 20 feet on either 
side of the perimeter
23 
Building Exterior controls 
• For some facilities, the exterior is the first line of 
defense. 
• Panic or Crash Bars 
A device located on the inside of a door only. It 
allows the door to opened in case of a fire, but 
has no hardware on the outside that can be used 
to open the door.
24 
The Building Exterior 
• Keys for effective security: 
• Strong, locked doors 
• Limited number of entrances 
• Secured openings (>96 sq. inches) 
• Alarms 
• Surveillance 
• Lighting
The Building Interior 
• Internal physical controls are usually required 
along with external controls. 
• Secure areas should be separated from non-secure 
areas if possible. 
25
The Building Interior - Safeguards: 
• Locks 
• Alarms 
• Mirrors 
• Document 
shredders 
• Vaults/ safes 
• Bolt down large, 
moveable 
equipment 
• Lock down devices 
on office equipment 
• Surveillance systems 
26
27 
The Command Center 
• Should be linked to the security control 
center 
• Should be in a tightly controlled area 
• Can also monitor access 
• Increasingly, staff members of the command 
center can also handle computer network 
issues if need be.
28 
The Physical Security System 
• The goal is to provide the amount of security 
needed - neither too much nor too little. 
• This is a balancing act between aesthetic, 
operational, safety and security needs.
The Physical Security System 
• Physical Security Users: a group comprised of the 
people who own the property being protected, 
the people who work at or visit the facility, and the 
security forces themselves. 
• Physical security footprint – the mark left during or 
after a security action that the public sees and lets 
them know security is present. 
29
For assistance or additional information 
• Phone: 216-664-1100 
• Web: www.jurinnov.com 
• Email: Eric.Vanderburg@jurinnov.com 
JurInnov Ltd. 
The Idea Center 
1375 Euclid Avenue, Suite 400 
Cleveland, Ohio 44115

More Related Content

PDF
Physical Security Presentation
PPTX
Physical security
ODP
Jupiter physical security ppt 2016 1
PPT
Video surveillance
PPTX
Piggy Backing & Tailgating (Security)
PDF
OTechs Information Security Training Course
PPT
PDF
Lect 07 computer security and privacy 1 4 q
Physical Security Presentation
Physical security
Jupiter physical security ppt 2016 1
Video surveillance
Piggy Backing & Tailgating (Security)
OTechs Information Security Training Course
Lect 07 computer security and privacy 1 4 q

Viewers also liked (20)

PDF
The Journal of Physical Security 9(2)
PPTX
Cloud Storage and Security: Solving Compliance Challenges
PPTX
Correct the most common web development security mistakes - Eric Vanderburg
PPTX
Untangled Conference - November 8, 2014 - Security Awareness
PPTX
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
PPTX
Countering malware threats - Eric Vanderburg
PPTX
Hacktivism: Motivations, Tactics and Threats
PPTX
Computer Security Primer - Eric Vanderburg - JURINNOV
PPTX
A Guide to Secure Remote Access - Eric Vanderburg
PPTX
Server Hardening Primer - Eric Vanderburg - JURINNOV
PPTX
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
PPTX
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
PPTX
Security Governance Primer - Eric Vanderburg - JURINNOV
PPTX
Ransomware: 2016's Greatest Malware Threat
PPT
Physical security
PDF
Marpol Annex VI Chapter IV- GHG Emissions and Energy Efficiency Regulations
PDF
Maritime Security and Security Responsibilities
PPT
Security training module
PPTX
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
PPSX
6 Physical Security
The Journal of Physical Security 9(2)
Cloud Storage and Security: Solving Compliance Challenges
Correct the most common web development security mistakes - Eric Vanderburg
Untangled Conference - November 8, 2014 - Security Awareness
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Countering malware threats - Eric Vanderburg
Hacktivism: Motivations, Tactics and Threats
Computer Security Primer - Eric Vanderburg - JURINNOV
A Guide to Secure Remote Access - Eric Vanderburg
Server Hardening Primer - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Security Governance Primer - Eric Vanderburg - JURINNOV
Ransomware: 2016's Greatest Malware Threat
Physical security
Marpol Annex VI Chapter IV- GHG Emissions and Energy Efficiency Regulations
Maritime Security and Security Responsibilities
Security training module
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
6 Physical Security
Ad

Similar to Physical security primer - JURINNOV - Eric Vanderburg (20)

PPTX
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PPTX
Security measures
PPTX
CISSP - Chapter 3 - Physical security
PPTX
PPTX
CISSP week 26
DOCX
Physical security.docx
PPTX
Introduction to Security
PPT
physicalsecurity for security officers training
DOCX
Protection Report Final Copy
PPTX
Electronic security system
PPT
Chapter008
PPTX
Physical access control
PPT
Physical security how to secure physically
PPTX
it physical security for good educati.pptx
PPT
450052029-INDUSTRIAL-SECURITY-MANAGEMENT-ppt.ppt
PPTX
Physical Security
PDF
Whitepaper perimeter protection
PPT
Physical Security
DOCX
To design low
PPT
7. physical sec
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
Security measures
CISSP - Chapter 3 - Physical security
CISSP week 26
Physical security.docx
Introduction to Security
physicalsecurity for security officers training
Protection Report Final Copy
Electronic security system
Chapter008
Physical access control
Physical security how to secure physically
it physical security for good educati.pptx
450052029-INDUSTRIAL-SECURITY-MANAGEMENT-ppt.ppt
Physical Security
Whitepaper perimeter protection
Physical Security
To design low
7. physical sec
Ad

More from Eric Vanderburg (16)

PPTX
GDPR, Data Privacy and Cybersecurity - MIT Symposium
PPTX
Modern Security the way Equifax Should Have
PPTX
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
PPTX
Mobile Forensics and Cybersecurity
PPT
Emerging Technologies: Japan’s Position
PPT
Principles of technology management
PPT
Japanese railway technology
PPT
Evaluating japanese technological competitiveness
PPT
Japanese current and future technology management challenges
PPT
Technology management in Japan: Robotics
PPT
Incident response table top exercises
PPTX
Deconstructing website attacks - Eric Vanderburg
PPTX
The security professional's guide to programming - Eric Vanderburg
PPTX
Guide to protecting networks - Eric Vanderburg
PPTX
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Modern Security the way Equifax Should Have
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Forensics and Cybersecurity
Emerging Technologies: Japan’s Position
Principles of technology management
Japanese railway technology
Evaluating japanese technological competitiveness
Japanese current and future technology management challenges
Technology management in Japan: Robotics
Incident response table top exercises
Deconstructing website attacks - Eric Vanderburg
The security professional's guide to programming - Eric Vanderburg
Guide to protecting networks - Eric Vanderburg
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Understanding_Digital_Forensics_Presentation.pptx
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Per capita expenditure prediction using model stacking based on satellite ima...
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction

Physical security primer - JURINNOV - Eric Vanderburg

  • 1. Physical Security Primer Dr. Eric Vanderburg Director, Information Systems and Security JURINNOV LTD
  • 2. Objectives • Explain physical security strategies • Describe physical security controls • Understand the role of physical security
  • 3. 3 4 Key Strategies 1. Territoriality 2. Natural Surveillance 3. Activity Support 4. Access Control
  • 4. 4 Territoriality Most people tend to protect area that they feel is their own, and have a certain amount of respect for other’s. Fences, pavement treatments, signs and landscaping all help to express ownership.
  • 5. 5 Natural Surveillance • This is almost entirely based off of the fact that criminals do not want to be seen. • Place physical activities, features and people in a way that they can be observed • Remove trees, sheds, bushes and other sight obstructions
  • 6. 6 Access Control • Properly located entrances/exits • Fencing • Lighting • Receptionist at a front desk • A neighbor sitting on their front porch
  • 7. 7 An Overview of Physical Controls Concentric Zone Theory – based on the premise that the more valuable an asset is, the more protection it needs 3 Basic Lines of Physical Defense: 1. The perimeter of the facility 2. The building exterior 3. The interior
  • 8. 8 Locks • Key, key card or smart card operated • Remains one of the oldest, most commonly used methods of access control
  • 9. Biometrics The science of using individual physiological features or behavioral characteristics to positively identify a person 9 Examples: fingerprint, iris/retinal scans, hand geometry, voice, et al.
  • 10. Lighting • Intruders want darkness to cover their actions • 3 out of 4 commercial burglaries are committed within buildings with little or no light • Types: 10 1. Continuous 2. Standby 3. Moveable 4. Emergency
  • 11. 11 Lighting • Perimeter Lighting • Floodlights • Street lights • Fresnal units • Searchlights
  • 12. 12 Alarm uses • Burglar • Fire • Temperature • Humidity •Water flow • Electrical power
  • 13. 13 Alarm system types Local – sound on the premises only • Proprietary – a constantly-manned alarm panel operated by the owner • Central Station – similar to proprietary, except usually operated off premises by an alarm company • Police Connected – the alarm is directed via phone lines to the nearest police dept.
  • 14. 14 Alarms – False Alarms • More than 90% of all intrusion alarms are false alarms, resulting in needless expense and risks on the part of responders. • Because of the high number of false alarms, many cities prohibit alarms connected directly to the police department.
  • 15. 15 Closed Circuit Television (CCTV) • A generic term, generally meaning a system in which a number of video cameras are connected in a closed circuit or loop, where the images are sent to a central television monitor or recorded. • CCTV systems range from basic system to very complicated networks.
  • 16. 16 Closed Circuit Television (CCTV) Cameras may be overt or covert, or semi-covert. • Overt – out in the open • Covert – hidden • Semi- Covert – cameras are in public view but behind a one-way transparent covering.
  • 17. 17 CCTV other technology • Internet Protocol Video (IP) • Video can be sent across a company’s data network so that it can be viewed wherever the company chooses. • These can cause bandwidth and digital storage issues for a company’s network. • Thermal Imaging – operates on the principle that all objects emit infrared energy that can be seen using a thermal imager • Night Cameras – most popular kind use image intensification that amplifies available visible and near-infrared light to achieve better vision
  • 18. Privacy concerns… • There is concern over the amount of, or rather lack of, privacy by private, non-criminal citizens through the extensive use of surveillance methods. • Some cities are passing legislation to govern these types of devices and their use. 18
  • 19. 19 The Perimeter • Fences – 2 basic types • Ornamental • Chain Link – effectiveness can be increased by adding razor wire, barbed wire, etc.
  • 20. 20 The Perimeter • Surveillance Cameras • Vehicle Barriers • Active – require some action by a person or equipment to be raised into place • Passive – a fixed device with no moving parts, such as guard rails, concrete poles, etc.
  • 21. 21 The Perimeter • Patrols • Security Officers • Patrol or Guard Dog units – roam alone inside a perimeter or building to deter intruders
  • 22. 22 The Perimeter • Signs • Physical Layout When possible, we should always try to maintain a clear zone of 20 feet on either side of the perimeter
  • 23. 23 Building Exterior controls • For some facilities, the exterior is the first line of defense. • Panic or Crash Bars A device located on the inside of a door only. It allows the door to opened in case of a fire, but has no hardware on the outside that can be used to open the door.
  • 24. 24 The Building Exterior • Keys for effective security: • Strong, locked doors • Limited number of entrances • Secured openings (>96 sq. inches) • Alarms • Surveillance • Lighting
  • 25. The Building Interior • Internal physical controls are usually required along with external controls. • Secure areas should be separated from non-secure areas if possible. 25
  • 26. The Building Interior - Safeguards: • Locks • Alarms • Mirrors • Document shredders • Vaults/ safes • Bolt down large, moveable equipment • Lock down devices on office equipment • Surveillance systems 26
  • 27. 27 The Command Center • Should be linked to the security control center • Should be in a tightly controlled area • Can also monitor access • Increasingly, staff members of the command center can also handle computer network issues if need be.
  • 28. 28 The Physical Security System • The goal is to provide the amount of security needed - neither too much nor too little. • This is a balancing act between aesthetic, operational, safety and security needs.
  • 29. The Physical Security System • Physical Security Users: a group comprised of the people who own the property being protected, the people who work at or visit the facility, and the security forces themselves. • Physical security footprint – the mark left during or after a security action that the public sees and lets them know security is present. 29
  • 30. For assistance or additional information • Phone: 216-664-1100 • Web: www.jurinnov.com • Email: Eric.Vanderburg@jurinnov.com JurInnov Ltd. The Idea Center 1375 Euclid Avenue, Suite 400 Cleveland, Ohio 44115