Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). [1] Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.
Physical security systems for protected facilities can be intended to: [2] [3] [4]
It is up to security designers, architects and analysts to balance security controls against risks, taking into account the costs of specifying, developing, testing, implementing, using, managing, monitoring and maintaining the controls, along with broader issues such as aesthetics, human rights, health and safety, and societal norms or conventions. Physical access security measures that are appropriate for a high security prison or a military site may be inappropriate in an office, a home or a vehicle, although the principles are similar.
The goal of deterrence methods is to convince potential attackers that a successful attack is unlikely due to strong defenses.
The initial layer of security for a campus, building, office, or other physical space can use crime prevention through environmental design to deter threats. Some of the most common examples are also the most basic: warning signs or window stickers, fences, vehicle barriers, vehicle height-restrictors, restricted access points, security lighting and trenches. [5] [6] [7] [8]
For example, tall fencing, topped with barbed wire, razor wire or metal spikes are often emplaced on the perimeter of a property, generally with some type of signage that warns people not to attempt entry. However, in some facilities imposing perimeter walls or fencing will not be possible (e.g. an urban office building that is directly adjacent to public sidewalks) or it may be aesthetically unacceptable (e.g. surrounding a shopping center with tall fences topped with razor wire); in this case, the outer security perimeter will be generally defined as the walls, windows and doors of the structure itself. [9]
Security lighting is another effective form of deterrence. Intruders are less likely to enter well-lit areas for fear of being seen. Doors, gates, and other entrances, in particular, should be well lit to allow close observation of people entering and exiting. When lighting the grounds of a facility, widely distributed low-intensity lighting is generally superior to small patches of high-intensity lighting, because the latter can have a tendency to create blind spots for security personnel and CCTV cameras. It is important to place lighting in a manner that makes it difficult to tamper with (e.g. suspending lights from tall poles), and to ensure that there is a backup power supply so that security lights will not go out if the electricity is cut off. [10] The introduction of low-voltage LED-based lighting products has enabled new security capabilities, such as instant-on or strobing, while substantially reducing electrical consumption. [11]
For nuclear power plants in the United States (U.S.), per the U.S. Nuclear Regulatory Commission (NRC), 10 CFR Part 73, [security] lighting is mentioned four times. The most notable mentioning contained in 10 CFR 73.55(i)(6) Illumination, which clearly identifies that licensees "-shall provide a minimum illumination level of 0.2 foot-candles, measured horizontally at ground level, in the isolation zones and appropriate exterior areas within the protected area-". [Ref] This is also the minimum illumination level specified in Table H–2 Minimum Night Firing Criteria of 10 CFR 73 Appendix H, for night firing. Per 10 CFR 73.46(b)(7) "-Tactical Response Team members, armed response personnel, and guards shall qualify and requalify, at least every 12 months, for day and nightfiring with assigned weapons in accordance with Appendix H-"; therefore on said respective shooting range [at night] per Appendix H, Table H-2, "-all courses [shall have] 0.2 foot-candles at center mass of target area-" applicable to handguns, shotguns, and rifles. [Ref] 1 foot-candle is approximately 10.76 lux, therefore the minimum illumination requirements for the above sections also reflect 2.152 lux .
Security alarms can be installed to alert security personnel when unauthorized access is attempted. Alarm systems work in tandem with physical barriers, mechanical systems, and security guards, serving to trigger a response when these other forms of security have been breached. They consist of sensors including perimeter sensors, motion sensors, contact sensors, and glass break detectors. [12]
However, alarms are only useful if there is a prompt response when they are triggered. In the reconnaissance phase prior to an actual attack, some intruders will test the response time of security personnel to a deliberately tripped alarm system. By measuring the length of time it takes for a security team to arrive (if they arrive at all), the attacker can determine if an attack could succeed before authorities arrive to neutralize the threat. Loud audible alarms can also act as a psychological deterrent, by notifying intruders that their presence has been detected. [13]
In some U.S. jurisdictions, law enforcement will not respond to alarms from intrusion detection systems unless the activation has been verified by an eyewitness or video. [14] Policies like this one have been created to combat the 94–99 percent rate of false alarm activation in the United States. [15]
Surveillance cameras can be a deterrent [16] when placed in highly visible locations and are useful for incident assessment and historical analysis. For example, if alarms are being generated and there is a camera in place, security personnel assess the situation via the camera feed. In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed. Although the term closed-circuit television (CCTV) is common, it is quickly becoming outdated as more video systems lose the closed circuit for signal transmission and are instead transmitting on IP camera networks.
Video monitoring does not necessarily guarantee a human response. A human must be monitoring the situation in real time in order to respond in a timely manner; otherwise, video monitoring is simply a means to gather evidence for later analysis. However, technological advances like video analytics are reducing the amount of work required for video monitoring as security personnel can be automatically notified of potential security events. [17] [18] [19]
Access control methods are used to monitor and control traffic through specific access points and areas of the secure facility. This is done using a variety of methods, including CCTV surveillance, identification cards, security guards, biometric readers, locks, doors, turnstiles and gates. [20] [21] [22]
Mechanical access control systems include turnstiles, gates, doors, and locks. Key control of the locks becomes a problem with large user populations and any user turnover. Keys quickly become unmanageable, often forcing the adoption of electronic access control.
Electronic access control systems provide secure access to buildings or facilities by controlling who can enter and exit. Some aspects of these systems can include:
Electronic access control uses credential readers, advanced software, and electrified locks to provide programmable, secure access management for facilities. Integration of cameras, alarms and other systems is also common.
An additional sub-layer of mechanical/electronic access control protection is reached by integrating a key management system to manage the possession and usage of mechanical keys to locks or property within a building or campus.[ citation needed ]
Another form of access control (procedural) includes the use of policies, processes and procedures to manage the ingress into the restricted area. An example of this is the deployment of security personnel conducting checks for authorized entry at predetermined points of entry. This form of access control is usually supplemented by the earlier forms of access control (i.e. mechanical and electronic access control), or simple devices such as physical passes.
Security personnel play a central role in all layers of security. All of the technological systems that are employed to enhance physical security are useless without a security force that is trained in their use and maintenance, and which knows how to properly respond to breaches in security. Security personnel perform many functions: patrolling facilities, administering electronic access control, responding to alarms, and monitoring and analyzing video footage. [23]
In physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point, point-to-multipoint (P2MP), or mesh wired or wireless links. Even though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that require additional security or ongoing monitoring.
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.
A security alarm is a system designed to detect intrusions, such as unauthorized entry, into a building or other areas, such as a home or school. Security alarms protect against burglary (theft) or property damage, as well as against intruders. Examples include personal systems, neighborhood security alerts, car alarms, and prison alarms.
Building automation (BAS), also known as building management system (BMS) or building energy management system (BEMS), is the automatic centralized control of a building's HVAC, electrical, lighting, shading, access control, security systems, and other interrelated systems. Some objectives of building automation are improved occupant comfort, efficient operation of building systems, reduction in energy consumption, reduced operating and maintaining costs and increased security.
A motion detector is an electrical device that utilizes a sensor to detect nearby motion. Such a device is often integrated as a component of a system that automatically performs a task or alerts a user of motion in an area. They form a vital component of security, automated lighting control, home control, energy efficiency, and other useful systems. It can be achieved by either mechanical or electronic methods. When it is done by natural organisms, it is called motion perception.
Home security includes both the security hardware placed on a property and individuals' personal security practices. Security hardware includes doors, locks, alarm systems, lighting, motion detectors, and security camera systems. Personal security involves practices like ensuring doors are locked, alarms are activated, owning a Dog, windows are closed, and extra keys are not hidden outside.
A prison escape is the act of an inmate leaving prison through unofficial or illegal ways. Normally, when this occurs, an effort is made on the part of authorities to recapture them and return them to their original detainers. Escaping from prison is also a criminal offense in some countries, such as the United States and Canada, and it is highly likely to result in time being added to the inmate's sentence, as well as the inmate being placed under increased security that is most likely a maximum security prison or supermax prison. In Germany, and a number of other countries, it is considered human nature to want to escape from a prison and it is considered as a violation of the right of freedom, so escape is not penalized in itself.
Defense in depth is a concept used in information security in which multiple layers of security controls (defense) are placed throughout an information technology (IT) system. Its intent is to provide redundancy in the event a security control fails or a vulnerability is exploited that can cover aspects of personnel, procedural, technical and physical security for the duration of the system's life cycle.
An exit control lock, also known as an exit control device, exit lock, or simply an exit control, prevents or deters unauthorized exit.
An Internet Protocol camera, or IP camera, is a type of digital video camera that receives control data and sends image data via an IP network. They are commonly used for surveillance, but, unlike analog closed-circuit television (CCTV) cameras, they require no local recording device, only a local area network. Most IP cameras are webcams, but the term IP camera or netcam usually applies only to those that can be directly accessed over a network connection.
The term door security or door security gate may refer to any of a range of measures used to strengthen doors against door breaching, ram-raiding and lock picking, and prevent crimes such as burglary and home invasions. Door security is used in commercial and government buildings, as well as in residential settings.
Demarcation of a perimeter, when the protection of assets, personnel or buildings is required, is normally affected by the building of a perimeter fence system. The level of protection offered varies according to the threat level to the perimeter. Different types of perimeter fencing include:
A gun safe is a safe designed for storing one or more firearms and/or ammunitions. Gun safes are primarily used to prevent access by unauthorized or unqualified persons, for burglary protection and, in more capable safes, to protect the contents from damage by flood, fire or other natural disasters.
Countersurveillance refers to measures that are usually undertaken by the public to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is the process of detecting surveillance devices. It can also include covert listening devices, visual surveillance devices, and countersurveillance software to thwart unwanted cybercrime, such as accessing computing and mobile devices for various nefarious reasons. More often than not, countersurveillance will employ a set of actions (countermeasures) that, when followed, reduce the risk of surveillance. Countersurveillance is different from sousveillance, as the latter does not necessarily aim to prevent or reduce surveillance.
Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface. It collects and correlates events from existing disparate security devices and information systems to empower personnel to identify and proactively resolve situations. PSIM integration enables numerous organizational benefits, including increased control, improved situation awareness and management reporting. Ultimately, these solutions allow organizations to reduce costs through improved efficiency and to improve security through increased intelligence.
A smart lock is an electromechanical lock that is designed to perform locking and unlocking operations on a door when it receives a prompt via an electronic keypad, biometric sensor, access card, Bluetooth, or Wi-FI from a registered mobile device. These locks are called smart locks because they use advanced technology and Internet communication to enable easier access for users and enhanced security from intruders. The main components of the smart lock include the physical lock, the key, a secure Bluetooth or Wi-Fi connection, and a management mobile app. Smart locks may also monitor access and send alerts in response to the different events it monitors, as well as other critical events related to the status of the device. Smart locks can be considered part of a smart home.
Napco Security Technologies, Inc. was set up in 1969 and now is based in Amityville, New York. The company focuses on security products, such as electronic locking devices, alarm systems, and building access control systems. The company was formerly known as Napco Security Systems, Inc.
Artificial intelligence for video surveillance utilizes computer software programs that analyze the audio and images from video surveillance cameras in order to recognize humans, vehicles, objects, attributes, and events. Security contractors program the software to define restricted areas within the camera's view and program for times of day for the property being protected by the camera surveillance. The artificial intelligence ("A.I.") sends an alert if it detects a trespasser breaking the "rule" set that no person is allowed in that area during that time of day.
A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter of a property, building, or other secured area. A PIDS is typically deployed as part of an overall security system and is often found in high-security environments such as correctional facilities, airports, military bases, and nuclear plants.