Logo


1. Introduction
  1. Risk Management

  2. Who Are You, and Why Are You Here?

  3. Finding a Solution

2. Problem Definition
  1. What Needs Protecting?

  2. Who is Allowed Where?

3. Methods of Identification
  1. Reliability vs. Cost

  2. Combining Methods to Increase Reliability

  3. Security System Management

4. Access Control
  1. What You Have

  2. What You Know

  3. Who You Are

5. Other Security Systems Elements

  1. Building Design

  2. Piggybacking and Tailgating: Mantraps

  3. Camera Surveillance

  4. Security Guards

  5. Sensors and Alarms

  6. Visitors

6. The Human Element
  1. People: The Weakest Link

  2. People: The Strongest Backup

7. Site Design
  1. Layers

  2. Components

  3. Tactics

8. Controlling Site Access
  1. Entry Control Facility

  2. Zones of an Entry Control Facility

  3. Utilities and Automatition

9. Chosing the Right Solution
  1. Risk Tolerance vs. Cost

  2. Security System Design Considerations

  3. Building Security Design Considerations

Camera Surveillance

Still cameras can be used for such things as recording license plates at vehicle entry points, or in conjunction with footstep sensors to record people at critical locations. Closed circuit TV (CCTV) cameras — hidden or visible — can provide interior or exterior monitoring, deterrence, and post-incident review. Several types of camera views can be used — fixed, rotating, or remotely controlled.

Some things to consider when placing cameras:

  • Is it important that a person in camera view be easily identifiable?
  • Is it only necessary to determine if the room is occupied?
  • Are you watching to see if assets are being removed?
  • Is the camera simply to serve as a deterrent?

If CCTV signals are recorded, there must be procedures in place to address the following issues:

  • How will tapes be indexed and cataloged for easy retrieval?
  • Will the tapes be stored on site or off site?
  • Who will have access to the tapes?
  • What is the procedure for accessing tapes?
  • How long will the tapes be kept before being destroyed?

New technology is in development to automate a job traditionally done by security guards — watching TV monitors — by software detection of changes (movement) in the image on the screen.

CCTV can be used at Entry Control Facilities to archive events for evidentiary purposes:

  • CCTV systems for situational awareness and training
  • CCTV systems for vehicle identification and license plate capture
  • Connectivity to central security office
  • Space and power in gatehouse for equipment (monitor, DVR, etc)
  • CCTV typically provided for each lane

To receive your Physical Vulnerability Assessment, please submit your payment of $999.00
B E T T E R: Please submit your payment of $1999.00 for a complete Physical Vulnerability Assessment or Design covering a single location.
Business Name:
Contact Information:
Email Address:
URL or IP address:
  

Other members of our business group:
Cloud-Security.us

COPYRIGHT (C) 2000 - 2013 InfoSecPro.com ALL RIGHTS RESERVED