Physical Security Strategy and Process Playbook
eBook - ePub

Physical Security Strategy and Process Playbook

John Kingsley-Hefty

  1. 160 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Physical Security Strategy and Process Playbook

John Kingsley-Hefty

Book details
Book preview
Table of contents
Citations

About This Book

The Physical Security Strategy and Process Playbook is a concise yet comprehensive treatment of physical security management in the business context. It can be used as an educational tool, help a security manager define security requirements, and serve as a reference for future planning.

This book is organized into six component parts around the central theme that physical security is part of sound business management. These components include an introduction to and explanation of basic physical security concepts; a description of the probable security risks for more than 40 functional areas in business; security performance guidelines along with a variety of supporting mitigation strategies; performance specifications for each of the recommended mitigation strategies; guidance on selecting, implementing, and evaluating a security system; and lists of available physical security resources.

The Physical Security Strategy and Process Playbook is an essential resource for anyone who makes security-related decisions within an organization, and can be used as an instructional guide for corporate training or in the classroom.

The Physical Security Strategy and Process Playbook is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.

  • Chapters are categorized by issues and cover the fundamental concepts of physical security up to high-level program procedures
  • Emphasizes performance guidelines (rather than standards) that describe the basic levels of performance to be achieved
  • Discusses the typical security risks that occur in more than 40 functional areas of an organization, along with security performance guidelines and specifications for each
  • Covers the selection, implementation, and evaluation of a robust security system

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on ā€œCancel Subscriptionā€ - itā€™s as simple as that. After you cancel, your membership will stay active for the remainder of the time youā€™ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlegoā€™s features. The only differences are the price and subscription period: With the annual plan youā€™ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weā€™ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Physical Security Strategy and Process Playbook an online PDF/ePUB?
Yes, you can access Physical Security Strategy and Process Playbook by John Kingsley-Hefty in PDF and/or ePUB format, as well as other popular books in Sciences sociales & Criminologie. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Elsevier
Year
2013
ISBN
9780124172371
Chapter 1

Physical Security Concepts

In Chapter 1: Physical Security Concepts, we are introduced to three fundamental concepts of physical security, which include assessing the security risks to your business; zones of protection; and the components of a security system: barriers, technology, procedures, and people. An overall assessment of the security issues relating to your business operationsā€”your people, information, property, product, and the corporationā€™s reputationā€”is necessary to identify the security needs of your business. When conducting this assessment, the author explains that the three elements of security should be applied: probability, criticality, and vulnerability. With these concepts in mind, the chapter continues with instructions on how to conduct the security assessment and arrive at a determination of your organizationā€™s security risks. It also discusses the components of a security system and the way to integrate the system with existing business processes.

Keywords

Security goals; security assessment; zones of protection; probability; criticality; vulnerability; risk; access control; performance guidelines; physical barriers; system planning; system implementation

1.1 Before you Begin

Before you implement any physical security measures, you should understand the fundamental concepts in three areas. These areas are:
1. Assessing the security risks to your business.
2. Zones of protection.
3. Components of a security system: barriers, technology, procedures, and people.
As you work through the concepts in each of these areas, you will be able to answer the basic physical security questions: What is the goal of my current system? Is my system accomplishing its objectives? Why or why not? What, if anything, do I need to change? Are there other ways I can meet my goals?

1.1.1 What are your Security Goals?

Before you begin assessment of your security system, you need to know your security goals. All of your security activities should support these goals. If you donā€™t have a clear understanding of your goals, you will not be able to implement a cost effective system that meets your needs.
A clear statement of your security goals is usually built on answers to questions like the following:
ā€¢ Do I want to correct a problem or reduce a potential risk?
ā€¢ Do my proposed solutions address the needs that I have identified?
ā€¢ Are my solutions consistent with the business culture?
ā€¢ Will the solutions hinder business operations?
ā€¢ Will the solutions enhance security performance guidelines for the business?
ā€¢ Is new technology part of the solution?
ā€¢ Is the new technology consistent with the long range plans of the business?

1.2 Assessing the Needs of your Business

Physical security must make sense within the context of your business operations. In order to build a security system that works for any business, the needs of that business must first be assessed.
At the core of this assessment are the following operational issues:
ā€¢ What is the general level of risk for this business?
ā€¢ What are the critical events that will stop this business?
ā€¢ What are the products, information, and assets at this site? What specific risks are associated with each of them?
ā€¢ How do people and materials enter and leave?
ā€¢ What are the work schedules?
We often recommend a security assessment as the first step in assessing the needs of your business. This helps you arrive at an overall assessment of the security issues relating to your business operationsā€”your people, information, property, product, and the corporationā€™s reputation.
In order to use a security assessment properly, you first need to understand the three fundamental elements of security: probability, criticality, and vulnerability. The next section describes how an effective security assessment is based on these three concepts.

1.2.1 Elements of Security

An effective security assessment applies an understanding of the fundamental elements of security to a particular location or area within the business. As you look at each area, you must consider the following questions:
ā€¢ What is the probability of a security-related incident occurring in this area?
ā€¢ How critical might the incident be to my business operations?
ā€¢ How vulnerable is the area to a security incident?
Answers to these questions help you to arrive at an assessment of the level of security risk associated with a particular area of your business.

1.2.1.1 Element 1: Probability

Probability is the likelihood that a security incident will occur, independent of any effort you may make to avoid the incident. Probability is affected by factors such as your location and environment, your product, the personnel at your site, and other factors that are essentially beyond your control.
For example, if your facility is located in a high-density area of a large city, the probability of parking lot incidents and vandalism is much greater than if your facility is located in a small rural town. Or, if you use a proprietary process or have proprietary information that has a high market value, you are more likely to have theft attempts than if you donā€™t use such a process or possess such information.
As you perform a security assessment, keep in mind that each area of your business must be evaluated in terms of the probability that security incidents will occur there. As you assess each area of your business, make a list of the most frequent incidents that have occurred in your building, at your location, and in the surrounding area or neighborhood.

1.2.1.2 Element 2: Criticality

The criticality of a security incident is the degree to which it affects your ability to do business. An incident with high criticality is one that:
ā€¢ Interrupts your business operations;
ā€¢ Has significant operational or legal ramifications;
ā€¢ Impacts or reduces sales;
ā€¢ Erodes the quality of your products or services;
ā€¢ Gives the competition a significant advantage;
ā€¢ Causes the loss of substantial revenue; and/or
ā€¢ Damages the corporationā€™s reputation.
As you assess each area of your business, make a list of the security incidents that could have a high degree of criticality.

1.2.1.3 Element 3: Vulnerability

Vulnerability is a measure of your ability to prevent a security incident. Your current security system and procedures represent the active steps youā€™ve taken to decrease your vulnerability.
Vulnerability is a dynamic concept. It changes whenever your environment, operations, personnel, business and/or systems change. Each time a substantive security-related change occurs in an area of your business, you need to reconsider your vulnerability in that area.
As you assess your business, keep track of the things that make it easier to reduce the likelihood that an incident will occur, as well as the ones that make it more difficult.

1.2.2 Combining the Three Elements of Security to Arrive at an Assessment of Risk

The most cost-e...

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Executive Summary
  6. Introduction
  7. Chapter 1. Physical Security Concepts
  8. Chapter 2. Functional Areas and Security Risks
  9. Chapter 3. Security Performance Guidelines and Options
  10. Chapter 4. Performance Specifications
  11. Chapter 5. Systems Implementation and Evaluation
  12. Chapter 6. Physical Security Resources
  13. About the Contributing Editor
  14. About Elsevierā€™s Security Executive Council Risk Management Portfolio
Citation styles for Physical Security Strategy and Process Playbook

APA 6 Citation

Kingsley-Hefty, J. (2013). Physical Security Strategy and Process Playbook ([edition unavailable]). Elsevier Science. Retrieved from https://www.perlego.com/book/1828148/physical-security-strategy-and-process-playbook-pdf (Original work published 2013)

Chicago Citation

Kingsley-Hefty, John. (2013) 2013. Physical Security Strategy and Process Playbook. [Edition unavailable]. Elsevier Science. https://www.perlego.com/book/1828148/physical-security-strategy-and-process-playbook-pdf.

Harvard Citation

Kingsley-Hefty, J. (2013) Physical Security Strategy and Process Playbook. [edition unavailable]. Elsevier Science. Available at: https://www.perlego.com/book/1828148/physical-security-strategy-and-process-playbook-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Kingsley-Hefty, John. Physical Security Strategy and Process Playbook. [edition unavailable]. Elsevier Science, 2013. Web. 15 Oct. 2022.