Personal Safety Controls

Most of what we have presented up to this point has focused on the protection of assets such as computers, facilities, and data. However, the human factor has been overlooked. Any security plan must address the protection and security of personnel first and foremost. The security of nonpersonnel assets is secondary. There is a wide assortment of technologies specifically designed to protect not only people but also the organization itself, including the following:

  • Lighting

  • Alarms and intrusion detection

  • CCTV/remote monitoring

Lighting

Lighting is perhaps one of the lowest-cost security controls that can be implemented by an organization. Lighting can provide increased security and a welcome sense of well-being to locations such as parking garages and building perimeters. When properly placed, lighting can eliminate shadows and reduce the areas that cameras or guards can’t monitor as well as reduce the places in which an intruder can hide. Effective lighting means the system is designed to put the light where it is needed and in the proper wattage. Lights are designed for specific types of applications. Some of the more common types of lights follow:

  • Continuous—Fixed lights arranged to flood an area with overlapping cones of light (most common)

  • Standby—Randomly turned on to create an impression of activity

  • Movable—Manually operated movable searchlights; used as needed to augment continuous or standby lighting

  • Emergency—Can duplicate any or all of the previous lights; depends on an alternative power source

Two issues that occur with lighting are overlighting and glare. Too much light, or overly bright lights, can bleed over to the adjacent owner’s property and be a source of complaints. Too much light can also lead to a false sense of security because a company may feel that because all areas are lit, intrusion is unlikely. Additionally, when lighting is chosen incorrectly, it is possible to introduce high levels of glare. Glare can make it tough for those tasked with monitoring an area to observe all the activities that may be occurring. When placing lighting, avoid any placement that directs the lighting toward the facility and instead direct the lights toward fences, gates, or other areas of concern, such as access points. Also consider the problems associated with glare when guards are present; for example, if guards are tasked with checking IDs at a checkpoint into a facility, ensure that the lights are not directed toward the guards. This offers good glare protection to the security force and guards.

Alarms and Intrusion Detection

Alarms and physical intrusion detection systems can also increase physical security. Both of these controls are referred to as detective controls. Detective controls only detect an event, as opposed to preventing it. Alarms typically are used to provide an alert mechanism if a potential intrusion, fire, or dangerous carbon monoxide level has been detected. Alarms can have a combination of audible and visual indicators that allow people to see and hear the alarm and react to the alert. Alarms are of no use if no one receives the alert and responds accordingly. Many alarm systems also include the ability to contact remote resources, such as monitoring personnel, fire, or police services when the alarm is activated. One common problem with monitored alarm systems is the number of false alarms. This problem is such an issue for first responders that many services levy fines for excessive false alarms.

Additional options that can enhance physical intrusion detection include motion, audio, infrared wave pattern, and capacitance detection systems. Of these systems, infrared and motion detection tend to be the most common, but like any system, they have both pros and cons. Infrared systems are expensive and may be larger than other comparable devices. However, these systems can detect activity outside the normal visual range. Another popular collection of devices used to provide intrusion detection are those sensitive to changes in weight. A weight detection device placed in the floor of an entryway can detect when someone walks over the device. Such systems may be useful when used with mantraps because they can detect changes in weight that may signal a thief. More sturdy devices of this type can be installed under the pavement of approaches to a facility.

Choosing the right IDS devices depends on the organization and security goals. Avoid placing an IDS that is too complex or inappropriate for the given situation. For example, systems that detect weight changes may not be as important or may even be completely unnecessary in situations where theft is not a concern. Also, keep in mind that IDSs are not foolproof and are not an excuse for avoiding using common sense or other security controls. Remember that an IDS is placed to detect and alert but typically falls short of actually reacting to stop the threat. Any guidance on what type of IDS to implement should also mention that human involvement is essential.

Closed-Circuit TV (CCTV)/Remote Monitoring

Another class of controls that can protect personnel and potentially deter crime is closed-circuit TV (CCTV) and other remote monitoring technologies. CCTV and remote monitoring usually work in conjunction with guards or other monitoring mechanisms to extend their capacity. They provide the ability to see what’s going on in a location in which a guard is not currently present. When dealing with surveillance devices, it is important to understand factors such as focal length, lens types, depth of field, and illumination requirements. As an example, the requirement of a camera that will be placed outside in an area of varying light is much different from one placed inside in a fixed lighting environment. Also, there is the issue of focal length, which defines the camera’s effectiveness in viewing objects from a horizontal and vertical view. Short focal lengths provide wider-angle views, whereas longer focal lengths provide narrower views. Many of today’s CCTV systems depend on digital cameras connected to the organization’s network via wired or wireless connections. This type of CCTV monitoring system combines many aspects of physical and technical security.

When planning placement of CCTV cameras, keep in mind areas such as perimeter entrances and critical access points. Activity can be either monitored live by a security officer, or digital images or video can be stored on disk and reviewed later. If no one is monitoring the CCTV system, it effectively becomes a detective control because it will not prevent a crime. In these situations, the organization is effectively alerted to the intrusion only after the fact when the stored images or videos are reviewed.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.30.253