Security Architecture and Engineering
Describe a model project to upgrade security at your facility (or a fictional facility) using the process identified in the three-part Security Architecture and Engineering series. In whatever order seems most logical to you, address total system design including barriers, site hardening, access control, lighting, Intrusion Detection Systems, CCTV, patrols, etc.
TECHNICAL GUIDANCE:
Your paper should be a minimum 10-12 pages (the Title Page and Referencespage will be additional pages).
A minimum of 3-5 scholarly sources must be used.
Type in Times New Roman, 12 point and double space. Please provide a separate heading for each question.
Studentswill follow the APA 6 Style as the sole citation and reference style used in written work submitted as part of coursework.Seehttp://www.apus.edu/content/dam/online-library/resources-services/Fuson_2012_APA.pdf
Use scholarly or other relevant sources.
Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize: books, peer reviewed journals, articles, archived documents, etc. (may be electronic of course and the APA manual lists all the types of possible resources and reference formats, hinthint), and valid web sites (use caution with these).
Your assignment will be graded using the attached rubric.
I’ve attached a couple things to help as well.
APUS Assignment Rubric Lower Level
Undergraduate 300-400 Courses
Updated: June 2017
Full Rubric for Classroom Publication
School of Security and Global Studies Rubric Features
Rubric categories are evenly distributed 20 points per category.
Assignment settings equal 100 points for each assignment.
Grade book is set for weighted categories (not points).
Separate rubrics in 100-200, 300-400, 500-600 level courses for assignments.
Standard forum discussion rubric for all levels.
Quick Table for Insertion in Assignments (within Word document)
Criteria
Exemplary 16-20
Accomplished 11-15
Developing 6-10
Beginning 0-5
Total
Focus/Thesis
Content/Subject Knowledge
Critical Thinking Skills
Organization of Ideas/Format
Writing Conventions
Total
Focus/Thesis 20 points
Beginning
Exhibits a limited understanding of the assignment. Reader is unable to follow the logic used for the thesis and development of key themes. Introduction of thesis is not clearly evident, and reader must look deeper to discover the focus of the writer. Students writing is weak in the inclusion of supporting facts or statements.
Developing
Student exhibits a basic understanding of the intended assignment, but the thesis is not fully supported throughout the assignment. While thesis helps to guide the development of the assignment, the reader may have some difficulty in seeing linkages between thoughts. While student has included a few supporting facts and statements, this has limited the quality of the assignment.
Accomplished
Establishes a good comprehension of topic and in the building of the thesis. Student demonstrates an effective presentation of thesis, with most support statements helping to support the key focus of assignment.
Exemplary
Student exhibits a defined and clear understanding of the assignment. Thesis is clearly defined and well-constructed to help guide the reader throughout the assignment. Student builds upon the thesis of the assignment with well-documented and exceptional supporting facts, figures, and/or statements.
______________________________________________________________________________
Content/Subject Knowledge 20 points
Beginning
Student tries to explain some concepts, but overlooks critical details. Assignment appears vague or incomplete in various segments. Student presents concepts in isolation, and does not perceive to have a logical sequencing of ideas.
Developing
The assignment reveals that the student has a general, fundamental understanding of the course material. There are areas of some concerning in the linkages provided between facts and supporting statements. Student generally explains concepts, but only meets the minimum requirements in this area.
Accomplished
Student exhibits above average usage of subject matter in assignment. Student provides above average ability in relating course content in examples given. Details and facts presented provide an adequate presentation of students current level of subject matter knowledge.
Exemplary
Student demonstrates proficient command of the subject matter in the assignment. Assignment shows an impressive level of depth of students ability to relate course content to practical examples and applications. Student provides comprehensive analysis of details, facts, and concepts in a logical sequence.
______________________________________________________________________________
Critical Thinking Skills 20 points
Beginning
Student demonstrates beginning understanding of key concepts, but overlooks critical details. Learner is unable to apply information in a problem-solving fashion. Student presents confusing statements and facts in assignment. No evidence or little semblance of critical thinking skills.
Developing
Student takes a common, conventional approach in guiding the reader through various linkages and connections presented in assignment. However, student presents a limited perspective on key concepts throughout assignment. Student appears to have problems applying information in a problem-solving manner.
Accomplished
Student exhibits a good command of critical thinking skills in the presentation of material and supporting statements. Assignment demonstrates the students above average use of relating concepts by using a variety of factors. Overall, student provides adequate conclusions, with two or fewer errors.
Exemplary
Student demonstrates a higher-level of critical thinking necessary for 300-400 level work. Learner provides a strategic approach in presenting examples of problem solving or critical thinking, while drawing logical conclusions which are not immediately obvious. Student provides well-supported ideas and reflection with a variety of current and/or world views in the assignment. Student presents a genuine intellectual development of ideas throughout assignment.
______________________________________________________________________________
Organization of Ideas/Format 20 points
Beginning
Assignment reveals formatting errors and a lack of organization. Student presents an incomplete attempt to provide linkages or explanation of key terms. The lack of appropriate references or source materials demonstrates the students need for additional help or training in this area. Student needs to review and revise the assignment.
Developing
Learner applies some points and concepts incorrectly. Student uses a variety of formatting styles, with some inconsistencies throughout the paper. Assignment does not have a continuous pattern of logical sequencing. Student uses fewer sources or references than required by assignment. Academic sources are lacking.
Accomplished
Student explains the majority of points and concepts in the assignment. Learner demonstrates a good skill level in formatting and organizing material in assignment. Student presents an above average level of preparedness, with a few formatting errors. Assignment contains number of academic sources required in assignment.
Exemplary
Student thoroughly understands and excels in explaining all major points. An original, unique, and/or imaginative approach to overall ideas, concepts, and findings is presented. Overall format of assignment includes an appropriate introduction (or abstract), well- developed paragraphs, and conclusion. Finished assignment demonstrates students ability to plan and organize research in a logical sequence. Student uses required number of academic sources or beyond.
______________________________________________________________________________
Writing Conventions (Grammar and Mechanics) 20 points
Beginning
Topics, concepts, and ideas are not coherently discussed or expressed in assignments. Students writing style is weak and needs improvement, along with numerous proofreading errors. Assignment lacks clarity, consistency, and correctness. Student needs to review and revise assignment.
Developing
Assignment reflects basic writing and grammar, but more than five errors. Key terms and concepts are somewhat vague and not completely explained by student. Student uses a basic vocabulary in assignment. Students writing ability is average, but demonstrates a basic understanding of the subject matter.
Accomplished
Student provides an effective display of good writing and grammar. Assignment reflects students ability to select appropriate word usage and present an above average presentation of a given topic or issue. Assignment appears to be well written with no more than three-five errors. Student provides a final written product that covers the above-minimal requirements.
Exemplary
Student demonstrates an excellent command of grammar, as well as presents research in a clear and concise writing style. Presents a thorough and extensive understanding of word usage. Student excels in the selection and development of a well-planned research assignment. Assignment is error-free and reflects students ability to prepare a high-quality academic assignment. 1
Session #46, Mon., Sept. 15, 2008, 4:30-5:30
SECURITY ARCHITECTURE &
ENGINEERING
Part III – SYSTEM
IMPLEMENTATION
Sponsored by the ASIS Standing Council
on Security Architecture & Engineering
Presented by
David G. Aggleton, CPP,CSC
AGGLETON&
ASSOCIATES
2008 ASIS INTERNATIONAL
1
2
THE PROCESS
PART I Basis of Security Design
Define Assets
Identify Threats and Associated Risk
Determine Vulnerability
Develop Security Requirements
PART II Systems Design & Engineering
Document Design Criteria
Prepare Construction Documents
Estimate Implementation Costs
PART III System Implementation
3
PART III TOPICS
SYSTEM PROCUREMENT
CONSTRUCTION MANAGEMENT
SHOP DRAWINGS
PROJECT MEETINGS
TRAINING
COMMISSIONING
ACCEPTANCE TESTING
FINAL DOCUMENTATION
4
SYSTEM PROCUREMENT
SOLE SOURCE
Trusted Contractor
Negotiated Lump Sum
Itemized Pricing
Open Book
or
COMPETITIVE BID
RFP to Prequalified Contractors
IFB for Public Bids
2
5
SYSTEM PROCUREMENT
WHO AS PRIME CONTRACTOR?
General Contractor
Electrical Contractor
Security Contractor
6
SYSTEM PROCUREMENT
TYPICAL SCHEDULE
DAY 1 Issue Contract Documents
(Construction Documents + Contractual Conditions)
DAY 7 Pre-bid Meeting/Walk-through
DAY 20 Last Requests for Information (RFIs)
DAY 30 Receive Bids
DAY 45 Analysis & Leveling
DAY 50 Interviews
DAY 60 BAFO and Selection
7
CONSTRUCTION
MANAGEMENT
WHO DOES IT?
In-House
Construction Mgmt. Firm
Security Design Consultant
ADMINISTRATION
Contractual Aspects
FIELD MANAGEMENT
Technical Aspects
3
8
CONSTRUCTION
ADMINISTRATION
BONDING & INSURANCE
PREPARING & EXCECUTING CONTRACT
PROCESSING INTERIM PAYMENTS
MAINTAINING PROJECT DOCUMENTATION
(Submittals, Sign-offs, Meeting Minutes, etc.)
PROJECT BOOKKEEPING
CHANGE ORDER PROCESSING
CERTIFICATE OF ACCEPTANCE
FINAL PAYMENT
9
FIELD MANAGEMENT
REVIEW OF TECHNICAL SUBMITTALS
SCHEDULE TRADES
INTERIM INSPECTIONS
WORK MEASUREMENT
CHAIRING JOB MEETINGS
INITIATING/REVIEWING CHANGE
ORDERS
WITNESSING TESTING & TRAINING
ACCEPTANCE TESTING
10
SHOP DRAWINGS
REVIEW BY:
CM, Architect, Engineer, Consultant
EQUIPMENT CUTS
SAMPLES (Exposed equipment, cable)
DEVICE LOCATION PLANS
CABLE/CONDUIT PLANS
RISERS (Power & Signal)
TERMINATION SCHEDULES
FABRICATION & MOUNTING DETAILS
4
11
PROJECT MEETINGS
FREQUENCY
ATTENDEES – Need to Know, with Input
AGENDA – Issue before meeting, Follow it!
CHAIRPERSON – Focused, Control
MINUTES – Issue within 48 hours
– Highlight & Date Action Items
12
TRAINING
WHO NEEDS IT?
Console Operators
Security Supervisors
Maintenance Personnel
Employees (Awareness/ User Interface)
13
Training (cont.)
PLANNING FACTORS
Location – Factory or Site
Curriculum – Overview, Focused
Scheduling – Many Courses
Certification – Mgmt. needs to know
5
14
COMMISSIONING
DATA INPUT
– Employee Database (Name, Access, Ph. #)
– Zone Descriptors – Time Zones
– Standard Reports – Graphic Maps
– Video System Programming
– Output Control – Watch Tour Sequences
WHO INPUTS?
– Contractor – Operator – Supervisor
15
ACCEPTANCE TESTING
TESTING METHODOLOGY
Contract Documents, Contractor Supplied
COVERAGE
Floor-by-Floor
System-by-System
Random Sample
TOOLS
Plans, Test Forms (Punch List)
2 – Way Radios
System Logs, Reports
16
ACCEPTANCE TESTING
(cont.)
TESTS TO REMEMBER
Line Supervision – Fire Alarm Interface
Power Failure Mode – Battery Operation
Communications Failure – Forced Entry
Invalid Card – Off-Hours Operation
PUNCHLIST – RETEST – PUNCHLIST –
RETEST………………………ACCEPTANCE
6
17
FINAL DOCUMENTATION
AS-BUILT/RECORD DRAWINGS
Device Location Plans
Cable/Conduit Plans
Risers – Terminations
Installation Details
Equipment Cuts
18
Final Documentation (cont.)
OTHER DOCUMENTS
Test Documentation
Operations Manuals/Guides
Maintenance Manuals
Software Documentation
Certifications : UL, FM
19
SUMMARY
THE QUALITY OF THE IMPLEMENTATION &
THE DOCUMENTATION DETERMINES:
– Reliability – Maintainability – Expandability –
Acceptance
IDENTIFY IN-HOUSE RESOURCES – or BID
OUT
PLAN IMPLEMENTATION AT START OF
PROJECT
PREPARE REALISTIC SCHEDULE
IDENTIFY TRAINING NEEDS EARLY Facilities
Physical
Security
Measures
G U I D E L I N E
DRAFT
ASIS GDL FPSM DRAFT ii
ASIS INTERNATIONAL
COMMISSION ON STANDARDS AND GUIDELINES
The Commission on Standards and Guidelines was established in early 2001
by ASIS International (ASIS) in response to a concerted need for guidelines
regarding security issues in the United States. As the preeminent
organization for security professionals worldwide, ASIS has an important
role to play in helping the private sector secure its business and critical
infrastructure, whether from natural disaster, accidents, or planned actions,
such as terrorist attacks, vandalism, etc. ASIS had previously chosen not to
promulgate guidelines and standards, but world events have brought to the
forefront the need for a professional security organization to spearhead an
initiative to create security advisory provisions. By addressing specific
concerns and issues inherent to the security industry, security guidelines will
better serve the needs of security professionals by increasing the
effectiveness and productivity of security practices and solutions, as well as
enhancing the professionalism of the industry.
Mission Statement
To advance the practice of security through the development of guidelines
within a voluntary, non-proprietary, and consensus-based process utilizing to
the fullest extent possible the knowledge, experience, and expertise of ASIS
membership and the security industry.
Goals and Objectives
Assemble and categorize a database of existing security-related
guidelines
Develop methodology for identifying new guideline development
projects
Involve ASIS Councils, interested members, and other participants
to support guideline development
Identify and establish methodology for development,
documentation, and acceptance of guidelines thus promulgated
Build and sustain alliances with related organizations to
benchmark, participate in, and support ASIS guideline
development
Produce international consensus-based documents in cooperation
with other industries and the Security Industry Standards Council
Functions
Establish guideline projects
Determine guidelines for development and assign scope
Assign participating Council(s), where appropriate
Approve membership on guideline committees
Act as a governing body to manage and integrate guidelines from
various Councils and security disciplines
Review and monitor projects and guideline development
Approve Final Draft Guideline and Final Guideline
Select guidelines for submission to the Security Industry
Standards Council and the American National Standards Institute
(ANSI)
ASIS GDL FPSM DRAFT iii
FACILITIES PHYSICAL SECURITY MEASURES
GUIDELINE
Safety Act Designation
In April 2005, the U.S. Department of Homeland Security (DHS) awarded ASIS
International a Designation for its Guidelines Program under the SAFETY Act (Support
Anti-Terrorism by Fostering Effective Technology Act of 2002). This Designation is
significant in three ways: (1) it establishes that ASIS standards and guidelines are
qualified to be a technology that could reduce the risks or effects of terrorism, (2) it
limits ASIS liability for acts arising out of the use of the standards and guidelines in
connection with an act of terrorism, and (3) it precludes claims of third party damages
against organizations using the standards and guidelines as a means to prevent or limit the
scope of terrorist acts.
ASIS GDL FPSM DRAFT iv
Copyright 2008 by ASIS International
ISBN nnn
ASIS International (ASIS) disclaims liability for any personal injury, property, or other
damages of any nature whatsoever, whether special, indirect, consequential, or
compensatory, directly or indirectly resulting from the publication, use of, or reliance on
this document. In issuing and making this document available, ASIS is not undertaking to
render professional or other services for or on behalf of any person or entity. Nor is ASIS
undertaking to perform any duty owed by any person or entity to someone else. Anyone
using this document should rely on his or her own independent judgment or, as
appropriate, seek the advice of a competent professional in determining the exercise of
reasonable care in any given circumstance.
All rights reserved. Permission is hereby granted to individual users to download this
document for their own personal use, with acknowledgment of ASIS International as the
source. However, this document may not be downloaded for further copying or
reproduction nor may it be sold, offered for sale, or otherwise sold commercially.
Printed in the United States of America
10 9 8 7 6 5 4 3 2 1
ASIS GDL FPSM DRAFT v
Facilities Physical Security Measures Guideline
1.0 Title ……………………………………………………………………………………………… 1
2.0 Revision History …………………………………………………………………………… 1
3.0 Commission Members ………………………………………………………………….. 1
4.0 Committee Members …………………………………………………………………….. 1
5.0 Guideline Designation …………………………………………………………………… 2
6.0 Scope …………………………………………………………………………………………… 2
7.0 Summary ……………………………………………………………………………………… 2
8.0 Purpose ……………………………………………………………………………………….. 3
9.0 Keywords …………………………………………………………………………………….. 3
10.0 Terms and Definitions …………………………………………………………………… 4
11.0 Recommended Practice Advisory………………………………………………….. 9
11.1 Crime Prevention Through Environmental Design (CPTED)… 10
11.1.1 Background……………………………………………………………………. 10
11.1.2 Strategies………………………………………………………………………. 10
11.1.3 Risk Assessment Process ……………………………………………….. 14
11.2 Physical Barriers and Site Hardening ………………………………… 16
11.2.1 Physical Barriers …………………………………………………………….. 16
11.2.2 Site Hardening ……………………………………………………………….. 21
11.3 Physical Entry and Access Control……………………………………. 22
11.3.1 Access Control Barriers …………………………………………………… 23
11.3.2 Electronic Access Control Systems …………………………………… 23
11.3.3 Personnel Access Control………………………………………………… 23
11.3.4 Locks…………………………………………………………………………….. 23
11.3.5 Contraband Detection ……………………………………………………… 25
11.3.6 Vehicle Access Control ……………………………………………………. 25
11.3.7 Procedures and Controls …………………………………………………. 26
11.4 Security Lighting………………………………………………………………. 27
11.4.1 Applications……………………………………………………………………. 27
11.4.2 Intensity…………………………………………………………………………. 28
11.4.3 Equipment……………………………………………………………………… 28
11.5 Intrusion Detection Systems……………………………………………… 31
11.5.1 Intrusion Detection System Devices ………………………………….. 32
11.5.2 Alarm Transmission, Monitoring, and Notification………………… 33
11.5.3 Installation, Maintenance, and Repair………………………………… 33
11.6 Closed-Circuit Television …………………………………………………….. 34
11.6.1 Functional Requirements …………………………………………………. 34
11.6.2 Cameras ……………………………………………………………………….. 36
11.6.3 Transport Medium …………………………………………………………… 38
ASIS GDL FPSM DRAFT vi
11.6.4 Command Center……………………………………………………………. 38
11.6.5 Recording………………………………………………………………………. 38
11.6.6 Maintenance ………………………………………………………………….. 39
11.7 Security Personnel……………………………………………………………. 40
11.7.1 Security Managers ………………………………………………………….. 40
11.7.2 Security Officers……………………………………………………………… 40
11.7.3 Other Employees ……………………………………………………………. 43
11.8 Security Policies and Procedures ……………………………………… 44
11.8.1 Policies………………………………………………………………………….. 44
11.8.2 Procedures…………………………………………………………………….. 45
Bibliography………………………………………………………………………………………… 47
FACILITIES PHYSICAL SECURITY MEASURES GUIDELINE
ASIS GDL FPSM DRAFT 1
1.0 Title
The title of this guideline is the Facilities Physical Security Measures Guideline.
2.0 Revision History
Baseline document.
3.0 Commission Members
Jason L. Brown, Thales Australia
Steven K. Bucklin, Glenbrook Security Services, Inc.
John C. Cholewa III, CPP, Embarq Corporation
Cynthia P. Conlon, CPP, Conlon Consulting Corporation
Michael A. Crane, CPP, IPC International Corporation
Eugene F. Ferraro, CPP, PCI, CFE, Business Controls Inc.
F. Mark Geraci, CPP, Bristol-Myers Squibb Co., Chair
Robert W. Jones, Kraft Foods, Inc.
Michael E. Knoke, CPP, Express Scripts, Inc., Vice Chair
John F. Mallon, CPP, SC Johnson & Son, Inc.
Marc H. Siegel, Ph.D., ASIS Security Management System Consultant
Roger D. Warwick, CPP, Pyramid International
4.0 Committee Members
Geoffrey T. Craighead, CPP, Securitas Security Services USA Inc., Committee Chair
Robert W. Jones, Kraft Foods, Inc.
Sean A. Ahrens, CPP, Schirmer Engineering
Randy Atlas, PhD, AIA, CPP, Counter Terror Design Inc.
Daniel E. Bierman, CPP, PSP, Whitman, Requardt & Associates, LLP
Elliot Boxerbaum, CPP, Security/Risk Management Consultants, Inc.
John T. Brady (deceased), ConocoPhillips Company
Ross D. Bulla, CPP, PSP, The Treadstone Group, Inc.
Nick Catrantzos, CPP, Metropolitan Water District of Southern California
BG (Ret.) Jonathan H. Cofer, Defense Information Systems Agency
Thomas G. Connolly, Red Hawk/UTC Fire/Security Co.
Frederick J. Coppell, CPP, SAIC
Joe DiDona, The Readers Digest Association, Inc.
Jack F. Dowling, CPP, PSP, JD Security Consultants, LLC
David R. Duda, PE, CPP, PSP, Newcomb & Boyd
Alan F. Farley, CPP, CNI Utilities
Mary Lynn Garcia, CPP, Sandia National Laboratories
William J. Moore, PSP, ABCP, CAS, Jacobs Facilities Inc.
FACILITIES PHYSICAL SECURITY MEASURES GUIDELINE
ASIS GDL FPSM DRAFT 2
Patrick M. Murphy, CPP, PSP, CLSD, Marriott International Inc.
Robert Pearson, PE, Raytheon Co.
Thomas J. Rohr Sr., CPP, Eastman Kodak Company
Gregory L. Sanders, CPP, United Nations Development Programme
Terry Wood, PE, CPP, Wackenhut Consulting and Investigations
Paul Yung, PhD, Deloitte Touche Tohmatsu
Guideline editor: Peter Ohlhausen, Ohlhausen Research, Inc.
5.0 Guideline Designation
This guideline is designated as ASIS GDL FPSM nn 2008.
6.0 Scope
This guideline assists in the identification of physical security measures that can be
applied at facilities to safeguard or protect an organizations assetspeople, property,
and information. It is not aimed at a specific occupancy, but facilities and buildings in
general.
7.0 Summary
The guideline outlines eight main categories of physical security measures used to protect
facilities. These categories are:
Crime Prevention Through Environmental Design (CPTED),
Physical Barriers and Site Hardening,
Physical Entry and Access Control,
Security Lighting,
Intrusion Detection Systems (Alarms),
Closed-Circuit Television (CCTV),
Security Personnel, and Security Policies and Procedures.
FACILITIES PHYSICAL SECURITY MEASURES GUIDELINE
ASIS GDL FPSM DRAFT 3
8.0 Purpose
The purpose of this guideline is to introduce readers, who may or may not have a security
background, to the main types of physical security measures that can be applied to
minimize the security risks at a facility.
To choose the right physical security measures and apply them appropriately, it is
important to first conduct a risk assessment, such as described in the ASIS General
Security Risk Assessment Guideline. The risk assessment, accompanied by a basic
understanding of physical security measures provided by this guideline, makes it
possible, either alone or with the help of security consultants or vendors, to select and
implement appropriate physical security measures to reduce the assessed risks and
accomplish the protective task.
9.0 Keywords
Access Control, Alarm System, Asset, Barrier, Camera, Closed-Circuit Television
(CCTV), Crime Prevention Through Environmental Design (CPTED), Facility, Intrusion
Detection, Lighting, Lock, Perimeter Protection, Physical Security, Physical Security
Measure, Policy, Procedure, Security Manager, Security Officer, Site Hardening.
FACILITIES PHYSICAL SECURITY MEASURES GUIDELINE
ASIS GDL FPSM DRAFT 4
10.0 Terms and Definitions
10.1
access control
the control of persons, vehicles, and materials through the implementation of security
measures for a protected area
10.2
alarm system
combination of sensors, controls, and annunciators (devices that announce an alarm via
sound, light, or other means) arranged to detect and report an intrusion or other
emergency
10.3
asset
any tangible or intangible value (people, property, information) to the organization
10.4
barrier
a natural or man-made obstacle to the movement/direction of persons, animals, vehicles,
or materials
10.5
camera
device for capturing visual images, whether still or moving; in security, often part of a
closed-circuit television system (see closed-circuit television)
10.6
closed-circuit television (CCTV)
video surveillance system; a television installation in which a signal is transmitted to
monitors, recording and control equipment.
10.7
contract security service
a business that provides security services, typically the services of security officers, to
another entity for compensation.
10.8
crime
an act or omission which is in violation of a law forbidding or commanding it for which
the possible penalties for an adult upon conviction include incarceration, for which a
corporation can be penalized by a fine or forfeit, or for which a juvenile can be adjudged
delinquent or transferred to criminal court for prosecution. The basic legal definition of
crime is all punishable acts, whatever the nature of the penalty.
FACILITIES PHYSICAL SECURITY MEASURES GUIDELINE
ASIS GDL FPSM DRAFT 5
10.9
crime prevention through environmental design (CPTED, pronounced sep-ted)
an approach to reducing crime or security incidents through the strategic design of the
built environment, typically employing organizational, mechanical, and natural methods
to control access, enhance natural surveillance and territoriality, and support legitimate
activity.
10.10
denial
frustration of an adversarys failed attempt to engage in behavior that would constitute a
security incident (see security incident)
10.11
detection
the act of discovering an attempt (successful or unsuccessful) to breach a secured
perimeter (such as scaling a fence, opening a locked window, or entering an area without
authorization)
10.12
event
a noteworthy happening; typically, a security incident (see security incident), alarm,
medical emergency, or similar occurrence
10.13
facility
one or more buildings or structures that are related by function and location, and form an
operating entity
10.14
lighting
degree of illumination; also, equipment, used indoors and outdoors, for increasing
illumination
10.15
lock
a piece of equipment used to prevent undesired opening, typically of an aperture (gate,
window, building door, vault door, etc.), while still allowing opening by authorized users
10.16
perimeter protection
safeguarding of a boundary or limit
10.17
physical security
that part of security concerned with physical measures designed to safeguard people, to
prevent unauthorized access to equipment, facilities, material, and documents, and to
safeguard them against a security incident (see security incident).
FACILITIES PHYSICAL SECURITY MEASURES GUIDELINE
ASIS GDL FPSM DRAFT 6
10.18
physical security measure
a device, system, or practice of a tangible nature designed to protect people and prevent
damage to, loss of, or unauthorized access to assets (see assets)
10.19
policy
a general statement of a principle according to which an organization performs business
functions
10.20
private security
the nongovernmental, private-sector practice of protecting people, property, and
information, conducting investigations, and otherwise safeguarding an organizations
assets; may be performed for an organization by an internal department (usually called
proprietary security) or by an external, hired firm (usually called contract security)
10.21
private security officer
an individual, in uniform or plain clothes, employed by a nongovernmental organization
to protect assets (see assets)
10.22
procedure
detailed implementation instructions for carrying out security policies; often presented as
forms or as lists of steps to be taken prior to or during a security incident (see security
incident)
10.23
proprietary information
valuable information, owned by a company or entrusted to it, which has not been
disclosed publicly; specifically, information that is not readily accessible to others, that
was created or collected by the owner at considerable cost, and that the owner seeks to
keep confidential
10.24
proprietary security organi