Design and Evaluation of Physical Protection Systems
- 2nd Edition - September 26, 2007
- Author: Mary Lynn Garcia
- Language: English
- Paperback ISBN:9 7 8 - 0 - 7 5 0 6 - 8 3 5 2 - 4
- eBook ISBN:9 7 8 - 0 - 0 8 - 0 5 5 4 2 8 - 0
Design and Evaluation of Physical Security Systems, Second Edition, includes updated references to security expectations and changes since 9/11. The threat chapter includes refere… Read more

Purchase options
Institutional subscription on ScienceDirect
Request a sales quote- New chapter on transportation systems
- Extensively updated chapter on threat definition
- Major changes to response chapter
Dedication
Preface
1. Design and Evaluation of Physical Protection Systems
Safety Versus Security
Deterrence
Process Overview
Physical Protection System Design
PPS Functions
Design Goals
Design Criteria
Analysis
Physical Protection System Design and the Relationship to Risk
Summary
Questions
PART ONE. DETERMINING SYSTEM OBJECTIVES
2. Facility Characterization
Physical Conditions
Facility Operations
Facility Policies and Procedures
Regulatory Requirements
Safety Considerations
Legal Issues
Corporate Goals and Objectives
Other Information
Summary
Security Principle
Questions
3. Threat Definition
Steps for Threat Definition
List Threat Information
Collect Threat Information
Organize Threat Information
Sample Threat Statements
Summary
Security Principle
Questions
4. Target Identification
Undesirable Consequences
Consequence Analysis
Targets
Techniques for Target Identification
Vital Area Identification
Summary
Security Principle
Questions
PART TWO. DESIGN PHYSICAL PROTECTION SYSTEM
5. Physical Protection System Design
Physical Protection System Design
PPS Functions
Relationship of PPS Functions
Characteristics of an Effective PPS
Design Criteria
Additional Design Elements
Summary
Security Principles
Questions
6. Exterior Intrusion Sensors
Performance Characteristics
Sensor Classification
Sensor Technology
Maturity Model for Security Technologies
Perimeter Sensor Systems—Design Concepts and Goals
Effects of Physical and Environmental Conditions
Integration with Video Assessment System
Integration with Barrier Delay System
Exterior Sensor Subsystem Characteristics
Procedures
Summary
Security Principles
Questions
7. Interior Intrusion Sensors
Performance Characteristics
Sensor Classification
Sensor Technology
Effects of Environmental Conditions
Sensor Selection
Procedures
System Integration
Summary
Security Principles
Questions
8. Alarm Assessment
Assessment Versus Surveillance
Video Alarm Assessment System
Alarm Assessment by Response Force
Integration with Safety Systems
Legal Issues
Camera Selection Procedures
Acceptance Testing
Summary
Security Principles
Questions
9. Alarm Communication and Display
Evolution of Alarm Reporting Systems
AC&D Attributes
Alarm Communication Subsystem
Alarm Control and Display
AC&D System Design
Summary
Security Principles
Questions
10. Entry Control
Personnel Entry Control
Contraband Detection
Locks
System Integration and Installation Issues
Procedures
Administrative Procedures
Summary
Security Principles
Questions
11. Access Delay
Barrier Types and Principles
System Considerations
Aspects of Penetration
Perimeter Barriers
Structural Barriers
Dispensable Barriers
Procedures
Summary
Security Principles
Questions
12. Response
General Considerations
Response Force Performance Measures
Contingency Planning
Communication
Interruption
Neutralization
Procedures
Summary
Security Principles
Questions
PART THREE. ANALYSIS AND EVALUATION
13. Analysis and Evaluation
Adversary Paths
Effectiveness Measures
Quantitative Analysis
Critical Path
Qualitative Analysis
Summary
Security Principles
Questions
14. EASI Computer Model for Analysis
Quantitative Analysis Tools
EASI Model
Using the Model
Adversary Sequence Diagrams
Summary
Security Principle
Questions
15. Risk Assessment
Risk Management Approaches
Risk Equation
Vulnerability Assessment Process
Risk Assessment
Performance Testing
Summary
Security Principle
Questions
16. Process Applications
Executive Protection
Determine Protection Objectives—Facility Characterization, Threat Definition, and Asset Identification
Ground Transportation
Cyber Systems (Computers and Networks)
Summary
APPENDIX A. Threat Tables
APPENDIX B. Network Site Survey
Guidance
Survey Questions
APPENDIX C. EASI Model
Additional Notes on EASI Excel Model
Glossary
Index
- No. of pages: 376
- Language: English
- Edition: 2
- Published: September 26, 2007
- Imprint: Butterworth-Heinemann
- Paperback ISBN: 9780750683524
- eBook ISBN: 9780080554280
MG