Vulnerability Assessment of Physical Protection Systems

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Vulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allow readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The book will address the full spectrum of a VA, including negotiating tasks with the customer, project management and planning of the VA, team membership, step-by-step details for performing the VA, data collection and analysis, important notes on how to use the VA to suggest design improvements and generate multiple design options. The text will end with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools will be introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact. - Guides the reader through the topic of physical security doing so with a unique, detailed and scientific approach- Takes the reader from beginning to end and step-by-step through a Vulnerability Assessment- Over 150 figures and tables to illustrate key concepts

Author(s): Mary Lynn Garcia
Edition: 1
Year: 2005

Language: English
Pages: 400

Front cover......Page 1
Title page......Page 4
Copyright page......Page 5
Table of contents......Page 8
Preface......Page 16
CHAPTER 1 Introduction to Vulnerability Assessment......Page 18
Risk Management and Vulnerability Assessment......Page 19
Risk Assessment and the Vulnerability Assessment Process......Page 21
Statistics and Quantitative Analysis......Page 23
Vulnerability Assessment Process Overview......Page 25
Project Management......Page 27
Project Kick-Off Meetings......Page 28
Protection Objectives......Page 29
Data Collection—Detection......Page 30
Intrusion Sensors......Page 31
Alarm Assessment......Page 32
Entry Control......Page 33
Alarm Communication and Display......Page 34
Data Collection—Delay......Page 35
Data Collection—Response......Page 37
Analysis......Page 39
Reporting and Using the Vulnerability Assessment......Page 40
Systems Engineering and Vulnerability Assessment......Page 41
System Requirements......Page 44
System Design and Analysis......Page 46
System Replacement......Page 48
References......Page 49
Physical Protection Systems Overview......Page 50
Physical Protection System Design......Page 51
Detection......Page 52
Response......Page 54
Relationship of PPS Functions......Page 55
Characteristics of an Effective PPS......Page 56
Balanced Protection......Page 57
Design and Evaluation Criteria......Page 58
Additional Design Elements......Page 59
Summary......Page 60
Reference......Page 61
Project Management......Page 62
Initial Customer Contact......Page 63
Define the Project......Page 64
Phase Two—Managing the Project......Page 66
Project Status and Reporting......Page 67
Recovery Plans......Page 70
Project Management Summary......Page 71
Systems Engineer......Page 72
SME—Intrusion Sensing Subsystem......Page 73
SME—Alarm Communication & Display (AC&D) Subsystem......Page 74
SME—Response Subsystem......Page 75
SME—Analyst......Page 76
Participation of On-Site Personnel......Page 77
VA Team Guide......Page 78
Site Information......Page 79
Customer Kick-Off Meeting......Page 80
References......Page 81
Defining the Threat......Page 82
Collecting Information......Page 83
Threat Definition Methods......Page 84
Insider Threat......Page 85
Other Notes on Threat Definition......Page 87
Estimating Likelihood of Attack......Page 88
Asset Identification Methods......Page 89
Logic Diagrams......Page 90
Threat/Asset Matrix......Page 92
Facility Characterization......Page 94
Characterization Tools......Page 95
Facility States......Page 96
References......Page 97
CHAPTER 5 Data Collection - Intrusion Detection Subsystem......Page 100
Sensor Overview......Page 101
Exterior Intrusion Sensor Technologies and Evaluation......Page 102
Exterior Microwave Sensors......Page 103
Electric-field Sensors......Page 106
Buried-Line Sensors......Page 109
Ported Coaxial Sensors......Page 110
Fence-Associated Sensors......Page 112
Taut Wire Sensors......Page 113
Fiber Optic Sensors......Page 115
General Exterior Intrusion Sensing Evaluation......Page 117
Interior Intrusion Sensor Technologies and Evaluation......Page 121
Magnetic Switches......Page 122
Glass-Break Sensors......Page 125
Microwave Sensors......Page 126
Passive Infrared Sensors......Page 128
Video Motion Detection Sensors......Page 129
Volumetric Sensors Summary......Page 131
Pressure Sensors......Page 132
General Interior Intrusion Sensing Evaluation......Page 133
Estimating Intrusion Sensing Performance......Page 135
Summary......Page 138
Reference......Page 139
Alarm Assessment Overview......Page 140
Assessment versus Surveillance......Page 141
Video Assessment Performance Factors......Page 142
Evaluation Testing......Page 143
Video Assessment Subsystem......Page 145
Cameras and Lenses......Page 146
Camera Mounting......Page 150
Lighting......Page 153
Signal Transmission......Page 155
Video Recording and Storage......Page 157
Monitors......Page 159
Other Equipment......Page 161
Procedures......Page 163
Estimating Performance......Page 165
Summary......Page 166
References......Page 167
CHAPTER 7 Data Collection - Entry Control Subsystem......Page 168
Entry Control Subsystem Overview......Page 169
Personnel Control......Page 172
Coded Credentials......Page 173
Private Information......Page 175
Badge Control Equipment Components and Functions......Page 176
Biometrics......Page 177
Material Control......Page 178
Personnel Metal Detection......Page 179
Package Material Control......Page 182
Evaluation Criteria for Contraband Detection......Page 184
Vehicle Control......Page 185
Subsystem Integration Issues......Page 187
Entry Control Subsystem Components......Page 188
General Evaluation Criteria......Page 190
Access Controls......Page 193
Estimating Performance......Page 194
Summary......Page 195
Reference......Page 196
CHAPTER 8 Data Collection - Alarm Communication and Display Subsystem......Page 198
Alarm Communication and Display Overview......Page 199
Communication......Page 201
Low-Level Communications......Page 202
Information Handling......Page 203
Control and Display......Page 204
Offline Systems......Page 210
Evaluation Techniques......Page 211
Operator Workload......Page 213
Displays......Page 214
Network Issues......Page 215
Estimating Performance......Page 216
Reference......Page 218
Delay Overview......Page 220
Fences......Page 223
Chain-link Gates......Page 225
Turnstiles......Page 226
Vehicle Barriers......Page 227
Walls......Page 231
Floors and Roofs......Page 232
Doors......Page 233
Personnel Doors......Page 234
Attack- and Bullet-Resistant Doors......Page 236
Vault Doors......Page 237
Windows......Page 239
Grilles and Utility Ports......Page 241
Armor......Page 242
Vaults......Page 244
Underground Facilities......Page 245
Airborne-Attack Barriers......Page 246
Tie-downs and Restraints......Page 247
Nonlethal Weapons......Page 248
Dispensable Materials and Deployable Barriers......Page 249
General Delay Subsystem Evaluation Factors......Page 250
Summary......Page 251
Reference......Page 252
Response Overview......Page 254
Deterrence......Page 256
Containment......Page 257
Delayed Response......Page 258
Procedures......Page 259
Immediate Response......Page 260
Observe-and-Report......Page 261
Dispatch of Unarmed Security Personnel......Page 262
Response Communications......Page 263
Radio Communication System......Page 264
Radio Maintenance......Page 266
Estimating Performance......Page 267
References......Page 270
CHAPTER 11 Analysis......Page 272
Analysis Overview......Page 273
Analysis Tools......Page 275
Adversary Sequence Diagrams and Path Analysis......Page 276
Scenario Analysis......Page 278
Other Analysis......Page 282
Upgrade Analysis......Page 283
Facility Overview......Page 284
Path Analysis......Page 290
Scenario Analysis......Page 291
Upgrade Analysis......Page 293
Quantitative Analysis......Page 294
Facility Description......Page 295
Path Analysis......Page 299
Scenario Analysis......Page 303
Estimate Neutralization......Page 305
Upgrade Analysis......Page 306
Summary......Page 310
Overview......Page 312
Reporting Results......Page 313
Report Content and Format......Page 314
Reporting Summary......Page 322
Design Stages......Page 323
Summary......Page 325
APPENDIX A Project Management Forms and Templates......Page 326
APPENDIX B Initial Briefing Template......Page 328
APPENDIX C Threat and Facility Worksheets......Page 336
APPENDIX D Data Collection Sheets......Page 344
APPENDIX E Alarm Communication and Display Subsystem Criteria......Page 360
APPENDIX F Representative Delays......Page 368
APPENDIX G Results Briefing Template......Page 380
Index......Page 390