Physical Security
Table of Contents
INTRODUCTION III
ELEMENTS AND DESIGN III
EXAMPLES OF PHYSICAL SECURITY III
PHYSICAL SECURITY ELECTRONIC ACCESS III
CASINOS AND GAMING III
EDUCATION III
TRANSPORTATION III
Goggle Search iii
Dictionary Search iii
Introduction
This paper examines Physical Security from the perspective of perimeter such as gates/guards, building access controls, room access controls, enforcement options, auditing approaches, risk determination for physical attack vectors, etc. Physical Security describes measures that prevent and/or deter attackers from accessing a facility, resource, or information stored on physical media. It can be as simple as a locked door or as elaborate as multiple …show more content…
In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed. Although the term closed-circuit television (CCTV) is common, it is quickly becoming outdated as more video systems lose the closed circuit for signal transmission and are instead transmitting on computer networks. Advances in information technology are transforming video monitoring into video analysis. For instance, once an image is digitized it can become data that sophisticated algorithms can act upon. As the speed and accuracy of automated analysis increases, the video system could move from a monitoring system to an intrusion detection system or access control system. It is not a stretch to imagine a video camera inputting data to a processor that outputs to a door lock. Instead of using some kind of key, whether mechanical or electrical, a person's visage is the key.
Private factory guard
Intertwined in these four layers are people. Guards have a role in all layers, in the first as patrols and at checkpoints. In the second to administer electronic access control; In the third to respond to alarms. The response force must be able to arrive on site in less time than it is expected that the attacker will require breaching the barriers; And in the fourth to monitor and analyze video. Users obviously have a role also by questioning and reporting