Physical Security RS&RM Contents
Total Page:16
File Type:pdf, Size:1020Kb
Physical Security RS&RM Contents 1 Security 1 1.1 Perceived security compared to real security ............................... 1 1.2 Categorizing security ........................................... 2 1.3 Security concepts ............................................. 2 1.4 Security at home .............................................. 2 1.5 Security management in organizations ................................... 2 1.6 See also .................................................. 3 1.7 References ................................................ 3 1.8 External links ............................................... 3 2 Physical security 4 2.1 Overview ................................................. 4 2.2 Elements and design ............................................ 4 2.2.1 Deterrence methods ....................................... 4 2.2.2 Intrusion detection and electronic surveillance .......................... 5 2.2.3 Access control .......................................... 6 2.2.4 Security personnel ........................................ 7 2.3 See also .................................................. 7 2.4 References ................................................. 7 3 Closed-circuit television 9 3.1 History .................................................. 9 3.1.1 Technology ............................................ 10 3.1.2 Application ............................................ 10 3.2 Uses .................................................... 10 3.2.1 Crime prevention ......................................... 10 3.2.2 Industrial processes ........................................ 12 3.2.3 Traffic monitoring ........................................ 12 3.2.4 Transport safety ......................................... 12 3.2.5 Control of retail .......................................... 12 i ii CONTENTS 3.2.6 Use in schools ........................................... 13 3.2.7 Criminal use ........................................... 13 3.3 Prevalence ................................................ 13 3.4 Privacy .................................................. 14 3.5 Technological developments ....................................... 15 3.5.1 Computer controlled analytics and identification ......................... 15 3.5.2 Retention, storage and preservation ............................... 16 3.5.3 Closed-circuit digital photography (CCDP) ........................... 16 3.5.4 IP cameras ............................................ 17 3.5.5 Networking CCTV cameras ................................... 17 3.5.6 Integrated systems ........................................ 17 3.5.7 Wireless security cameras .................................... 17 3.6 CCTV camera vandalism ......................................... 18 3.7 See also .................................................. 18 3.8 Notes ................................................... 18 3.9 References ................................................ 19 3.10 Further reading .............................................. 20 3.11 External links ............................................... 20 4 Security guard 21 4.1 Functions and duties ........................................... 21 4.2 Personnel ................................................. 22 4.2.1 Types of security personnel and companies ............................ 22 4.3 Training .................................................. 24 4.3.1 Australia ............................................. 24 4.3.2 Canada .............................................. 25 4.3.3 Europe .............................................. 25 4.3.4 Hong Kong ............................................ 28 4.4 Qualification ................................................ 28 4.4.1 Hong Kong ............................................ 28 4.4.2 Israel ............................................... 29 4.4.3 Malaysia ............................................. 30 4.4.4 South Africa ........................................... 30 4.4.5 United States ........................................... 30 4.5 Security officers and the police ...................................... 32 4.6 Trends .................................................. 33 4.6.1 Australia ............................................. 33 4.6.2 UK ................................................ 33 4.6.3 United States ........................................... 33 CONTENTS iii 4.7 History .................................................. 33 4.8 Notable security guards .......................................... 34 4.9 Unionization ................................................ 34 4.9.1 Canada .............................................. 34 4.9.2 United States ........................................... 34 4.10 Hazards in the Industry .......................................... 35 4.11 See also .................................................. 35 4.12 References ................................................. 35 4.13 External links ............................................... 37 5 Separation barrier 38 5.1 Cyprus ................................................... 38 5.2 Egypt ................................................... 38 5.3 Germany .................................................. 38 5.4 Israel .................................................... 39 5.5 Kuwait ................................................... 39 5.6 Malaysia .................................................. 39 5.7 Saudi Arabia ................................................ 39 5.8 Slovakia .................................................. 39 5.9 United Kingdom .............................................. 39 5.10 United States ............................................... 40 5.11 See also .................................................. 40 5.12 References ................................................. 40 5.13 External links ............................................... 41 6 Lock (security device) 42 6.1 History .................................................. 42 6.1.1 Antiquity ............................................. 42 6.1.2 Modern locks ........................................... 43 6.2 Types of locks .............................................. 44 6.2.1 Locks with physical keys ..................................... 44 6.2.2 Locks with electronic keys .................................... 45 6.2.3 List of common locks ...................................... 45 6.3 Locksmithing ............................................... 45 6.3.1 Full disclosure .......................................... 46 6.3.2 Famous locksmiths ........................................ 46 6.4 See also .................................................. 47 6.5 References ................................................ 47 6.6 Further reading .............................................. 47 iv CONTENTS 6.7 External links ............................................... 47 7 Access control 48 7.1 Physical security .............................................. 48 7.1.1 Access control system operation ................................. 49 7.1.2 Credential ............................................. 50 7.1.3 Access control system components ................................ 50 7.1.4 Access control topology ...................................... 50 7.1.5 Types of readers ......................................... 51 7.1.6 Access control system topologies ................................. 51 7.1.7 Security risks ........................................... 55 7.2 Computer security ............................................ 56 7.3 Access Control .............................................. 56 7.4 Telecommunication ............................................ 57 7.5 Public policy ................................................ 57 7.6 See also .................................................. 57 7.7 References ................................................. 57 7.8 External links ............................................... 58 8 Alarm device 59 8.1 Etymology ................................................. 59 8.2 See also .................................................. 59 9 Motion detection 60 9.1 Mechanical ................................................ 60 9.2 Electronic ................................................. 60 9.3 Occupancy sensors for lighting control .................................. 61 9.3.1 System design and components .................................. 61 9.4 See also .................................................. 61 9.5 References ................................................. 61 9.6 External links ............................................... 61 10 Glass break detector 62 10.1 See also .................................................. 62 10.2 External links ............................................... 62 11 Identity document 63 11.1 History ................................................... 63 11.2 Adoption of identity cards ......................................... 63 11.2.1 Arguments for ........................................... 63 CONTENTS v 11.2.2 Arguments against ........................................ 64 11.3 National policies .............................................. 64 11.3.1 Africa ............................................... 65 11.3.2 Asia ................................................ 66 11.3.3 Europe .............................................. 70 11.3.4 North America .......................................... 82 11.3.5 Oceania .............................................. 84 11.3.6 South America .........................................