Physical Security RS&RM Contents

Physical Security RS&RM Contents

Physical Security RS&RM Contents 1 Security 1 1.1 Perceived security compared to real security ............................... 1 1.2 Categorizing security ........................................... 2 1.3 Security concepts ............................................. 2 1.4 Security at home .............................................. 2 1.5 Security management in organizations ................................... 2 1.6 See also .................................................. 3 1.7 References ................................................ 3 1.8 External links ............................................... 3 2 Physical security 4 2.1 Overview ................................................. 4 2.2 Elements and design ............................................ 4 2.2.1 Deterrence methods ....................................... 4 2.2.2 Intrusion detection and electronic surveillance .......................... 5 2.2.3 Access control .......................................... 6 2.2.4 Security personnel ........................................ 7 2.3 See also .................................................. 7 2.4 References ................................................. 7 3 Closed-circuit television 9 3.1 History .................................................. 9 3.1.1 Technology ............................................ 10 3.1.2 Application ............................................ 10 3.2 Uses .................................................... 10 3.2.1 Crime prevention ......................................... 10 3.2.2 Industrial processes ........................................ 12 3.2.3 Traffic monitoring ........................................ 12 3.2.4 Transport safety ......................................... 12 3.2.5 Control of retail .......................................... 12 i ii CONTENTS 3.2.6 Use in schools ........................................... 13 3.2.7 Criminal use ........................................... 13 3.3 Prevalence ................................................ 13 3.4 Privacy .................................................. 14 3.5 Technological developments ....................................... 15 3.5.1 Computer controlled analytics and identification ......................... 15 3.5.2 Retention, storage and preservation ............................... 16 3.5.3 Closed-circuit digital photography (CCDP) ........................... 16 3.5.4 IP cameras ............................................ 17 3.5.5 Networking CCTV cameras ................................... 17 3.5.6 Integrated systems ........................................ 17 3.5.7 Wireless security cameras .................................... 17 3.6 CCTV camera vandalism ......................................... 18 3.7 See also .................................................. 18 3.8 Notes ................................................... 18 3.9 References ................................................ 19 3.10 Further reading .............................................. 20 3.11 External links ............................................... 20 4 Security guard 21 4.1 Functions and duties ........................................... 21 4.2 Personnel ................................................. 22 4.2.1 Types of security personnel and companies ............................ 22 4.3 Training .................................................. 24 4.3.1 Australia ............................................. 24 4.3.2 Canada .............................................. 25 4.3.3 Europe .............................................. 25 4.3.4 Hong Kong ............................................ 28 4.4 Qualification ................................................ 28 4.4.1 Hong Kong ............................................ 28 4.4.2 Israel ............................................... 29 4.4.3 Malaysia ............................................. 30 4.4.4 South Africa ........................................... 30 4.4.5 United States ........................................... 30 4.5 Security officers and the police ...................................... 32 4.6 Trends .................................................. 33 4.6.1 Australia ............................................. 33 4.6.2 UK ................................................ 33 4.6.3 United States ........................................... 33 CONTENTS iii 4.7 History .................................................. 33 4.8 Notable security guards .......................................... 34 4.9 Unionization ................................................ 34 4.9.1 Canada .............................................. 34 4.9.2 United States ........................................... 34 4.10 Hazards in the Industry .......................................... 35 4.11 See also .................................................. 35 4.12 References ................................................. 35 4.13 External links ............................................... 37 5 Separation barrier 38 5.1 Cyprus ................................................... 38 5.2 Egypt ................................................... 38 5.3 Germany .................................................. 38 5.4 Israel .................................................... 39 5.5 Kuwait ................................................... 39 5.6 Malaysia .................................................. 39 5.7 Saudi Arabia ................................................ 39 5.8 Slovakia .................................................. 39 5.9 United Kingdom .............................................. 39 5.10 United States ............................................... 40 5.11 See also .................................................. 40 5.12 References ................................................. 40 5.13 External links ............................................... 41 6 Lock (security device) 42 6.1 History .................................................. 42 6.1.1 Antiquity ............................................. 42 6.1.2 Modern locks ........................................... 43 6.2 Types of locks .............................................. 44 6.2.1 Locks with physical keys ..................................... 44 6.2.2 Locks with electronic keys .................................... 45 6.2.3 List of common locks ...................................... 45 6.3 Locksmithing ............................................... 45 6.3.1 Full disclosure .......................................... 46 6.3.2 Famous locksmiths ........................................ 46 6.4 See also .................................................. 47 6.5 References ................................................ 47 6.6 Further reading .............................................. 47 iv CONTENTS 6.7 External links ............................................... 47 7 Access control 48 7.1 Physical security .............................................. 48 7.1.1 Access control system operation ................................. 49 7.1.2 Credential ............................................. 50 7.1.3 Access control system components ................................ 50 7.1.4 Access control topology ...................................... 50 7.1.5 Types of readers ......................................... 51 7.1.6 Access control system topologies ................................. 51 7.1.7 Security risks ........................................... 55 7.2 Computer security ............................................ 56 7.3 Access Control .............................................. 56 7.4 Telecommunication ............................................ 57 7.5 Public policy ................................................ 57 7.6 See also .................................................. 57 7.7 References ................................................. 57 7.8 External links ............................................... 58 8 Alarm device 59 8.1 Etymology ................................................. 59 8.2 See also .................................................. 59 9 Motion detection 60 9.1 Mechanical ................................................ 60 9.2 Electronic ................................................. 60 9.3 Occupancy sensors for lighting control .................................. 61 9.3.1 System design and components .................................. 61 9.4 See also .................................................. 61 9.5 References ................................................. 61 9.6 External links ............................................... 61 10 Glass break detector 62 10.1 See also .................................................. 62 10.2 External links ............................................... 62 11 Identity document 63 11.1 History ................................................... 63 11.2 Adoption of identity cards ......................................... 63 11.2.1 Arguments for ........................................... 63 CONTENTS v 11.2.2 Arguments against ........................................ 64 11.3 National policies .............................................. 64 11.3.1 Africa ............................................... 65 11.3.2 Asia ................................................ 66 11.3.3 Europe .............................................. 70 11.3.4 North America .......................................... 82 11.3.5 Oceania .............................................. 84 11.3.6 South America .........................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    140 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us