+612 9045 4394
 
CHECKOUT
Vulnerability Assessment of Physical Protection Systems - Mary Lynn Garcia

Vulnerability Assessment of Physical Protection Systems

Paperback

Published: 8th December 2005
Ships: 15 business days
15 business days
RRP $104.49
$100.75
or 4 easy payments of $25.19 with Learn more

Vulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allow readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The book will address the full spectrum of a VA, including negotiating tasks with the customer, project management and planning of the VA, team membership, step-by-step details for performing the VA, data collection and analysis, important notes on how to use the VA to suggest design improvements and generate multiple design options. The text will end with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools will be introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact.
- Guides the reader through the topic of physical security doing so with a unique, detailed and scientific approach
- Takes the reader from beginning to end and step-by-step through a Vulnerability Assessment
- Over 150 figures and tables to illustrate key concepts

"[examples presented]... are the very real, important take-aways obtained from the very real, but very worthwhile effort expended reading and understanding this book" -- Canadian Security

..".Vulnerability Assessment is a self-contained book that stands firmly on its own merit." -- Security Management, Sept. 2006

Prefacep. xv
Introduction to Vulnerability Assessmentp. 1
Risk Management and Vulnerability Assessmentp. 2
Risk Assessment and the Vulnerability Assessment Processp. 4
Statistics and Quantitative Analysisp. 6
Vulnerability Assessment Process Overviewp. 8
Planning the Vulnerability Assessmentp. 10
Project Managementp. 10
Establish the Vulnerability Assessment Teamp. 11
Project Kick-Off Meetingsp. 11
Protection Objectivesp. 12
Facility Characterizationp. 13
Data Collection-Detectionp. 13
Intrusion Sensorsp. 14
Alarm Assessmentp. 15
Entry Controlp. 16
Alarm Communication and Displayp. 17
Data Collection-Delayp. 18
Data Collection-Responsep. 20
Analysisp. 22
Reporting and Using the Vulnerability Assessmentp. 23
Systems Engineering and Vulnerability Assessmentp. 24
System Requirementsp. 27
System Design and Analysisp. 29
System Installation and Testp. 31
System Replacementp. 31
Summaryp. 32
Referencesp. 32
Physical Protection Systems Principles and Conceptsp. 33
Physical Protection Systems Overviewp. 33
Physical Protection System Designp. 34
PPS Functionsp. 35
Detectionp. 35
Delayp. 37
Responsep. 37
Relationship of PPS Functionsp. 38
Characteristics of an Effective PPSp. 39
Protection-in-Depthp. 40
Minimum Consequence of Component Failurep. 40
Balanced Protectionp. 40
Design and Evaluation Criteriap. 41
Additional Design Elementsp. 42
Summaryp. 43
Referencep. 44
Getting Startedp. 45
Project Managementp. 45
Phase One-Project Planningp. 46
Initial Customer Contactp. 46
Define the Projectp. 47
Phase Two-Managing the Projectp. 49
Project Status and Reportingp. 50
Recovery Plansp. 53
Project Management Toolsp. 54
Project Closeoutp. 54
Project Management Summaryp. 54
Establish a Vulnerability Assessment Teamp. 55
Vulnerability Assessment Project Leaderp. 55
Systems Engineerp. 55
Security System Engineerp. 56
SME-Intrusion Sensing Subsystemp. 56
SME-Alarm Assessment Subsystemp. 57
SME-Alarm Communication & Display (AC&D) Subsystemp. 57
SME-Entry Control Subsystemp. 58
SME-Delay Subsystemp. 58
SME-Response Subsystemp. 58
SME-Communications Subsystemp. 59
SME-Analystp. 59
Special Note for Response Force Simulationsp. 60
Participation of On-Site Personnelp. 60
Kick-Off Meetings for Project Team and Customerp. 61
Project Team Kick-Off Meetingp. 61
VA Team Guidep. 61
Site Informationp. 62
Customer Kick-Off Meetingp. 63
Summaryp. 64
Referencesp. 64
VA Process Inputs-Establish Protection Objectivesp. 65
Defining the Threatp. 65
Listing Information Neededp. 66
Collecting Informationp. 66
Organizing Informationp. 67
Threat Definition Methodsp. 67
Insider Threatp. 68
Other Notes on Threat Definitionp. 70
Estimating Likelihood of Attackp. 71
Asset Identificationp. 72
Asset Identification Methodsp. 72
Manual Listingp. 73
Logic Diagramsp. 73
Criteriap. 75
Threat/Asset Matrixp. 75
Facility Characterizationp. 77
Characterization Toolsp. 78
Facility Statesp. 79
Security Checklistsp. 80
Summaryp. 80
Referencesp. 80
Data Collection-Intrusion Detection Subsystemp. 83
Sensor Overviewp. 84
Exterior Intrusion Sensor Technologies and Evaluationp. 85
Freestanding Sensorsp. 86
Exterior Microwave Sensorsp. 86
Electric-field Sensorsp. 89
Freestanding Sensors Summaryp. 92
Buried-Line Sensorsp. 92
Ported Coaxial Sensorsp. 93
Buried-Line Sensors Summaryp. 95
Fence-Associated Sensorsp. 95
Taut Wire Sensorsp. 96
Fiber Optic Sensorsp. 98
Fence-Associated Sensors Summaryp. 100
Other Exterior Intrusion Sensing Technologiesp. 100
General Exterior Intrusion Sensing Evaluationp. 100
Summary of Exterior Intrusion Sensingp. 104
Interior Intrusion Sensor Technologies and Evaluationp. 104
Boundary Penetration Sensorsp. 105
Magnetic Switchesp. 105
Glass-Break Sensorsp. 108
Boundary Penetration Sensors Summaryp. 109
Volumetric Sensing Technologiesp. 109
Microwave Sensorsp. 109
Passive Infrared Sensorsp. 111
Video Motion Detection Sensorsp. 112
Volumetric Sensors Summaryp. 114
Proximity Sensing Technologiesp. 115
Pressure Sensorsp. 115
Proximity Sensors Summaryp. 116
Other Technologiesp. 116
General Interior Intrusion Sensing Evaluationp. 116
Summary of Interior Sensing Technologiesp. 118
Intrusion Sensing by Humansp. 118
Estimating Intrusion Sensing Performancep. 118
Summaryp. 121
Referencep. 122
Data Collection-Alarm Assessment Subsystemp. 123
Alarm Assessment Overviewp. 123
Assessment versus Surveillancep. 124
Video Assessment Performance Factorsp. 125
Evaluation Testingp. 126
Video Assessment Subsystemp. 128
Video Subsystem Equipmentp. 129
Cameras and Lensesp. 129
Camera Housingsp. 133
Camera Mountingp. 133
Lightingp. 136
Signal Transmissionp. 138
Video Recording and Storagep. 140
Monitorsp. 142
Other Equipmentp. 144
Proceduresp. 146
Estimating Performancep. 148
Summaryp. 149
Referencesp. 150
Data Collection-Entry Control Subsystemp. 151
Entry Control Subsystem Overviewp. 152
Personnel Controlp. 155
Tokensp. 156
Coded Credentialsp. 156
Private Informationp. 158
Badge Control Equipment Components and Functionsp. 159
Biometricsp. 160
Locksp. 161
Material Controlp. 161
Personnel Metal Detectionp. 162
Trace Detection Systemsp. 165
Package Material Controlp. 165
Evaluation Criteria for Contraband Detectionp. 167
Asset Trackingp. 168
Vehicle Controlp. 168
Subsystem Integration Issuesp. 170
Entry Control Subsystem Componentsp. 171
General Evaluation Criteriap. 173
Access Controlsp. 176
Operator Trainingp. 177
Estimating Performancep. 177
Summaryp. 178
Referencep. 179
Data Collection-Alarm Communication and Display Subsystemp. 181
Alarm Communication and Display Overviewp. 182
Communicationp. 184
High-Level Communicationsp. 185
Low-Level Communicationsp. 185
Information Handlingp. 186
Control and Displayp. 187
Offline Systemsp. 193
Evaluation Techniquesp. 194
Operator Workloadp. 196
Displaysp. 197
Video System Integrationp. 198
Network Issuesp. 198
Other Evaluation Aspectsp. 199
Estimating Performancep. 199
Summaryp. 201
Referencep. 201
Data Collection-Delay Subsystemp. 203
Delay Overviewp. 203
Perimeter Barriersp. 206
Fencesp. 206
Gatesp. 208
Chain-link Gatesp. 208
Turnstilesp. 209
Vehicle Barriersp. 210
Buildingsp. 214
Wallsp. 214
Floors and Roofsp. 215
Doorsp. 216
Personnel Doorsp. 217
Attack- and Bullet-Resistant Doorsp. 219
Vehicle Doorsp. 220
Vault Doorsp. 220
Windows, Grilles, and Utility Portsp. 222
Windowsp. 222
Grilles and Utility Portsp. 224
Windows, Grilles, and Utility Ports Summaryp. 225
Other Barriersp. 225
Armorp. 225
Vaultsp. 227
Earth and Overburdenp. 228
Underground Facilitiesp. 228
Airborne-Attack Barriersp. 229
Waterborne-Attack Barriersp. 230
Tie-downs and Restraintsp. 230
Nonlethal Weaponsp. 231
Dispensable Materials and Deployable Barriersp. 232
General Delay Subsystem Evaluation Factorsp. 233
Estimating Performancep. 234
Summaryp. 234
Referencep. 235
Data Collection-Response Subsystemp. 237
Response Overviewp. 237
Response Strategiesp. 239
Deterrencep. 239
Denialp. 240
Containmentp. 240
Recoveryp. 241
Delayed Responsep. 241
Equipmentp. 242
Proceduresp. 242
Peoplep. 243
Immediate Responsep. 243
General Warning Alarmsp. 244
Observe-and-Reportp. 244
Dispatch of Unarmed Security Personnelp. 245
Dispatch of Armed Security Personnelp. 246
Response Communicationsp. 246
Radio Communication Systemp. 247
Radio Maintenancep. 249
Operational Issuesp. 250
Estimating Performancep. 250
Summaryp. 253
Referencesp. 253
Analysisp. 255
Analysis Overviewp. 256
Analysis Toolsp. 258
Analysis Processp. 259
Adversary Sequence Diagrams and Path Analysisp. 259
Scenario Analysisp. 261
Estimate Neutralizationp. 265
Other Analysisp. 265
Calculate System Effectivenessp. 266
Upgrade Analysisp. 266
Qualitative Analysisp. 267
Facility Overviewp. 267
Path Analysisp. 273
Scenario Analysisp. 274
Upgrade Analysisp. 276
Quantitative Analysisp. 277
Facility Descriptionp. 278
Path Analysisp. 282
Scenario Analysisp. 286
Estimate Neutralizationp. 288
Baseline System Effectivenessp. 289
Upgrade Analysisp. 289
Summaryp. 293
Reporting and Using Resultsp. 295
Overviewp. 295
Reporting Resultsp. 296
Briefingsp. 297
Report Content and Formatp. 297
Protecting Resultsp. 305
Reporting Summaryp. 305
Using the Vulnerability Assessmentp. 306
Design Stagesp. 306
Project Closeoutp. 308
Summaryp. 308
Project Management forms and Templatesp. 309
Initial Briefing Templatep. 311
Threat and Facility Worksheetsp. 319
Data Collection Sheetsp. 327
Alarm Communication and Display Subsystem Criteriap. 343
Representative Delaysp. 351
Results Briefing Templatep. 363
Indexp. 373
Table of Contents provided by Ingram. All Rights Reserved.

ISBN: 9780750677882
ISBN-10: 0750677880
Audience: General
Format: Paperback
Language: English
Number Of Pages: 382
Published: 8th December 2005
Publisher: Elsevier Science & Technology
Country of Publication: NL
Dimensions (cm): 25.4 x 18.0  x 2.1
Weight (kg): 0.74