Record:   Prev Next
Author Garcia, Mary Lynn
Title Vulnerability Assessment of Physical Protection Systems
Imprint Oxford : Elsevier Science & Technology, 2005
©2006
book jacket
Descript 1 online resource (399 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Note Front cover -- Title page -- Copyright page -- Table of contents -- Preface -- CHAPTER 1 Introduction to Vulnerability Assessment -- Risk Management and Vulnerability Assessment -- Risk Assessment and the Vulnerability Assessment Process -- Statistics and Quantitative Analysis -- Vulnerability Assessment Process Overview -- Planning the Vulnerability Assessment -- Project Management -- Establish the Vulnerability Assessment Team -- Project Kick-Off Meetings -- Protection Objectives -- Facility Characterization -- Data Collection-Detection -- Intrusion Sensors -- Alarm Assessment -- Entry Control -- Alarm Communication and Display -- Data Collection-Delay -- Data Collection-Response -- Analysis -- Reporting and Using the Vulnerability Assessment -- Systems Engineering and Vulnerability Assessment -- System Requirements -- System Design and Analysis -- System Installation and Test -- System Replacement -- Summary -- References -- CHAPTER 2 Physical Protection Systems Principles and Concepts -- Physical Protection Systems Overview -- Physical Protection System Design -- PPS Functions -- Detection -- Delay -- Response -- Relationship of PPS Functions -- Characteristics of an Effective PPS -- Protection-in-Depth -- Minimum Consequence of Component Failure -- Balanced Protection -- Design and Evaluation Criteria -- Additional Design Elements -- Summary -- Reference -- CHAPTER 3 Getting Started -- Project Management -- Phase One-Project Planning -- Initial Customer Contact -- Define the Project -- Phase Two-Managing the Project -- Project Status and Reporting -- Recovery Plans -- Project Management Tools -- Project Closeout -- Project Management Summary -- Establish a Vulnerability Assessment Team -- Vulnerability Assessment Project Leader -- Systems Engineer -- Security System Engineer -- SME-Intrusion Sensing Subsystem
SME-Alarm Assessment Subsystem -- SME-Alarm Communication & Display (AC&D) Subsystem -- SME-Entry Control Subsystem -- SME-Delay Subsystem -- SME-Response Subsystem -- SME-Communications Subsystem -- SME-Analyst -- Special Note for Response Force Simulations -- Participation of On-Site Personnel -- Kick-Off Meetings for Project Team and Customer -- Project Team Kick-Off Meeting -- VA Team Guide -- Site Information -- Customer Kick-Off Meeting -- Summary -- References -- CHAPTER 4 VA Process Inputs - Establish Protection Objectives -- Defining the Threat -- Listing Information Needed -- Collecting Information -- Organizing Information -- Threat Definition Methods -- Insider Threat -- Other Notes on Threat Definition -- Estimating Likelihood of Attack -- Asset Identification -- Asset Identification Methods -- Manual Listing -- Logic Diagrams -- Criteria -- Threat/Asset Matrix -- Facility Characterization -- Characterization Tools -- Facility States -- Security Checklists -- Summary -- References -- CHAPTER 5 Data Collection - Intrusion Detection Subsystem -- Sensor Overview -- Exterior Intrusion Sensor Technologies and Evaluation -- Freestanding Sensors -- Exterior Microwave Sensors -- Electric-field Sensors -- Freestanding Sensors Summary -- Buried-Line Sensors -- Ported Coaxial Sensors -- Buried-Line Sensors Summary -- Fence-Associated Sensors -- Taut Wire Sensors -- Fiber Optic Sensors -- Fence-Associated Sensors Summary -- Other Exterior Intrusion Sensing Technologies -- General Exterior Intrusion Sensing Evaluation -- Summary of Exterior Intrusion Sensing -- Interior Intrusion Sensor Technologies and Evaluation -- Boundary Penetration Sensors -- Magnetic Switches -- Glass-Break Sensors -- Boundary Penetration Sensors Summary -- Volumetric Sensing Technologies -- Microwave Sensors -- Passive Infrared Sensors -- Video Motion Detection Sensors
Volumetric Sensors Summary -- Proximity Sensing Technologies -- Pressure Sensors -- Proximity Sensors Summary -- Other Technologies -- General Interior Intrusion Sensing Evaluation -- Summary of Interior Sensing Technologies -- Intrusion Sensing by Humans -- Estimating Intrusion Sensing Performance -- Summary -- Reference -- CHAPTER 6 Data Collection - Alarm Assessment Subsystem -- Alarm Assessment Overview -- Assessment versus Surveillance -- Video Assessment Performance Factors -- Evaluation Testing -- Video Assessment Subsystem -- Video Subsystem Equipment -- Cameras and Lenses -- Camera Housings -- Camera Mounting -- Lighting -- Signal Transmission -- Video Recording and Storage -- Monitors -- Other Equipment -- Procedures -- Estimating Performance -- Summary -- References -- CHAPTER 7 Data Collection - Entry Control Subsystem -- Entry Control Subsystem Overview -- Personnel Control -- Tokens -- Coded Credentials -- Private Information -- Badge Control Equipment Components and Functions -- Biometrics -- Locks -- Material Control -- Personnel Metal Detection -- Trace Detection Systems -- Package Material Control -- Evaluation Criteria for Contraband Detection -- Asset Tracking -- Vehicle Control -- Subsystem Integration Issues -- Entry Control Subsystem Components -- General Evaluation Criteria -- Access Controls -- Operator Training -- Estimating Performance -- Summary -- Reference -- CHAPTER 8 Data Collection - Alarm Communication and Display Subsystem -- Alarm Communication and Display Overview -- Communication -- High-Level Communications -- Low-Level Communications -- Information Handling -- Control and Display -- Offline Systems -- Evaluation Techniques -- Operator Workload -- Displays -- Video System Integration -- Network Issues -- Other Evaluation Aspects -- Estimating Performance -- Summary -- Reference
CHAPTER 9 Data Collection - Delay Subsystem -- Delay Overview -- Perimeter Barriers -- Fences -- Gates -- Chain-link Gates -- Turnstiles -- Vehicle Barriers -- Buildings -- Walls -- Floors and Roofs -- Doors -- Personnel Doors -- Attack- and Bullet-Resistant Doors -- Vehicle Doors -- Vault Doors -- Windows, Grilles, and Utility Ports -- Windows -- Grilles and Utility Ports -- Windows, Grilles, and Utility Ports Summary -- Other Barriers -- Armor -- Vaults -- Earth and Overburden -- Underground Facilities -- Airborne-Attack Barriers -- Waterborne-Attack Barriers -- Tie-downs and Restraints -- Nonlethal Weapons -- Dispensable Materials and Deployable Barriers -- General Delay Subsystem Evaluation Factors -- Estimating Performance -- Summary -- Reference -- CHAPTER 10 Data Collection - Response Subsystem -- Response Overview -- Response Strategies -- Deterrence -- Denial -- Containment -- Recovery -- Delayed Response -- Equipment -- Procedures -- People -- Immediate Response -- General Warning Alarms -- Observe-and-Report -- Dispatch of Unarmed Security Personnel -- Dispatch of Armed Security Personnel -- Response Communications -- Radio Communication System -- Radio Maintenance -- Operational Issues -- Estimating Performance -- Summary -- References -- CHAPTER 11 Analysis -- Analysis Overview -- Analysis Tools -- Analysis Process -- Adversary Sequence Diagrams and Path Analysis -- Scenario Analysis -- Estimate Neutralization -- Other Analysis -- Calculate System Effectiveness -- Upgrade Analysis -- Qualitative Analysis -- Facility Overview -- Path Analysis -- Scenario Analysis -- Upgrade Analysis -- Quantitative Analysis -- Facility Description -- Path Analysis -- Scenario Analysis -- Estimate Neutralization -- Baseline System Effectiveness -- Upgrade Analysis -- Summary -- CHAPTER 12 Reporting and Using Results -- Overview -- Reporting Results
Briefings -- Report Content and Format -- Protecting Results -- Reporting Summary -- Using the Vulnerability Assessment -- Design Stages -- Project Closeout -- Summary -- APPENDIX A Project Management Forms and Templates -- APPENDIX B Initial Briefing Template -- APPENDIX C Threat and Facility Worksheets -- APPENDIX D Data Collection Sheets -- APPENDIX E Alarm Communication and Display Subsystem Criteria -- APPENDIX F Representative Delays -- APPENDIX G Results Briefing Template -- Index
Vulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allow readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The book will address the full spectrum of a VA, including negotiating tasks with the customer, project management and planning of the VA, team membership, step-by-step details for performing the VA, data collection and analysis, important notes on how to use the VA to suggest design improvements and generate multiple design options. The text will end with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools will be introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact. - Guides the reader through the topic of physical security doing so with a unique, detailed and scientific approach - Takes the reader from beginning to end and step-by-step through a Vulnerability Assessment - Over 150 figures and tables to illustrate key concepts
Description based on publisher supplied metadata and other sources
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2020. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries
Link Print version: Garcia, Mary Lynn Vulnerability Assessment of Physical Protection Systems Oxford : Elsevier Science & Technology,c2005 9780750677882
Subject Security systems -- Evaluation
Electronic books
Alt Author Garcia, Mary Lynn
Record:   Prev Next