Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $57.90
Usually ships in 1-2 business days
(Save 18%)
Other sellers (Hardcover)
  • All (2) from $57.90   
  • New (2) from $57.90   

Overview

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent “How To” for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.

* Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system.
* Builds upon well-known, widely adopted concepts prevalent among security professionals.
* Offers seasoned advice on the competitive bidding process as well as on legal issues involved in the selection of applied products.

Read More Show Less

Product Details

  • ISBN-13: 9780750678506
  • Publisher: Elsevier Science
  • Publication date: 11/21/2005
  • Edition description: New Edition
  • Pages: 312
  • Product dimensions: 6.00 (w) x 9.00 (h) x 0.90 (d)

Read an Excerpt

PHYSICAL SECURITY SYSTEMS HANDBOOK

The Design and Implementation of Electronic Security Systems


By Michael Khairallah

Elsevier Science

Copyright © 2006 Elsevier Inc.
All rights reserved.
ISBN: 978-0-08-048000-8


Excerpt

CHAPTER 1

Introduction


WHAT IS THIS BOOK ABOUT?

This book is a comprehensive guide to identifying the man-made threats to an organization, determining the vulnerabilities of the organization to those threats, specifying security products to mitigate the threats and acquiring and implementing the recommended solutions. It represents the culmination of 25 years of experience in the design, installation, and project management of security system solutions.

The techniques in this book will help the security professional conduct a physical security audit to identify ways to mitigate identified threats and then specify a new security system or system addition to improve security conditions. The book also describes methods used in evaluating the survey data, proposing the recommended systems to company management, preparing a system bid, and managing the bid process. The book concludes with a description of project implementation and how to follow up the implementation to verify proper use.

The depth of detail in the book assumes the reader is a security professional and has some experience and the technical skill necessary to create a basic security system design. The book organizes the process and provides an overall structure for best practices in specifying system components and managing the acquisition and implementation process.

The main emphasis of this book is to provide the security professional with a guide for doing the right things at the right time throughout all phases of a physical security audit. It is an aid to planning and documenting the studies necessary to establish needs, and it outlines the tasks for acquisitions and implementation of systems to deal with threats. Even the experienced professional will find this book helpful in organizing the approach to security audit projects.


WHEN IS THIS BOOK MOST USEFUL?

This book is most useful when company management has recognized the need for improved security and requires a physical security audit to identify and mitigate threats. A physical security audit is just one component of a complete Risk Assessment. A Risk Assessment includes several disciplines and examines all elements of risk to the company's operation. Some additional areas of concern that are not covered in this book are:

• Data security

• Industrial espionage

• Relationships with local law enforcement

• Security protocol evaluations

• Disaster protocol evaluations

• Personnel assessments

• Building design and reinforcement measures

• Threats from internal sources, employees and service crews

• Terrorist threats


The most important milestone in beginning the physical security audit process is company management's recognition that the company needs security improvements. The security professional must help build "institutional will" to proceed with system design and evaluation. Throughout the process, management agreement must be part of implementing the new security system to provide funding and foster acceptance of procedural changes.

This book will provide clear and meaningful guidelines for determining threats, assessing vulnerabilities, selecting system components to accomplish security goals, choosing the appropriate vendor to supply components, and implementing those components into a cohesive effective security system.


WHY IS THIS BOOK IMPORTANT TO YOU?

This is a guide to planning a security system audit to help avoid making expensive mistakes. Security system acquisition requires considerable planning of system details, coordinating vendor activity and comprehensive and adequate documentation. The security professional must clearly communicate system objectives for the implementation to be a success. In most security systems, but especially in access controls systems, an incorrect diagnosis of a problem or the failure to document those findings properly can result in costly errors. By using the techniques in this book, the security professional will avoid many of the common mistakes experienced in security system implementations.

This book will also help establish acceptance standards for getting the job done. These standards will be useful for the company and for the vendors hired to perform the work. By providing standards in all security system projects, the company will save money and the project team will save time. Standards are essential for measuring vendor performance. Without appropriate standards, performance quality is just guesswork.


WHO SHOULD USE THIS BOOK?

Security system project managers will find this book most useful when confronted by a major project for the first time. This book will be an excellent guide to developing the security audit plan and strategy, performing the audit and conducting all the steps necessary to implement the recommendations of the audit. Even if the security system project manager has years of experience, this book will be useful in organizing the necessary steps—from identification to implementation.

Security directors who are not project managers will find this book especially useful. It will provide a step-by-step process for identifying threats and vulnerabilities, designing the right system to mitigate threats and implementing the solutions.

Using this book is not a substitute for the skills of a qualified security systems' consultant. The reader may find that the level of expertise needed to conduct the required surveys may not be within their experience. In these cases, this book will serve as a guide to working with a professional security systems' expert.

A good indication that a consultant is a qualified expert is the certification of "PSP" following their name. The ASIS International Review Board grants the PSP or Physical Security Professional designation and defines a PSP as:

The Physical Security Professional (PSP) designation is evidence that an individual is "Board Certified in Physical Security." It is awarded based upon experience and passage of an examination that provides objective measure of an individual's broad-based knowledge and competency in physical security. Ongoing professional development is required in order to maintain the credential. The PSP is administered by ASIS International, the preeminent international organization for security professionals, with more than 33,000 members worldwide.


Additional information on the PSP designation can be found on the ASIS International website at www.asisonline.org. To find a qualified consultant, the reader is encouraged to contact the International Association of Professional Security Consultants (IAPSC). Their website can be found at www.iapsc.org.

Further, membership in IAPSC provides assurance of high ethical standards. The IAPSC requires a code of conduct for its members and states:

This Code of Conduct and Ethics signifies a voluntary assumption by members of the obligation of self-discipline above and beyond the requirements of the law. Thus, it notifies the public that members intend to maintain a high level of ethics and professional service, and proclaims that, in return for the faith that the public places in them, the members accept the obligation to conduct their practices in a way that will be beneficial to society.


This code of conduct is supported by these guidelines: A. General

1. Members will view and handle as confidential all information concerning the affairs of the client.

2. Members will not take personal, financial, or any other advantage of inside information gained by virtue of the consulting relationship.

3. Members will inform clients and prospective clients of any special relationship or circumstances that could be considered a conflict of interest.

4. Members will never charge more than a reasonable fee; and, whenever possible, the consultant will agree with the client in advance on the fee or basis for the fee.

5. Members will neither accept nor pay fees or commissions for client referrals.

6. Members will not accept fees, commissions or other valuable considerations from any individual or organization whose equipment, supplies or services they might or do recommend in the course of providing professional consulting services.

7. Members will only accept assignments for and render expert opinions on matters they are eminently qualified in and for.

B. Professional

1. Members will strive to advance and protect the standards of the security consulting profession as represented in this code of ethics.

2. Members recognize their responsibility to our profession to share with their colleagues the knowledge, methods and strategies they find effective in serving their clients.

3. Members will not use or reveal other consultant's proprietary data, procedures or strategies without permission unless same has been released, as such, for public (or all consultants) use.

4. Members will not accept an assignment for a client while another consultant is serving that client unless assured that any conflict is recognized by and has the consent of the client.

5. Members will not review the work of another consultant who is still engaged with the client, without such consultant's knowledge.

6. Members will strive to avoid any improprieties or the appearance of improprieties.

7. Membership in the IAPSC is forfeited upon conviction of any felony or misdemeanor involving moral turpitude.

8. Members will never misrepresent their qualifications, experience or professional standing to clients or prospective clients.

C. Forensic

1. Members' fees will never be contingent upon the outcome of a case.

2. Members, when testifying, will carefully avoid taking the position of an advocate or appearing to take such a position; for justice requires the professional expert witness to be neutral with no personal interest in the outcome of the case.

3. If, after reviewing a case, it is apparent that the expert witness cannot provide testimony or assistance helpful to the case, the consultant will make this known to the client. If he withdraws from or his services are discontinued by the case, he will not testify for the opposing side unless compelled to by subpoena.

4. The consultant will not sign written opinions or affidavits prepared by clients. Testimony or report preparation, including the preparation of oral reports, will not occur until the consultant has performed a thorough evaluation of the circumstances, evidence, scene or other pertinent materials or places as he deems necessary to render a learned opinion.

D. Enforcement

1. Upon a formal complaint issued against any member of this Association or other person indicating a violation of any section of this Code of Conduct and Ethics, the Ethics Committee will investigate the allegations and make a recommendation to the Board of Directors regarding any disciplinary action to be taken against the accused member. Discipline may range from a formal reprimand and warning to a temporary or permanent suspension from the Association upon the discretion of the Board of Directors. By knowing the steps involved in a professional security assessment and properly managed project, the company manager can work more closely with the professional to achieve superior results.


BEING A CONSULTANT

The security professional may be an employee of the company in need of a new physical security system or professional consultant. The security professional may also be an experienced security manager performing work for the first time as a consultant.

Regardless of the role the security professional, a fiduciary responsibility exists between the security professional and the company. That relationship requires that the security professional act in the best interest of the company and tempers those actions with consideration for all concerned. A good business deal is one where all parties feel that they have benefited from the transaction.

A security consultant's obligation is to help the company do business with the security marketplace. The primary mission is to identify needs, then provide physical security systems and procedures to the company that mitigate risks. Fairness and a sense of cooperation must prevail in all aspects of the project.

Remember that a security professional is a "business consultant" first and a specialist in the security industry second.


OVERVIEW OF THE SECURITY AUDIT PROCESS

It is important for all businesses to understand the risks that may affect current operations. Businesses need to understand what can threaten ongoing operations and how to mitigate those threats through protection of assets and insurance against loss. The goal is to minimize exposure to those situations that expose the business to loss.

A comprehensive Risk Analysis provides a way to better understand these risks and the steps taken to reduce and manage the risks more effectively. This approach employs a two step process; the probability of an event occurring and the likely loss should it occur.

One of the elements is an assessment of threats. These are events where systems fail or external forces attack the business system. Examples might include robbery of employees or theft. Threats are present in every system.

A second element is vulnerabilities. Vulnerabilities make a system more susceptible to attacks by a threat or make a successful attack more likely. For example, it would be more likely that a theft would occur if doors were not properly locked.
(Continues...)


Excerpted from PHYSICAL SECURITY SYSTEMS HANDBOOK by Michael Khairallah. Copyright © 2006 by Elsevier Inc.. Excerpted by permission of Elsevier Science.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Read More Show Less

Table of Contents

1 Introduction
2 The Physical Threat Assessment
3 Conducting the Vulnerability Study to Identify Physical Security Requirements
4 Creating the Preliminary System Design
5 Documenting the Preliminary System Design
6 Presenting the Solutions
7 System Acquisitions - Part 1, Technical Specifications
8 System Acquisitions - Part 2, The Business Plan
9 System Implementation
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)