Skip to main content

Currently Skimming:


Pages 27-50

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 27...
... 27 Consistent with effective security planning is the need to deploy appropriate risk reduction methods to minimize or eliminate identified vulnerabilities or mitigating consequences. Chapter 3 discusses many of the tools and countermeasures that should be considered in the implementation phase of planning as a means to improve the security of critical infrastructure and facilities, information systems, and other areas.
From page 28...
... 28 Security 101: A Physical Security Primer for Transportation Agencies Less Protection Less Cost Less Effort Greater Protection Greater Cost Greater Effort Place trash receptacles as far away from the building as possible. Remove any dense vegetation that may screen covert activity.
From page 29...
... Physical Security Countermeasures 29 Source: FTA Security Design Considerations, 2004 Figure 3-2. Layers of security.
From page 30...
... 30 Security 101: A Physical Security Primer for Transportation Agencies Effective use of signs starts with creation of a sign plan. This written record provides a framework for decisionmaking about the installation, replacement, maintenance, and budgeting for the program.
From page 31...
... Physical Security Countermeasures 31 Next, prospective communications access points for deployment of emergency alert or alarm systems should be compared with estimated response capabilities, keeping in mind the potential time variation and, where applicable, the routes and locations of agency rolling stock. If additional security assets are required to make the system viable, they should be designed and planned for prior to implementation.
From page 32...
... 32 Security 101: A Physical Security Primer for Transportation Agencies should create a key control annex to their physical security plan. The newly assigned KCO should conduct a comprehensive survey of all agency physical assets needing protection to establish a baseline key control plan that can return efficiency to the program.
From page 33...
... Source: FEMA 430, Building, Site and Layout Design Guidance to Mitigate Potential Terrorist Attacks, 2007 Figure 3-4. Use of fencing as a security countermeasure with defensive layers.
From page 34...
... 34 Security 101: A Physical Security Primer for Transportation Agencies information about the vehicle and crash ratings associated with the truck striking the barriers at speeds of 30, 40, and 50 mph. Figure 3-6 shows a crash-rated fence that, according to the manufacturer, can be reinforced with an integrated cable system to meet K8 standards.
From page 35...
... Physical Security Countermeasures 35 Source: FEMA 430, Building, Site and Layout Design Guidance to Mitigate Potential Terrorist Attacks, 2007 Top: Combination of low retaining walls and low bollards. Bottom, left: Combination of oversize bollard and large planters placed on very wide sidewalk.
From page 36...
... Source: FEMA 430, Building, Site and Layout Design Guidance to Mitigate Potential Terrorist Attacks, 2007 Figure 3-9. Examples of retractable bollards and crash beams.
From page 37...
... Physical Security Countermeasures 37 security designers use capabilities such as glare projection to reduce the ability of an adversary to see inside a protected area. Protective lighting objectives include the following: • Adherence to acceptable industry standards for outdoor protective lighting levels as promulgated by the Illuminated Engineering Society of North America (IESNA)
From page 38...
... 38 Security 101: A Physical Security Primer for Transportation Agencies Agencies must budget for scheduled cleaning and replacement of luminaries. Different types of lighting systems can reduce the overall costs associated with upkeep while improving the efficiency of the lighting output, measured luminance (footcandles or lux)
From page 39...
... Physical Security Countermeasures 39 Alarm systems can be used • In place of other security countermeasures that are not viable because of safety concerns or operational requirements or • As a supplemental security measure. The main elements of an intrusion detection alarm system are the sensors, the alarm processor, the monitoring system, and the communications architecture that connects these elements.
From page 40...
... 40 Security 101: A Physical Security Primer for Transportation Agencies EXTERIOR SENSORS AREA DETECTORS AQUATICPERIMETER LINE SENSORS INGROUND SENSORS VOLUMETRIC SENSORS VIDEO SENSORS UNDERWATER OVERWATER •BALANCED MAGNETIC SWITCHES (Gate) •VIBRATION •TAUT WIRE •FIBER OPTIC •STRAIN SENSITIVE CABLE •ELECTROSTATIC FIELD •BURIED PRESSURE LINE •PORTED COAX BURIED LINE •FIBER OPTIC •GEOPHONE •MAGNETIC •ACTIVE INFRARED •MICROWAVE •PASSIVE INFRARED •PASSIVE INFRARED/ MICROWAVE •RADAR •LASER RADAR •VIDEO MOTION DETECTION •SONAR •FIBER OPTIC •RADAR •VIDEO MOTION DETECTION Source: SAVER Summary; Handbook of Intrusion Detection Sensors, 2004 http://www.dhs-saver.info Figure 3-13.
From page 41...
... Physical Security Countermeasures 41 Electronic Access Control Systems Access control systems limit or restrict the access of personnel or vehicles either into or out of a controlled zone or area. The technology used can be basic or complicated, depending on the needs and requirements of the resource or area to be protected.
From page 42...
... 42 Security 101: A Physical Security Primer for Transportation Agencies Source: SAVER Summary; Handbook of Intrusion Detection Sensors, 2004 http://www.dhs-saver.info Figure 3-15. Cipher access control barrier.
From page 43...
... Physical Security Countermeasures 43 Figure 1: Iris Diagram2 Figure 2: Iris Structure3 Figure 3: Minutiae5 Figure 4: Other Fingerprint Characteristics6 Figure 3-17. Biometric technologies including iris recognition, fingerprint identification, voice recognition and palm print identification.
From page 44...
... 44 Security 101: A Physical Security Primer for Transportation Agencies mature. Security planners should contemplate access control implementation based on lifecycle costs and multi-year capital planning.
From page 45...
... Physical Security Countermeasures 45 Order SystemCharacteristic Explanation Information Needed 1 Number of Locations Is this system for one physical location or multiple locations? List of locations 2 NetworkConnectivity If multiple locations, what kind of network connectivity exists between the sites?
From page 46...
... The term CCTV is synonymous with surveillance technology and has come to be used as a generic descriptor for video systems. Originally the term was used to differentiate between broadcast television and private video networks.
From page 47...
... Physical Security Countermeasures 47 effectiveness of video monitoring. Switchers that permit operators to select between video images, multiplexers that facilitate simultaneous viewing, and new video analytic capabilities are in use to aid operators by directing their attention to priority images (see Figure 3-20)
From page 48...
... Figures 3-23 and 3-24 illustrate the categories by focusing on image resolution requirements for successful "identification" of a suspect. The photographic images in the bottom two pictures are cropped, enlarged, and enhanced from the photos immediately above them.
From page 49...
... Physical Security Countermeasures 49 Source: APTA, The Selection of Cameras, Digital Recording Systems, Digital High Speed Train-lines and Networks for use in Transit related CCTV Systems; draft 2007 Function Screen image (size of image when viewed on a monitor without zoom) Typical applications (not limited to and for example only as specific areas will vary according to local conditions)
From page 50...
... 50 Security 101: A Physical Security Primer for Transportation Agencies Source: APTA, The Selection of Cameras, Digital Recording Systems, Digital High Speed Train-lines and Networks for use in Transit related CCTV Systems; draft 2007 (b)

Key Terms



This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.