Skip to main content

Currently Skimming:


Pages 54-87

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 54...
... 54 C H A P T E R 3 Physical Countermeasures The fundamental principle for determining what countermeasures to use in any given situation is that utility should control. Transportation agencies must examine the threats against them and identify the most useful means to reduce the vulnerabilities associated with those threats to acceptable levels.
From page 55...
... Security Countermeasures 55 Source: DHS 2007. Figure 3-1.
From page 56...
... 56 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies Maintenance of a good security sign program also helps create a working environment in which security is perceived to be taken seriously. Employees become aware of security requirements through well-placed signs that display the status of restricted or controlled areas, or signs that limit or prohibit certain activities.
From page 57...
... Source: TRB 2018.
From page 58...
... 58 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies Source: FTA 2004b. Figure 3-2.
From page 59...
... Security Countermeasures 59 Emergency Telephones, Duress Alarms, and Assistance Stations Historically, emergency alert or alarm systems have been hardwired communications systems linked to security control centers. Telephone boxes, panic alarm buttons, and intercom systems were typically linked to central stations where dispatchers or monitoring personnel answered emergency calls and sent response personnel to the location to provide assistance.
From page 60...
... 60 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies professional for electromechanical or electromagnetic locks before spending security dollars on new hardware or upgrades. Because keys and locks are frequently the only countermeasure deployed to protect assets and infrastructure, managing key access is fundamental to effective control.
From page 61...
... Security Countermeasures 61 designers the opportunity to use an array of security countermeasures to defend the organization's assets, including line-of-sight observation, video surveillance, motion detection, or other intrusion detection technologies. It is also at this point that the second main issue, fencing material, can be considered.
From page 62...
... 62 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies Figure 3-6 depicts a crash-rated fence that can be reinforced with an integrated cable system to meet K8 standards, according to the manufacturer. Figure 3-7 shows a schematic example of a cable barrier deployable as a means of fencing reinforcement.
From page 63...
... Security Countermeasures 63 Source: DOD 1999. Figure 3-7.
From page 64...
... 64 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies Active barriers are movable or retractable to allow passage when authorized. These can include retractable bollards, crash beams, rotating wedge systems, or rising barricades (Figures 3-9, 3-10, and 3-11)
From page 65...
... Security Countermeasures 65 • Illumination of all exterior points within the perimeter of the protected area, including walkways, vehicle entranceways, fence lines, and critical structures or assets; • Non-transgressing illumination of approach areas to the perimeter line; • Deterrence of aggressor attempts at entry to protected areas; • Support for other security countermeasures such as video surveillance cameras, motion activated sensors, or security forces; and • Resistance to tampering, vandalism, neutralization, or defeat. Similar to other measures, protective lighting security planning requires thoughtful and careful study to ensure maximum program benefits.
From page 66...
... 66 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies applicability of agency lighting configurations should be factored into operational planning and decision-making. Planners should also determine the prospects of upgrading the existing lighting system.
From page 67...
... Security Countermeasures 67 Their basic physical security application, however, relates principally to intrusion detection. Alarm functions are also applicable to chemical, biological, and radiological sensors and are more complex depending on the technology associated with the types of sensors.
From page 68...
... 68 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies Source: SAVER 2004. Figure 3-13.
From page 69...
... Security Countermeasures 69 include concerns about radio and electrical interference, sound levels, weather and climate, or other environmental factors. It is recommended that the agency seek professional security assistance in planning for intrusion detection alarm systems.
From page 70...
... 70 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies There are four main elements of an access control system: (1) access control barriers, (2)
From page 71...
... Security Countermeasures 71 There are many types of access control system barriers and perhaps even more identification methods. (See also sections on keys and locks and protective barriers.)
From page 72...
... 72 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies Access control systems can also be quite expensive, and costs are easy to underestimate. Expenditures associated with system infrastructure can quickly climb as the organization's needs grow and mature.
From page 73...
... Security Countermeasures 73 Source: TRB 2003. Table 3-5.
From page 74...
... 74 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies Source: SAVER 2005. Figure 3-18.
From page 75...
... Security Countermeasures 75 or train cars. Recording devices and backbone architecture for support of CCTV are discussed in detail.
From page 76...
... 76 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies Figure 3-23 provides operational context and applicability for each category. Figure 3-24 provides a pictorial differentiation between the categories by focusing on image resolution requirements for successful "identification" of a suspect.
From page 77...
... Security Countermeasures 77 Some countermeasure resources provide comprehensive guidance and recommendations for a broad range of risks. For example, Critical Controls for Effective Cyber Defense (Information Systems Audit and Control Association 2013)
From page 78...
... 78 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies Source: APTA 2007, draft. Figure 3-24.
From page 79...
... Security Countermeasures 79 • Data Security and Information Protection; and • Protective Technology. Other categories include: • Cyber Hygiene; • Boundary Defense and Network Separation; and • Configuration Management.
From page 80...
... 80 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies – Following Bring Your Own Device (BYOD) and mobile device management (MDM)
From page 81...
... Security Countermeasures 81 employees, contractors, and often, customers. Agencies may have credit card information, and a few, those with responsibility for the state Department of Motor Vehicles, have extensive customer personal information.
From page 82...
... 82 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies For SCADA and control system networks, the connections between remote field devices, e.g., remote terminal units (RTU) or programmable logic controllers (PLC)
From page 83...
... Security Countermeasures 83 Source: Fok 2015. Figure 3-26.
From page 84...
... 84 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies Bring-Your-Own-Device (BYOD) –Recommended Security Practices Replicating traditional cybersecurity policies to address mobile devices and other employee- or contractor-owned consumer devices -- known as Bring Your Own Device (BYOD)
From page 85...
... Security Countermeasures 85 • Address app compatibility issues (e.g., accidental sharing of sensitive information due to differences in information display between platforms)
From page 86...
... 86 Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies established. Each component received gap and priority ratings, and on-site and off-site SAL ratings.
From page 87...
... Security Countermeasures 87 Source: APTA, DHS/TSA, & MARTA 2013. ICS Administrative-level Access Control results identified gaps and were matched with APTA controls.

Key Terms



This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.