Since the beginning of human
endeavour, humans have used barriers, tools and procedures to protect
themselves from attack. These practices have developed into principles over the
generations of human development and are as relevant today as they were many generations
ago.
The basic principle is that of
layering defences to protect the asset that you wish to protect. That could be your business or your family,
but what does this layering actually attempt to achieve?
What we seek to achieve is a robust series of layered security measures to achieve security-in-depth. This is the basis for all protective security, including the securing of IT systems. The strategies may change but the principle of security-in-depth will remain.
This system provides mutually supporting protective security measures that provide well defined protection of an asset or even your family. It is adaptable and can be used in many areas of security where protection is necessary. Our army has practiced this principle for most of existence under the term 'Defence-in-Depth' when used to protect defensive positions..
Although it is a very old practice, we are seeing the principle being disregarded in crime prevention strategies and security being installed to rely on one element and at times one piece of technology.
What we seek to achieve is a robust series of layered security measures to achieve security-in-depth. This is the basis for all protective security, including the securing of IT systems. The strategies may change but the principle of security-in-depth will remain.
This system provides mutually supporting protective security measures that provide well defined protection of an asset or even your family. It is adaptable and can be used in many areas of security where protection is necessary. Our army has practiced this principle for most of existence under the term 'Defence-in-Depth' when used to protect defensive positions..
Although it is a very old practice, we are seeing the principle being disregarded in crime prevention strategies and security being installed to rely on one element and at times one piece of technology.
When we look at many some crime prevention risk
mitigation strategies being approved by State and local government agencies, it is obvious that
these decisions are not being based on solid principles of defence, or security-in-depth.
What are these Principles? They are to Deter, Detect,
Delay and Respond.
Deter
The deter perimeter is the
farthest one from the location of the assets and is often a mix of Legislative
controls (laws), physical infrastructure such as fences and lighting and
policies and procedures that are posted as signage along fence-lines.
The security objective on this
perimeter is to deter the criminal from even attempting a breach of the protective system. Signage, laws and regulations along with business policies and procedures all contribute to deterrence.
Deterrence is a psychological
battle, and when security wins, the criminal activity never starts.
Applying surveillance
technology along the perimeter of large
enclosures such as industrial sites, will make it obvious to all approaching
the perimeter that they are under surveillance.
Signs saying, “no trespassing”
or “area under surveillance” also aid in communicating a deterrent message to
unauthorised persons.
Deterrence also includes routine foot or mobile patrols of the area by police or security. it reinforces ownership and crime awareness under the CPTED Principles and increases the risk of detection. The most common form of deterrence for industrial sites is that of a guard dog, however, if overcome, the property will be exposed to criminal attack.
This layer will deter the law-abiding
person and most opportunist offenders.
Detect
Important objectives are the
timely notification to security personnel, and having the ability to digitally
or optically zoom into the area where intrusion was detected to clearly
identify what is occurring and who is involved, with the ability to clearly
identify those involved.
The use of external and
internal motion detection technology enhances detection, providing a method of
tracking an intruders progress. When combined with CCTV, these become an excellent
tool for detection and assists response units by providing situational
awareness.
Having patrolling guards, who
detect unlawful entry also fulfils this principle and allows for more rapid response,
when the event is reported to a control centre.
Delay
The delay layer’s
objective is to slow down an active intrusion enough to force the intruder to
give up, or allow the security team to respond.
Use of heavy duty locking
hardware and security padlocks on gates will delay an offender, who may be
attempting to enter your property and may cause them to either change their attack method,
scale the fence or gate or withdraw from the area to move to a softer target. We would prefer that they move on.
Often, interior locking doors
or other physical barriers are used to slow down the intrusion. Surveillance
cameras can be used inside the delay perimeter to provide situational awareness
and measure the effectiveness of the delay countermeasures.
The use of attack resistant laminated polycarbonate glazing or installing steel mesh security
screens protecting glazed areas of the building perimeter structure will
provide delay and, if supported by a detector, can give alarm to an attempted
entry via the particular point of attack, providing responders with necessary
information to quickly attend and challenge the offenders.
Insufficient delay will negate
the effectiveness of other layers of security. Time is needed for a response
and delaying is the tool to achieve the necessary time.
Respond
Surveillance is used at this perimeter to record the apprehension and determine the effectiveness of the response.
This final perimeter often includes the involvement of law enforcement and typically overlaps the other perimeters.
Some final comments
The general rule is that the
farther away from a secured building the more expensive are the security
measures. This holds true for cameras, sensors and access control systems.
Designing outdoor systems
requires detailed upfront planning because of the wide range of operating
conditions to which the security systems will be exposed. For cameras, lighting
and weather conditions are the biggest problems the system will have to
overcome and requires expert knowledge of surveillance systems and system
capabilities to select the right solution.
Holistic design processes that
combine both indoor and outdoor perimeters will provide the most effective
physical security systems.
Look at your business or
home. Where are your vulnerabilities?
- How can you modify or harden your building perimeter to best apply the principles of physical security and reduce your vulnerabilities?
- What technology can I afford to provide mutually supporting defence of your property?
- How effective is response to alarms in your area? The cost of implementing sound physical security may be negated by poor response.
Know your systems well and test your
systems to identify gaps or system failures.
A DVR hard drive in tropical areas, subject to severe electrical storms can be easily damaged during wet season tropical storms and, without testing, may not be identified as an issue for
some time, leaving your business vulnerable to not having video evidence, when
needed.
Security-in-depth and the principles of physical security rely on mutually supporting measures that complement each other. Reliance on one system to protect your property is gambling with your security and safety. Keep this in mind when people are advising you of how you can improve the security of your business or family home.
Security-in-depth and the principles of physical security rely on mutually supporting measures that complement each other. Reliance on one system to protect your property is gambling with your security and safety. Keep this in mind when people are advising you of how you can improve the security of your business or family home.