SlideShare a Scribd company logo
1 of 101
Physical Security
Domain 10 CISSP Official CBK 3rd Edition
Pages 1256-1362

Jem Jensen

Tim Jensen
StaridLabs
Physical Security Program: Purpose
• Designed to prevent the interruption of operations and provide for
the security of information, assets, and personnel.
• Risks include:
•
•
•
•
•

Violence and crime
International Terrorism
Environmental Damage
Energy Disruptions
Pandemics
The Security Survey
• The first step is to determine the protection objectives:
• Threat Definition
• Target Identification
• Facility Characteristics.

• Goal is to mitigate justified risks and not
waste money on ineffective security.
Target Identification
• The first step is to identify what assets need to be protected.
• Set a prioritization for assets.
• Assets can be personnel, property, equipment, or information.
• Identify the impact and consequences of an asset loss.
Facility Characteristics
• Several security professionals should be included in a facility
walkthrough. The more eyes and the more experience the better.
• Overnight security guards get bored and wander around all night, as
such they are usually the best source for identifying weaknesses.
American Institute of Architects
List of Key Security Concerns
• Facility security control during and after hours
of operation
• Personnel and contract security policies and
procedures
• Personnel screening
• Site and building access control
• Video surveillance, assessment, and archiving.
• Natural surveillance opportunities.
• Protocols for responding to internal and
external security incidents.
• Degree of integration of security and other
building systems.
• Shipping and receiving security

•
•
•
•
•
•
•
•
•
•

Property Identification and tracking
Proprietary information security
Computer network security
Workplace violence prevention
Mail screening operations, procedures, and
recommendations
Parking lot and site security
Data center security
Communications security
Executive protection
Business continuity planning and evacuation
procedures
Vulnerability Assessment
• The assessment should be done within the context of the defined
threats and the value of the organization’s assets.
• Each risk (front entrance, receptionist, etc) should have it’s own
vulnerability level. (Very High, High, Medium High, Medium….)
• The cost of your protective measures shouldn’t be more expensive
than the assets your protecting.*
• Caveats*
• Laws/Regulations
• Compliance
• Single Loss vs Annul Rate of Occurrence (SLE/ARO)
Site Planning
• Again, the goal of this whole process is the protection of life, property, and
operations.
• Countermeasures should be appropriate and effective to reduce the risk.
• Must balance employee convenience and a secure facility.
• Security shouldn’t be sacrificed for convenience, but a lot can be done to make
the user’s life easier.
• Security is always easier to setup from the beginning. Employees resist change
and push back every time things are changed. As such security should be done
right from the beginning, and only updated when necessary, not on a whim.
• The movement of people and materials through a facility is determined by the
design for access, delivery, and parking systems.
• Systems should be designed to maximize efficiency while minimizing conflicts
between entry and exit of vehicles and pedestrians.
Roadway Design
• Normal street design is to minimize travel time and maximize safety.
• For security, roadways can be designed to minimize vehicle velocity
and to use the roadway as a protective measure.
• Straight line approaches should not be used. This allows a vehicle the
opportunity to gather the speed necessary to ram and penetrate the
buildings.
• Approaches should be parallel to the perimeter with a barrier between the
road and building: earthen berms, high curbs, trees, etc.
• Existing streets can be retrofitted with barriers, bollards, swing gates, etc.
• Measures should be applied to keep vehicles from departing the roadway and
bypassing the countermeasures.
Glasgow Airport
Car drives into Sears
Carbomb in Bagdad
Remember…build a better defense and
the universe builds a better idiot…
Defenses
Less effective vehicle deterrents
Crime Prevention through Environmental
Design (CPTED)
• Provides direction to solve challenges of crime with organization
(people), mechanical (technology and hardware), and natural design
(architecture and circulation flow).
• Protection can be provided through aesthetically pleasing features
such as landforms, water, and vegetation.
• Thick vegetation should not be directly adjacent to a building and
thick ground cover over 4 inches tall could be a disadvantage.
• Facility should be designed with a single point of entrance for
guests/untrusted visitors. A receptionist should be available at this
entrance.
Windows
• Windows are vulnerable and common entry points.
• Home windows shatter and cause hazardous conditions. (Note on window
safety)
• Buildings should be designed so that in the event of an explosion shattered
glass is mitigated. (Bushes, walls, special types of glass, secure door frame,
secure anchoring of frame to structure)
• Windows should ideally not be directly adjacent to doors. This prevents a
broken window allowing access to the door lock from the inside.
• Laminated glass, grills, screens, mesh etc can protect windows.
• Windows on ground level should not have the ability to be opened and
should have bars and alarm systems.
Types of Glass
• Annealed: Standard Glass
• Tempered Glass: Impact Resistant
• Wired glass: Wire mess imbedded in glass offering limited protection
• Laminated glass: Very shatter resistant. Still breakable, but shards are
held in place.
(video removed)
(video removed)
(video removed)
Glass Break Sensors
• Sensors can be installed to detect glass breaking.
• Types:
• Acoustic (Listens for sound wave matching frequency of broken glass)
• Crap

• Shock (Identifies shock wave when glass is broken)
• Also crap

• Dual mode (Acoustic and Shock required for alarm)
• Less crap
Garages
• Primary risks: Crime and vehicles hitting pedestrians
• Use signs to direct traffic and CCTV cameras to monitor for incidents.
• Bright lights reduce both risks
• 10-12 foot candle over parked cars
• 15-20 foot candles in walking and driving aisles.

• Exterior lights should be 12 feet above ground and should point
downward.
• Parking structure should be white to reflect light.
• Elevators and walkways should empty into the lobby, not into the
secure areas.
Location Threats
Natural Disasters
• Hurricane winds can exceed 155 MPH
• Tornado winds can reach 300 MPH
• Earthquakes shake things
• Floods…flood things…
Man-made threats
• FIRE! FIRE!
• Fires cause damage due to heat, smoke, and water from suppression
systems.
• Fire systems should be protection water systems should be protected
from single points of failure.
• Incoming water line should be encased, buried, or located 50 feet
from high risk areas.
Fire Extinguisher Classes
Utility Concerns:
Electrical
• Electric panels, conduits, and switchgear should be distributed
throughout the building to avoid single points of failure.
• Emergency generators should be located away from loading docks,
entrances, and parking areas. Preferably on a roof, protected level, or
protected interior area.
• Generator fuel storage should be located away form loading docks,
entrances, and parking areas. Access should be restricted and
protected including locking caps and seals.
Communications
• At least two phone lines on separate systems is good in case of
emergency.
• If using VOIP, run at least 1 telephone landline to the security guard desk as a
backup.

• Cell phones are relatively cheap and should be provided to critical
personnel.
• Maintain a phone list of critical employees.
• Setup a base radio and add a portable radio to each floor for
emergency internal communications.
Utilities
• When possible protect utilities by placing them underground
• Protect drinking water from contamination
• Don’t provide signage saying “Critical power area” or “Single point of
failure for all of our power, water, and heat. Don’t hit with car!”
• Locate fuel storage tanks and operations buildings down slope and at
least 100 feet from buildings.
• Utility systems should be at least 50 feet from loading docks, front
entrances, and parking areas.
Primary Purpose of Security!
To protect personnel(people),assets(buildings, items), and
information(10010101011101) from death, destruction, or harm.
Workers comp costs
Insurance rate per $100 of payroll
Perimeter security
• Perimeter security is made up of
several zones. The more zones,
the more defense-in-depth and
the better your security.
• Each zone can have different
controls.
• Security controls should be added
with care, using risk, vulnerability,
and threat assessment to balance
security and risk.
Physical Security elements
(Dodge, dip, dive, duck, and dodge)
• Deter

• Visible security will make adversaries reconsider. If you’re the secure bank with a sniper on the
roof and a turret mounted machine gun operated by an annoyed robot, and the bank 2 blocks
over (out of sniper sight) has an electric alarm from Radioshack and you both have equal assets
that can be stolen…guess who’s going to be chosen.

• Detect

• Detection devices allow prompt notification that a break in has occurred. These can be cameras,
motion sensors, infrared sensors, glass sensors, etc.

• Delay

• This is the key to physical security. Your protections and detection components are attempting to
alert and delay adversaries so long as is necessary for police or security to arrive. Glass windows
only need to last 15 minutes of pounding if a guard walks by every 15 minutes. Even that’s overkill
since the guard would be able to hear several minutes before and after while he’s in the vicinity. A
safe only has to last long enough for a response, etc.

• Respond

• A response force must be told that an unauthorized entry has been attempted. Police, security,
mercenaries, the sniper, etc.
Critical components to protect
•
•
•
•
•
•
•
•
•
•

Emergency generator: includes fuel systems, water supply, sprinklers, etc.
Fuel storage
Telephone and switchgear
Fire pumps
Building Control Centers
UPS power supplies
HVAC systems
Elevator machinery
Elevator, stair, and utility shafts
Emergency power feeders.
Good fences make good neighbors
• If using a perimeter fence, here’s the recommendations:
•
•
•
•
•
•
•
•

Standard is 6 foot high fence with 2 inch mesh squares.
9 gauge vinyl or galvanized metal
Posts should be every feet and anchored into cement
Barbed wire angled out from the top of the fence at a 45 degree angle away from the
protected area.
Fence + barbed wire = 7 foot tall.
Base of fence wire should have a post so fence can’t be pushed or crawled under.
For high security, add a double fence with rolls of barbed wire between the fences.
Fences are psychological deterrents and boundary markers and are easily
penetrated.
Gates
• Gates control access to vehicles and people entering/exiting the
facility.
• The higher security of the controlled area, the fewer gates should
exist.
• One is the optimal number for security, but not very practical with
larger facilities.
• Each gate requires authentication resources:
• Automated system (cards, keycodes, etc)
• Human guards
Walls
• Walls are more expensive than fences but offer a softer view.
• Effective walls should be 7 feet high with 3 or 4 strands of barbed
wire on top.
• The disadvantage of walls is view obstruction.
Perimeter Intrusion Detection
Infrared Sensors
• Passive Infrared sensors are designed for human body detection.
• Measures changes in heat in an area.

• Active Infrared sensors send an IR signal to a receiver. If the signal is
interrupted then an alarm triggers.
• Laser tripwire basically.
Microwave Sensors
• Send a controlled microwave pattern into protected area. Baseline is
established and any variance is reported as an alarm.
• Passes through concrete and steel and should be not be pointed
adjacent to a roadway or adjacent buildings or false posivites will
occur.
• Bistatic
• Uses separate devices for sensor and receiver. Sends microwave emission
between sensor and receiver and looks for variance.

• Monostatic
• Has both sensor and receiver in the same unit. Generates a well controlled
beam that can be adjusted to monitor a specific region.
Left to right:
Passive, bistatic, multistatic(Radar)
Off Topic Tim:
Through Wall Imaging Systems
Coaxial Strain-Sensitive Cable
• Coaxial cable is woven through a fence. The cable transmits an
electric field. If someone tries climbing or cutting the fence, the field
fluctuates and is detected in the cable. When this occurs an alarm
goes off.
• Very tunable, susceptible to weather and climate.
• Some are susceptible to EMI and RFI
Video Content Analysis and Motion Path
Analysis
• CCTV cameras can be piped to computers for software analysis. The
software can identify pixel changes and filter out known events to
identify suspicious events and raise alarms.
Lighting
• Lighting deters intruders.
• It also makes it easier to see.
• Ideally lighting will allow security and employees to notice individuals
at night at a distance of 75 feet or more. They should be able to
identify a human face at 33 feet.
• Ideally place lighting higher to allow it to disperse naturally and
produce a better aesthetic.
Types of Lighting
• Fluorescent Lights
• Highly efficient and cost effective.
• Temperature sensitive. Not effective for outdoor lighting.

• Mercury Vapor Lights
•
•
•
•

Preferred security light. Disperses strong white-bluish light.
Extended lamp life.
Take time to come to full light.
Common at stadiums.

• Sodium Vapor Light
• Soft yellow light.
• More efficient than mercury Vapor.
• Used in foggy conditions.

• Quartz Lamps
•
•
•
•

Very bright white light
Immediately on
High wattage – 1500-2000 watts.
Used on perimeters and troublesome areas for high visability and day light levels of light.
Infrared Lighting
• Most black and white CCTV cameras can see Infrared (IR)
• Infrared illuminators can be setup in areas
to enhance camera visibility.
Access Control
Badge Systems
• Card Types:

• Magnetic Stripe
•
•
•
•

Old technology
Can be physically damaged by use
Data can be affected by magnetic fields
Easily duplicated

• Proximity Card (Prox Cards)

• Use embedded antenna wires connected to a chip within the card.
• Chip is encoded with unique card identification.
• Read distance varies by manufacturer and installation.

• Smart Cards

• Credential cards with a microchip embedded in them.
• Can store access transactions, licenses held by individuals, qualifications, safety training,
security access levels, and biometric templates.
• Card can double as an access card for doors and be used as an authenticator for a computer.
Additional Security measures
• Along with a magstripe, prox, or smart card you can add additional
measures to an authentication transaction:
• PIN in keypad
• Biometric reader
Fun with access Control Systems (ACS)
• When new users are enrolled, they are stored to a central
authentication repository.
• This repository is mirrored to all readers on a consistent bases.
• If the reader looses access to the central repository, it’s still able to
authenticate known users, just not new additions.
More fun with ACS systems…
• Many prox and smart cards have “slots”. These slots hold things such
as PKI certificates or biometric data.
• Biometric data such as your thumb print.
• So in the event the proxy reader can’t communicate with the central
computer, it can still authenticate you based on the card prox number
and the thumb print scan on the badge.
CCTV Cameras
Purposes
• Surveillance
• Viewer is able to view multiple locations from a centralized area.

• Assessment
• Viewer is able to assess the situation from a safe distance before choosing an
appropriate action.

• Deterrence
• May deter unsophisticated burglars, vandals, and intruders

• Evidentiary Archives
• Archived images/video may be helpful for identification and prosecution of
trespassers, vandals, and intruders.
Camera specs
• Color cameras provide more details like color of clothes or color of
car.
• Black and white cameras are better in low light conditions.
• Cameras must have auto-white balance to adjust to changing color
temperatures of daylight and artificial light.
• Color cameras require more illumination levels.
• High quality color cameras work down to 1.5 foot-candle (fc)
illumination. Black and white work to .5 fc
Outdoor cameras
•
•
•
•
•
•
•
•
•

Outdoor cameras are more expensive than indoor.
Lighting changes depending on time of day and weather.
Shrubs, trees, and vegetation can obstruct views.
In cold weather, a heater blower should be added to the camera housing.
Auto-iris lenses should be used since they automatically adjust to light. Strong
sunlight can damage a camera without this feature.
Set the focus in low light with an auto-iris. The focus will stay with more light, but
not if reversed.
“Neutral density (ND)” filters can be added to reduce lighting without changing
the color of the image.
Try to avoid direct sunlight in an image.
Try to avoid sky view in the camera, this will impair the contrast.
Mounts
• Fixed position Camera
•
•
•
•
•

Cannot rotate or pan.
Good for motion detection.
Lower cost
Allows for “pre-alarm” where you can view images from before an alarm.
Unable to follow an dynamic event.

• Pan/Tilt/Zoom (PTZ) Cameras

• Cameras allow rotation, panning, tilting, and zooming.
• Due to extra electronics these usually cost 4 times more than a standard camera.
• Not suited for pre-alarm assessment since the alarm area can change at all times.

• Dome Cameras

• Cheaper than PTZ
• Hardened plastic lower dome, usually smoke colored to conceal camera.
• Better protected in harsh conditions
IP Cameras
• IP cameras capture digital video.
• The camera is connected to a LAN network and video is sent over the
network.
• Least secure system.
• Cost more than CCTV cameras.
• Not normally suitable for high-risk projects
Security Guards
• Deter unauthorized entry into a facility
• Response force to alarm activations
• Guards are required to conduct foot patrols of building interiors,
exteriors, and parking areas.
• Some guards will be stationary at entrances or security offices.
• Required to respond to fire, security, and medical emergencies. And
to renter assistance when needed.
• Must be able to submit written and verbal reports regarding
significant events.
Security Guard Affiliations
• Proprietary (Company Employees)
•
•
•
•
•
•

Increased quality of personnel
Control of security program
Employee loyalty
Prestige for both employee and company
Disadvantage: cost, administration, staffing, impartiality, expertise
Largest disadvantage is time to create an effective security program.

• Contract
•
•
•
•
•

Easily adapts to staffing levels
Total cost is rolled into single hourly billable rate: salary, insurance, admin cost, uniforms, benefits.
Contract security is generally impartial.
Guards are easy to replace.
Contract guards usually cost less than proprietary since they’re just a head.

• Hybrid

• It’s possible to use some proprietary and some contract security to provide better control over your security
program while making the program cost effective.
Alarm Monitoring
• For secure facilities, generally two guards are on at all times, 24/7.

• Guard 1 is stationed in a security console center and monitors cameras, intrusion systems,
and fire systems.
• Guard 2 does walkthroughs and assigned tasks.

• Many organizations use UL 1981 Standard for high security facilities to designate
staffing levels.
• Requires staffing to be such that all alarm signals can be acknowledged and appropriate
dispatch and verification action can be initiated not more than a defined period after the
monitoring facility receiver acknowledges.

• The Security Control Center should be located on the main floor or the basement
as long as the area is not below ground level (flood protection)
• Entry must be controlled and only authorized personnel allowed in.

• A sign in sheet should be hung up to document any non-authorized personnel being escorted in (police,
temporary staff, executives, etc)

• Must have primary and secondary power sources. Secondary power should last for at least 24
hours.
Visitor Access
• Visitors should be required to sign in and sign out, and document
their purpose of visit.
• A visitor badge should be given to identify them as a non-employee.
• This badge should not be an access card
• The badge should state if they require an escort or not. If an escort is
required, the badge should have the name of the escort to make that person
personally responsible.

• Some visitor systems can read government issued ID’s by swiping
them and identify if the ID is properly formatted or is falsified. The
data is populated into a database as a record.
Doors (Again)
• Door assemblies include the door, its frame, and the anchorage to the
building.
• Exterior doors should be designed to fit snugly in the doorframe,
preventing gaps.
• Perimeter doors should be hollow steel doors or steel clad doors with steel
frames.
• Latch and frame anchor should match the strength of the door and frame.
• Hinges should be on the interior of restricted areas.
• Doors housing sensitive areas should have an automatic door closing
device.
Why Hinges should be inside….

http://www.firerescue1.com/fire-products/tools/articles/1284289-step-by-step-forcing-an-outward-opening-metal-door/
Electronic Locks
• Actuates the door bolt
• Some retract the lock without user intervention
• Some offer request-to-exit switches
• Expensive
• Often requires new door for retrofit
• Requires special door hinge to accommodate wiring harness

• Can be configured in fail-safe or fail-secure modes.
Electric Strikes
• Strike is removed (vs bolt being removed)
• Can be configured in fail-safe or fail-secure modes.
• Unrestricted exit access is allowed.
• Can easily be retrofitted to old doors.
Magnetic Locks
• Easy retrofit
• Mounted on door and doorframe
• Continuous electric current is provided to hold the door closed.
• Locks are fail-safe (fail open) on power loss.
• US Life safety Codes require magnetic lock doors have a manual
override device and an automated senor or Request To Exit device.
• Locks are controlled by a card reader.
Mag Locks
Anti-Passback
• Requires user to badge in and out when entering and leaving.
• Easy for accountability
• Some systems only allow single entry. To enter again the user must
have left. This stops people from dropping badges out windows or
cloning them to get multiple people inside.
Turnstiles
• Prevents piggybacking or tailgating
• Assists guards in verifying that all
users badge in individually
Mantraps
Real Mantraps
• Room where you must enter, allow the door to close behind you, and
then enter another door which will allow unlock only once you are
locked in the room.
• This allows employees to know if someone is piggybacking.
• A footstep detecting floor can be added to identify the amount of
people in the room.
Safes
• Last line of defense.
• You should have spent more on guards, doors, and sensors.
• Different categories.
• Tool Resist
• Rating of TL-15 means it’s tool resistant for 15 minutes.
• To be TL-15 it must weight at least 750 pounds or have anchors.
• Have a metal body that is solid or fabricated of at least 1 inch thick with tensile strength
of 50,000 PSI and is fastened to the floor with ÂĽ inch steel.
• No hole on the safe can be larger than ¼ inch when closed.
• Must have a relocking device if the lock is destroyed.
Vault
• Different Categories:
•
•
•
•

Class M – ¼ hour
Class 1 – ½ hour
Class 2 – 1 hour
Class 3 – 2 hour
Biometrics
• Measure biological characteristics
• Fingerprints, hand geometry, voice print, iris pattern, etc

• Common failures
• False acceptance (Type I error) – erroneously allows access by confusing one
user with another or falsely recognizing an imposter
• False rejection (Type II error) – fails to recognize a legitimate user

• Most biometrics can be tuned to adjust the false acceptance rate
(FAR) and false rejection rate (FRR)
• The spot where FAR and FRR meet is called the Crossover Error Rate (CER)
• CER can be used to compare accuracy between different devices
Biometrics
Biometrics
• Fingerprint
• Compares pattern on fingers to a stored template
• Some require multiple fingers for either:
• More accuracy – harder to forge multiple fingerprints
• More flexibility – injury to one finger doesn’t bar access

• Modern scanners detect temperature and pulse

• Facial image
• Compates facial features to stored image
• Eye width, mouth width, nose height – general proportions
Biometrics
• Hand geometry
•
•
•
•

Uses distance between knuckle joints, finger lengths
Generally faster than other biometrics
Reasonably accurate
Higher false acceptance rates

• Voice recognition
• Less expensive
• Require isolation from background noise
• Often paired with another access check like a PIN
Biometrics
• Iris patterns
• Iris is less susceptible to theft or injury than fingers
• Slower – typically about 2 seconds per check
• Some people don’t like having their eyes scanned

• Retina scanning
•
•
•
•
•

Scans blood vessels at the back of the eye
Very high security but lots of hurdles to implementing
Slow - Typically 10 seconds per check
Intrusive – have to take off glasses, hold very still
Some people think it will damage their eyes
Biometrics
• Signature dynamics
• Compares stored signature style
• Speed of writing, direction, as well as finished signature
• Easy for signers – don’t need to learn anything new

• Vascular patterns
• Maps veins in hands or fingers
• Difficult to forge
• Contact-less – hygiene benefits
Biometrics
• Keystroke dynamics
• Analyses the way a person types
• Keystroke rhythm template
• Dwell time – how long the key is pressed
• Flight time – time between key presses
Communications and Server Rooms
• Lightning protection
• Ground Potential Rise (GPR)
• Lightning strike to a grounding system
• Causes surge that can damage equipment, personnel

• Equipment damage may not manifest itself immediately
• Mean time before failure (MTBF) – average life expectancy of equipment
• Latent damage – shortens MTBF

• Avoidance
• Can use fiber instead to avoid the issue
• Or isolate the circuits using optical isolators or isolation transformers
• Mounted in a non-conducting cabinet
• Called a High voltage interface (HVI)
Communications and Server Rooms
• Server room
• No windows
• Only one controlled entry
• Physical access to a system = game over
• So don’t let it happen!

• Metal conduits for cabling leading from/to (ideally everywhere)
Communications and Server Rooms
• Rack security

… no.
Communications and Server Rooms
• Rack security
• Don’t stop at access control for the server room – lock server racks
• Doubtful that everyone with server room access needs access to every rack
• Do electricians need to get into the racks? Probably not

• Manageable rack locks
• Can be remotely configures for more advanced access control than classic keys
• Only allow unlocking during certain times or day
• Require manager approval

• Monitor temperature, power consumption
Work Area Security
• Server rooms, closets probably not the best place to put workspaces
• High security personnel behind more secured areas
• Outside of secured rooms
• Security containers – locking cabinets
• Clean desk approach – clean/lock everything up at the end of the day

• Maintain strong password protection on workstations
• Point screens away from windows
• Use privacy filters or screen protectors
• Shredding policy to destroy paper copies of sensitive information
Restricted Work Areas
• Sensitive Compartmented Information Facility (SCIF)
•
•
•
•
•
•
•
•
•

Prevent & detect visual, acoustic, technical, physical access
3 layers of 5/8 inch drywall, true floor to true ceiling
One door with X-09 combination lock
Door frame affixed to surrounding wall & strong enough to prevent distortion
Automatic door closer
Door alarms
Noisemaking device over doors, pointed at windows
HVAC requirements restricting size or requiring bars on ducts
Intrusion detection that response force can respond to within 15 minutes
Utilities and Power
• UPS – battery backup for short term power outages
• Generator
• Activate automatically in power outage
• Typically diesel fueled

• HVAC
• Heating, ventilation, air conditioning
• Keeps system temperature in range to avoid damage or outages
Fire Detection
• Detectors – sound alarm to give people a chance to escape
• Types
• Smoke
• Categories
• Photoelectric
• Physical process (ionization)

• Flame
• UV

• Heat
• Sudden temperature changes
• High temps
Fire Suppression
• Water
•
•
•
•

Wet system – filled with water that sprays until water supply is shut off
Dry system – valve fills system with water when triggered
Pre-action system – water held back until detectors are activated
Deluge system – like pre-action but sprinkler heads are left open

• Gas
• Halon – outdated, leaves residue, can injure personnel
• Aero-K
• FM-200
The End!

More Related Content

What's hot

6 Physical Security
6 Physical Security6 Physical Security
6 Physical SecurityAlfred Ouyang
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseDesmond Devendran
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security PresentationWajahat Rajab
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsKarthikeyan Dhayalan
 
8 Access Control
8 Access Control8 Access Control
8 Access ControlAlfred Ouyang
 
Physical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItPhysical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItTerra Verde
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Chinatu Uzuegbu
 
Code of practice for physical security systems in banks
Code of practice for physical security systems in banksCode of practice for physical security systems in banks
Code of practice for physical security systems in banksSamer Al Basha
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control FundamentalsInformation Technology
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical securityKarthikeyan Dhayalan
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and TrainingPriyank Hada
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset SecuritySam Bowne
 
4 Operations Security
4 Operations Security4 Operations Security
4 Operations SecurityAlfred Ouyang
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentAdetula Bunmi
 
Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5sabtolinux
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Controlidingolay
 

What's hot (20)

6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Physical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItPhysical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs It
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Code of practice for physical security systems in banks
Code of practice for physical security systems in banksCode of practice for physical security systems in banks
Code of practice for physical security systems in banks
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and Training
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
 
4 Operations Security
4 Operations Security4 Operations Security
4 Operations Security
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
 

Viewers also liked

Access Control - Week 4
Access Control - Week 4Access Control - Week 4
Access Control - Week 4jemtallon
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3jemtallon
 
CISSP Proposal
CISSP ProposalCISSP Proposal
CISSP Proposaljemtallon
 
CISSP Week 5
CISSP Week 5CISSP Week 5
CISSP Week 5jemtallon
 
CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14jemtallon
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16jemtallon
 
CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13jemtallon
 
CISSP Week 20
CISSP Week 20CISSP Week 20
CISSP Week 20jemtallon
 
CISSP Week 7
CISSP Week 7CISSP Week 7
CISSP Week 7jemtallon
 
CISSP Week 6
CISSP Week 6CISSP Week 6
CISSP Week 6jemtallon
 
CISSP Week 22
CISSP Week 22CISSP Week 22
CISSP Week 22jemtallon
 
CISSP Week 21
CISSP Week 21CISSP Week 21
CISSP Week 21jemtallon
 
Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24jemtallon
 
CISSP week 25
CISSP week 25CISSP week 25
CISSP week 25jemtallon
 
CISSP Week 18
CISSP Week 18CISSP Week 18
CISSP Week 18jemtallon
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2infosecedu
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101Amit Ranjan
 

Viewers also liked (17)

Access Control - Week 4
Access Control - Week 4Access Control - Week 4
Access Control - Week 4
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
CISSP Proposal
CISSP ProposalCISSP Proposal
CISSP Proposal
 
CISSP Week 5
CISSP Week 5CISSP Week 5
CISSP Week 5
 
CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16
 
CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13
 
CISSP Week 20
CISSP Week 20CISSP Week 20
CISSP Week 20
 
CISSP Week 7
CISSP Week 7CISSP Week 7
CISSP Week 7
 
CISSP Week 6
CISSP Week 6CISSP Week 6
CISSP Week 6
 
CISSP Week 22
CISSP Week 22CISSP Week 22
CISSP Week 22
 
CISSP Week 21
CISSP Week 21CISSP Week 21
CISSP Week 21
 
Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24
 
CISSP week 25
CISSP week 25CISSP week 25
CISSP week 25
 
CISSP Week 18
CISSP Week 18CISSP Week 18
CISSP Week 18
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
 

Similar to CISSP week 26

Security measures
Security measuresSecurity measures
Security measuresshiv404
 
SECURITY UPDATE.pptx
SECURITY UPDATE.pptxSECURITY UPDATE.pptx
SECURITY UPDATE.pptxLalitaRajBisht
 
Insurance Risk
Insurance RiskInsurance Risk
Insurance RiskHafeez Farooq
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsRoger Johnston
 
Physical security primer - JURINNOV - Eric Vanderburg
Physical security primer - JURINNOV - Eric VanderburgPhysical security primer - JURINNOV - Eric Vanderburg
Physical security primer - JURINNOV - Eric VanderburgEric Vanderburg
 
Hardening the Perimeter: The Role of the Guard Booth, Security Solutions and ...
Hardening the Perimeter: The Role of the Guard Booth, Security Solutions and ...Hardening the Perimeter: The Role of the Guard Booth, Security Solutions and ...
Hardening the Perimeter: The Role of the Guard Booth, Security Solutions and ...Nexie_verena
 
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...Nexie_verena
 
Temporarily idle sites - COVID19
Temporarily idle sites - COVID19Temporarily idle sites - COVID19
Temporarily idle sites - COVID19Graeme Cross
 
Security and Disaster Management
Security and Disaster ManagementSecurity and Disaster Management
Security and Disaster ManagementJolo Van Clyde Abatayo
 
Data Center Security: Always a Main Concern for Businesses
Data Center Security:  Always a Main Concern for BusinessesData Center Security:  Always a Main Concern for Businesses
Data Center Security: Always a Main Concern for Businessescyrusone
 
Securing Airports with Electric Fencing and Perimeter Intrusion Detection Sys...
Securing Airports with Electric Fencing and Perimeter Intrusion Detection Sys...Securing Airports with Electric Fencing and Perimeter Intrusion Detection Sys...
Securing Airports with Electric Fencing and Perimeter Intrusion Detection Sys...A-1 Fence Products Company
 
Gate Safety Week for Industry Professionals
Gate Safety Week for Industry ProfessionalsGate Safety Week for Industry Professionals
Gate Safety Week for Industry Professionalsjosp1234
 
WGM Pipeline Project Orientation
WGM Pipeline Project OrientationWGM Pipeline Project Orientation
WGM Pipeline Project Orientationtxheaven
 
Safety and Security (HOUSEKEEPING)
Safety and Security (HOUSEKEEPING)Safety and Security (HOUSEKEEPING)
Safety and Security (HOUSEKEEPING)NSTU
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptxdotco
 
Managing specialized risk_14
Managing specialized risk_14Managing specialized risk_14
Managing specialized risk_14Rione Drevale
 
Ruben urquidez
Ruben urquidezRuben urquidez
Ruben urquidezrujsd1
 
Using drones to conduct safe inspections of commercial solar PV installations
Using drones to conduct safe inspections of commercial solar PV installationsUsing drones to conduct safe inspections of commercial solar PV installations
Using drones to conduct safe inspections of commercial solar PV installationsAustralian Institute of Health & Safety
 

Similar to CISSP week 26 (20)

Security measures
Security measuresSecurity measures
Security measures
 
SECURITY UPDATE.pptx
SECURITY UPDATE.pptxSECURITY UPDATE.pptx
SECURITY UPDATE.pptx
 
Insurance Risk
Insurance RiskInsurance Risk
Insurance Risk
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
 
Hotel Safety & Security
Hotel Safety & SecurityHotel Safety & Security
Hotel Safety & Security
 
Physical security primer - JURINNOV - Eric Vanderburg
Physical security primer - JURINNOV - Eric VanderburgPhysical security primer - JURINNOV - Eric Vanderburg
Physical security primer - JURINNOV - Eric Vanderburg
 
Hardening the Perimeter: The Role of the Guard Booth, Security Solutions and ...
Hardening the Perimeter: The Role of the Guard Booth, Security Solutions and ...Hardening the Perimeter: The Role of the Guard Booth, Security Solutions and ...
Hardening the Perimeter: The Role of the Guard Booth, Security Solutions and ...
 
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
 
Temporarily idle sites - COVID19
Temporarily idle sites - COVID19Temporarily idle sites - COVID19
Temporarily idle sites - COVID19
 
Security and Disaster Management
Security and Disaster ManagementSecurity and Disaster Management
Security and Disaster Management
 
Data Center Security: Always a Main Concern for Businesses
Data Center Security:  Always a Main Concern for BusinessesData Center Security:  Always a Main Concern for Businesses
Data Center Security: Always a Main Concern for Businesses
 
Securing Airports with Electric Fencing and Perimeter Intrusion Detection Sys...
Securing Airports with Electric Fencing and Perimeter Intrusion Detection Sys...Securing Airports with Electric Fencing and Perimeter Intrusion Detection Sys...
Securing Airports with Electric Fencing and Perimeter Intrusion Detection Sys...
 
Gate Safety Week for Industry Professionals
Gate Safety Week for Industry ProfessionalsGate Safety Week for Industry Professionals
Gate Safety Week for Industry Professionals
 
WGM Pipeline Project Orientation
WGM Pipeline Project OrientationWGM Pipeline Project Orientation
WGM Pipeline Project Orientation
 
Safety and Security (HOUSEKEEPING)
Safety and Security (HOUSEKEEPING)Safety and Security (HOUSEKEEPING)
Safety and Security (HOUSEKEEPING)
 
Viseum security-site-survey
Viseum security-site-surveyViseum security-site-survey
Viseum security-site-survey
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptx
 
Managing specialized risk_14
Managing specialized risk_14Managing specialized risk_14
Managing specialized risk_14
 
Ruben urquidez
Ruben urquidezRuben urquidez
Ruben urquidez
 
Using drones to conduct safe inspections of commercial solar PV installations
Using drones to conduct safe inspections of commercial solar PV installationsUsing drones to conduct safe inspections of commercial solar PV installations
Using drones to conduct safe inspections of commercial solar PV installations
 

Recently uploaded

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

CISSP week 26

  • 1. Physical Security Domain 10 CISSP Official CBK 3rd Edition Pages 1256-1362 Jem Jensen Tim Jensen StaridLabs
  • 2. Physical Security Program: Purpose • Designed to prevent the interruption of operations and provide for the security of information, assets, and personnel. • Risks include: • • • • • Violence and crime International Terrorism Environmental Damage Energy Disruptions Pandemics
  • 3. The Security Survey • The first step is to determine the protection objectives: • Threat Definition • Target Identification • Facility Characteristics. • Goal is to mitigate justified risks and not waste money on ineffective security.
  • 4. Target Identification • The first step is to identify what assets need to be protected. • Set a prioritization for assets. • Assets can be personnel, property, equipment, or information. • Identify the impact and consequences of an asset loss.
  • 5. Facility Characteristics • Several security professionals should be included in a facility walkthrough. The more eyes and the more experience the better. • Overnight security guards get bored and wander around all night, as such they are usually the best source for identifying weaknesses.
  • 6. American Institute of Architects List of Key Security Concerns • Facility security control during and after hours of operation • Personnel and contract security policies and procedures • Personnel screening • Site and building access control • Video surveillance, assessment, and archiving. • Natural surveillance opportunities. • Protocols for responding to internal and external security incidents. • Degree of integration of security and other building systems. • Shipping and receiving security • • • • • • • • • • Property Identification and tracking Proprietary information security Computer network security Workplace violence prevention Mail screening operations, procedures, and recommendations Parking lot and site security Data center security Communications security Executive protection Business continuity planning and evacuation procedures
  • 7. Vulnerability Assessment • The assessment should be done within the context of the defined threats and the value of the organization’s assets. • Each risk (front entrance, receptionist, etc) should have it’s own vulnerability level. (Very High, High, Medium High, Medium….) • The cost of your protective measures shouldn’t be more expensive than the assets your protecting.* • Caveats* • Laws/Regulations • Compliance • Single Loss vs Annul Rate of Occurrence (SLE/ARO)
  • 8. Site Planning • Again, the goal of this whole process is the protection of life, property, and operations. • Countermeasures should be appropriate and effective to reduce the risk. • Must balance employee convenience and a secure facility. • Security shouldn’t be sacrificed for convenience, but a lot can be done to make the user’s life easier. • Security is always easier to setup from the beginning. Employees resist change and push back every time things are changed. As such security should be done right from the beginning, and only updated when necessary, not on a whim. • The movement of people and materials through a facility is determined by the design for access, delivery, and parking systems. • Systems should be designed to maximize efficiency while minimizing conflicts between entry and exit of vehicles and pedestrians.
  • 9. Roadway Design • Normal street design is to minimize travel time and maximize safety. • For security, roadways can be designed to minimize vehicle velocity and to use the roadway as a protective measure. • Straight line approaches should not be used. This allows a vehicle the opportunity to gather the speed necessary to ram and penetrate the buildings. • Approaches should be parallel to the perimeter with a barrier between the road and building: earthen berms, high curbs, trees, etc. • Existing streets can be retrofitted with barriers, bollards, swing gates, etc. • Measures should be applied to keep vehicles from departing the roadway and bypassing the countermeasures.
  • 13. Remember…build a better defense and the universe builds a better idiot…
  • 16. Crime Prevention through Environmental Design (CPTED) • Provides direction to solve challenges of crime with organization (people), mechanical (technology and hardware), and natural design (architecture and circulation flow). • Protection can be provided through aesthetically pleasing features such as landforms, water, and vegetation. • Thick vegetation should not be directly adjacent to a building and thick ground cover over 4 inches tall could be a disadvantage. • Facility should be designed with a single point of entrance for guests/untrusted visitors. A receptionist should be available at this entrance.
  • 17. Windows • Windows are vulnerable and common entry points. • Home windows shatter and cause hazardous conditions. (Note on window safety) • Buildings should be designed so that in the event of an explosion shattered glass is mitigated. (Bushes, walls, special types of glass, secure door frame, secure anchoring of frame to structure) • Windows should ideally not be directly adjacent to doors. This prevents a broken window allowing access to the door lock from the inside. • Laminated glass, grills, screens, mesh etc can protect windows. • Windows on ground level should not have the ability to be opened and should have bars and alarm systems.
  • 18. Types of Glass • Annealed: Standard Glass • Tempered Glass: Impact Resistant • Wired glass: Wire mess imbedded in glass offering limited protection • Laminated glass: Very shatter resistant. Still breakable, but shards are held in place.
  • 22. Glass Break Sensors • Sensors can be installed to detect glass breaking. • Types: • Acoustic (Listens for sound wave matching frequency of broken glass) • Crap • Shock (Identifies shock wave when glass is broken) • Also crap • Dual mode (Acoustic and Shock required for alarm) • Less crap
  • 23. Garages • Primary risks: Crime and vehicles hitting pedestrians • Use signs to direct traffic and CCTV cameras to monitor for incidents. • Bright lights reduce both risks • 10-12 foot candle over parked cars • 15-20 foot candles in walking and driving aisles. • Exterior lights should be 12 feet above ground and should point downward. • Parking structure should be white to reflect light. • Elevators and walkways should empty into the lobby, not into the secure areas.
  • 24. Location Threats Natural Disasters • Hurricane winds can exceed 155 MPH • Tornado winds can reach 300 MPH • Earthquakes shake things • Floods…flood things…
  • 25. Man-made threats • FIRE! FIRE! • Fires cause damage due to heat, smoke, and water from suppression systems. • Fire systems should be protection water systems should be protected from single points of failure. • Incoming water line should be encased, buried, or located 50 feet from high risk areas.
  • 27. Utility Concerns: Electrical • Electric panels, conduits, and switchgear should be distributed throughout the building to avoid single points of failure. • Emergency generators should be located away from loading docks, entrances, and parking areas. Preferably on a roof, protected level, or protected interior area. • Generator fuel storage should be located away form loading docks, entrances, and parking areas. Access should be restricted and protected including locking caps and seals.
  • 28.
  • 29.
  • 30.
  • 31. Communications • At least two phone lines on separate systems is good in case of emergency. • If using VOIP, run at least 1 telephone landline to the security guard desk as a backup. • Cell phones are relatively cheap and should be provided to critical personnel. • Maintain a phone list of critical employees. • Setup a base radio and add a portable radio to each floor for emergency internal communications.
  • 32. Utilities • When possible protect utilities by placing them underground • Protect drinking water from contamination • Don’t provide signage saying “Critical power area” or “Single point of failure for all of our power, water, and heat. Don’t hit with car!” • Locate fuel storage tanks and operations buildings down slope and at least 100 feet from buildings. • Utility systems should be at least 50 feet from loading docks, front entrances, and parking areas.
  • 33. Primary Purpose of Security! To protect personnel(people),assets(buildings, items), and information(10010101011101) from death, destruction, or harm.
  • 34. Workers comp costs Insurance rate per $100 of payroll
  • 35. Perimeter security • Perimeter security is made up of several zones. The more zones, the more defense-in-depth and the better your security. • Each zone can have different controls. • Security controls should be added with care, using risk, vulnerability, and threat assessment to balance security and risk.
  • 36. Physical Security elements (Dodge, dip, dive, duck, and dodge) • Deter • Visible security will make adversaries reconsider. If you’re the secure bank with a sniper on the roof and a turret mounted machine gun operated by an annoyed robot, and the bank 2 blocks over (out of sniper sight) has an electric alarm from Radioshack and you both have equal assets that can be stolen…guess who’s going to be chosen. • Detect • Detection devices allow prompt notification that a break in has occurred. These can be cameras, motion sensors, infrared sensors, glass sensors, etc. • Delay • This is the key to physical security. Your protections and detection components are attempting to alert and delay adversaries so long as is necessary for police or security to arrive. Glass windows only need to last 15 minutes of pounding if a guard walks by every 15 minutes. Even that’s overkill since the guard would be able to hear several minutes before and after while he’s in the vicinity. A safe only has to last long enough for a response, etc. • Respond • A response force must be told that an unauthorized entry has been attempted. Police, security, mercenaries, the sniper, etc.
  • 37. Critical components to protect • • • • • • • • • • Emergency generator: includes fuel systems, water supply, sprinklers, etc. Fuel storage Telephone and switchgear Fire pumps Building Control Centers UPS power supplies HVAC systems Elevator machinery Elevator, stair, and utility shafts Emergency power feeders.
  • 38. Good fences make good neighbors • If using a perimeter fence, here’s the recommendations: • • • • • • • • Standard is 6 foot high fence with 2 inch mesh squares. 9 gauge vinyl or galvanized metal Posts should be every feet and anchored into cement Barbed wire angled out from the top of the fence at a 45 degree angle away from the protected area. Fence + barbed wire = 7 foot tall. Base of fence wire should have a post so fence can’t be pushed or crawled under. For high security, add a double fence with rolls of barbed wire between the fences. Fences are psychological deterrents and boundary markers and are easily penetrated.
  • 39.
  • 40.
  • 41. Gates • Gates control access to vehicles and people entering/exiting the facility. • The higher security of the controlled area, the fewer gates should exist. • One is the optimal number for security, but not very practical with larger facilities. • Each gate requires authentication resources: • Automated system (cards, keycodes, etc) • Human guards
  • 42. Walls • Walls are more expensive than fences but offer a softer view. • Effective walls should be 7 feet high with 3 or 4 strands of barbed wire on top. • The disadvantage of walls is view obstruction.
  • 44. Infrared Sensors • Passive Infrared sensors are designed for human body detection. • Measures changes in heat in an area. • Active Infrared sensors send an IR signal to a receiver. If the signal is interrupted then an alarm triggers. • Laser tripwire basically.
  • 45. Microwave Sensors • Send a controlled microwave pattern into protected area. Baseline is established and any variance is reported as an alarm. • Passes through concrete and steel and should be not be pointed adjacent to a roadway or adjacent buildings or false posivites will occur. • Bistatic • Uses separate devices for sensor and receiver. Sends microwave emission between sensor and receiver and looks for variance. • Monostatic • Has both sensor and receiver in the same unit. Generates a well controlled beam that can be adjusted to monitor a specific region.
  • 46.
  • 47. Left to right: Passive, bistatic, multistatic(Radar)
  • 48. Off Topic Tim: Through Wall Imaging Systems
  • 49. Coaxial Strain-Sensitive Cable • Coaxial cable is woven through a fence. The cable transmits an electric field. If someone tries climbing or cutting the fence, the field fluctuates and is detected in the cable. When this occurs an alarm goes off. • Very tunable, susceptible to weather and climate. • Some are susceptible to EMI and RFI
  • 50.
  • 51. Video Content Analysis and Motion Path Analysis • CCTV cameras can be piped to computers for software analysis. The software can identify pixel changes and filter out known events to identify suspicious events and raise alarms.
  • 52. Lighting • Lighting deters intruders. • It also makes it easier to see. • Ideally lighting will allow security and employees to notice individuals at night at a distance of 75 feet or more. They should be able to identify a human face at 33 feet. • Ideally place lighting higher to allow it to disperse naturally and produce a better aesthetic.
  • 53. Types of Lighting • Fluorescent Lights • Highly efficient and cost effective. • Temperature sensitive. Not effective for outdoor lighting. • Mercury Vapor Lights • • • • Preferred security light. Disperses strong white-bluish light. Extended lamp life. Take time to come to full light. Common at stadiums. • Sodium Vapor Light • Soft yellow light. • More efficient than mercury Vapor. • Used in foggy conditions. • Quartz Lamps • • • • Very bright white light Immediately on High wattage – 1500-2000 watts. Used on perimeters and troublesome areas for high visability and day light levels of light.
  • 54. Infrared Lighting • Most black and white CCTV cameras can see Infrared (IR) • Infrared illuminators can be setup in areas to enhance camera visibility.
  • 55.
  • 56. Access Control Badge Systems • Card Types: • Magnetic Stripe • • • • Old technology Can be physically damaged by use Data can be affected by magnetic fields Easily duplicated • Proximity Card (Prox Cards) • Use embedded antenna wires connected to a chip within the card. • Chip is encoded with unique card identification. • Read distance varies by manufacturer and installation. • Smart Cards • Credential cards with a microchip embedded in them. • Can store access transactions, licenses held by individuals, qualifications, safety training, security access levels, and biometric templates. • Card can double as an access card for doors and be used as an authenticator for a computer.
  • 57. Additional Security measures • Along with a magstripe, prox, or smart card you can add additional measures to an authentication transaction: • PIN in keypad • Biometric reader
  • 58. Fun with access Control Systems (ACS) • When new users are enrolled, they are stored to a central authentication repository. • This repository is mirrored to all readers on a consistent bases. • If the reader looses access to the central repository, it’s still able to authenticate known users, just not new additions.
  • 59.
  • 60. More fun with ACS systems… • Many prox and smart cards have “slots”. These slots hold things such as PKI certificates or biometric data. • Biometric data such as your thumb print. • So in the event the proxy reader can’t communicate with the central computer, it can still authenticate you based on the card prox number and the thumb print scan on the badge.
  • 61.
  • 62. CCTV Cameras Purposes • Surveillance • Viewer is able to view multiple locations from a centralized area. • Assessment • Viewer is able to assess the situation from a safe distance before choosing an appropriate action. • Deterrence • May deter unsophisticated burglars, vandals, and intruders • Evidentiary Archives • Archived images/video may be helpful for identification and prosecution of trespassers, vandals, and intruders.
  • 63. Camera specs • Color cameras provide more details like color of clothes or color of car. • Black and white cameras are better in low light conditions. • Cameras must have auto-white balance to adjust to changing color temperatures of daylight and artificial light. • Color cameras require more illumination levels. • High quality color cameras work down to 1.5 foot-candle (fc) illumination. Black and white work to .5 fc
  • 64. Outdoor cameras • • • • • • • • • Outdoor cameras are more expensive than indoor. Lighting changes depending on time of day and weather. Shrubs, trees, and vegetation can obstruct views. In cold weather, a heater blower should be added to the camera housing. Auto-iris lenses should be used since they automatically adjust to light. Strong sunlight can damage a camera without this feature. Set the focus in low light with an auto-iris. The focus will stay with more light, but not if reversed. “Neutral density (ND)” filters can be added to reduce lighting without changing the color of the image. Try to avoid direct sunlight in an image. Try to avoid sky view in the camera, this will impair the contrast.
  • 65. Mounts • Fixed position Camera • • • • • Cannot rotate or pan. Good for motion detection. Lower cost Allows for “pre-alarm” where you can view images from before an alarm. Unable to follow an dynamic event. • Pan/Tilt/Zoom (PTZ) Cameras • Cameras allow rotation, panning, tilting, and zooming. • Due to extra electronics these usually cost 4 times more than a standard camera. • Not suited for pre-alarm assessment since the alarm area can change at all times. • Dome Cameras • Cheaper than PTZ • Hardened plastic lower dome, usually smoke colored to conceal camera. • Better protected in harsh conditions
  • 66. IP Cameras • IP cameras capture digital video. • The camera is connected to a LAN network and video is sent over the network. • Least secure system. • Cost more than CCTV cameras. • Not normally suitable for high-risk projects
  • 67. Security Guards • Deter unauthorized entry into a facility • Response force to alarm activations • Guards are required to conduct foot patrols of building interiors, exteriors, and parking areas. • Some guards will be stationary at entrances or security offices. • Required to respond to fire, security, and medical emergencies. And to renter assistance when needed. • Must be able to submit written and verbal reports regarding significant events.
  • 68. Security Guard Affiliations • Proprietary (Company Employees) • • • • • • Increased quality of personnel Control of security program Employee loyalty Prestige for both employee and company Disadvantage: cost, administration, staffing, impartiality, expertise Largest disadvantage is time to create an effective security program. • Contract • • • • • Easily adapts to staffing levels Total cost is rolled into single hourly billable rate: salary, insurance, admin cost, uniforms, benefits. Contract security is generally impartial. Guards are easy to replace. Contract guards usually cost less than proprietary since they’re just a head. • Hybrid • It’s possible to use some proprietary and some contract security to provide better control over your security program while making the program cost effective.
  • 69. Alarm Monitoring • For secure facilities, generally two guards are on at all times, 24/7. • Guard 1 is stationed in a security console center and monitors cameras, intrusion systems, and fire systems. • Guard 2 does walkthroughs and assigned tasks. • Many organizations use UL 1981 Standard for high security facilities to designate staffing levels. • Requires staffing to be such that all alarm signals can be acknowledged and appropriate dispatch and verification action can be initiated not more than a defined period after the monitoring facility receiver acknowledges. • The Security Control Center should be located on the main floor or the basement as long as the area is not below ground level (flood protection) • Entry must be controlled and only authorized personnel allowed in. • A sign in sheet should be hung up to document any non-authorized personnel being escorted in (police, temporary staff, executives, etc) • Must have primary and secondary power sources. Secondary power should last for at least 24 hours.
  • 70. Visitor Access • Visitors should be required to sign in and sign out, and document their purpose of visit. • A visitor badge should be given to identify them as a non-employee. • This badge should not be an access card • The badge should state if they require an escort or not. If an escort is required, the badge should have the name of the escort to make that person personally responsible. • Some visitor systems can read government issued ID’s by swiping them and identify if the ID is properly formatted or is falsified. The data is populated into a database as a record.
  • 71. Doors (Again) • Door assemblies include the door, its frame, and the anchorage to the building. • Exterior doors should be designed to fit snugly in the doorframe, preventing gaps. • Perimeter doors should be hollow steel doors or steel clad doors with steel frames. • Latch and frame anchor should match the strength of the door and frame. • Hinges should be on the interior of restricted areas. • Doors housing sensitive areas should have an automatic door closing device.
  • 72. Why Hinges should be inside…. http://www.firerescue1.com/fire-products/tools/articles/1284289-step-by-step-forcing-an-outward-opening-metal-door/
  • 73.
  • 74. Electronic Locks • Actuates the door bolt • Some retract the lock without user intervention • Some offer request-to-exit switches • Expensive • Often requires new door for retrofit • Requires special door hinge to accommodate wiring harness • Can be configured in fail-safe or fail-secure modes.
  • 75. Electric Strikes • Strike is removed (vs bolt being removed) • Can be configured in fail-safe or fail-secure modes. • Unrestricted exit access is allowed. • Can easily be retrofitted to old doors.
  • 76. Magnetic Locks • Easy retrofit • Mounted on door and doorframe • Continuous electric current is provided to hold the door closed. • Locks are fail-safe (fail open) on power loss. • US Life safety Codes require magnetic lock doors have a manual override device and an automated senor or Request To Exit device. • Locks are controlled by a card reader.
  • 78. Anti-Passback • Requires user to badge in and out when entering and leaving. • Easy for accountability • Some systems only allow single entry. To enter again the user must have left. This stops people from dropping badges out windows or cloning them to get multiple people inside.
  • 79. Turnstiles • Prevents piggybacking or tailgating • Assists guards in verifying that all users badge in individually
  • 81. Real Mantraps • Room where you must enter, allow the door to close behind you, and then enter another door which will allow unlock only once you are locked in the room. • This allows employees to know if someone is piggybacking. • A footstep detecting floor can be added to identify the amount of people in the room.
  • 82.
  • 83. Safes • Last line of defense. • You should have spent more on guards, doors, and sensors. • Different categories. • Tool Resist • Rating of TL-15 means it’s tool resistant for 15 minutes. • To be TL-15 it must weight at least 750 pounds or have anchors. • Have a metal body that is solid or fabricated of at least 1 inch thick with tensile strength of 50,000 PSI and is fastened to the floor with ÂĽ inch steel. • No hole on the safe can be larger than ÂĽ inch when closed. • Must have a relocking device if the lock is destroyed.
  • 84. Vault • Different Categories: • • • • Class M – ÂĽ hour Class 1 – ½ hour Class 2 – 1 hour Class 3 – 2 hour
  • 85. Biometrics • Measure biological characteristics • Fingerprints, hand geometry, voice print, iris pattern, etc • Common failures • False acceptance (Type I error) – erroneously allows access by confusing one user with another or falsely recognizing an imposter • False rejection (Type II error) – fails to recognize a legitimate user • Most biometrics can be tuned to adjust the false acceptance rate (FAR) and false rejection rate (FRR) • The spot where FAR and FRR meet is called the Crossover Error Rate (CER) • CER can be used to compare accuracy between different devices
  • 87. Biometrics • Fingerprint • Compares pattern on fingers to a stored template • Some require multiple fingers for either: • More accuracy – harder to forge multiple fingerprints • More flexibility – injury to one finger doesn’t bar access • Modern scanners detect temperature and pulse • Facial image • Compates facial features to stored image • Eye width, mouth width, nose height – general proportions
  • 88. Biometrics • Hand geometry • • • • Uses distance between knuckle joints, finger lengths Generally faster than other biometrics Reasonably accurate Higher false acceptance rates • Voice recognition • Less expensive • Require isolation from background noise • Often paired with another access check like a PIN
  • 89. Biometrics • Iris patterns • Iris is less susceptible to theft or injury than fingers • Slower – typically about 2 seconds per check • Some people don’t like having their eyes scanned • Retina scanning • • • • • Scans blood vessels at the back of the eye Very high security but lots of hurdles to implementing Slow - Typically 10 seconds per check Intrusive – have to take off glasses, hold very still Some people think it will damage their eyes
  • 90. Biometrics • Signature dynamics • Compares stored signature style • Speed of writing, direction, as well as finished signature • Easy for signers – don’t need to learn anything new • Vascular patterns • Maps veins in hands or fingers • Difficult to forge • Contact-less – hygiene benefits
  • 91. Biometrics • Keystroke dynamics • Analyses the way a person types • Keystroke rhythm template • Dwell time – how long the key is pressed • Flight time – time between key presses
  • 92. Communications and Server Rooms • Lightning protection • Ground Potential Rise (GPR) • Lightning strike to a grounding system • Causes surge that can damage equipment, personnel • Equipment damage may not manifest itself immediately • Mean time before failure (MTBF) – average life expectancy of equipment • Latent damage – shortens MTBF • Avoidance • Can use fiber instead to avoid the issue • Or isolate the circuits using optical isolators or isolation transformers • Mounted in a non-conducting cabinet • Called a High voltage interface (HVI)
  • 93. Communications and Server Rooms • Server room • No windows • Only one controlled entry • Physical access to a system = game over • So don’t let it happen! • Metal conduits for cabling leading from/to (ideally everywhere)
  • 94. Communications and Server Rooms • Rack security … no.
  • 95. Communications and Server Rooms • Rack security • Don’t stop at access control for the server room – lock server racks • Doubtful that everyone with server room access needs access to every rack • Do electricians need to get into the racks? Probably not • Manageable rack locks • Can be remotely configures for more advanced access control than classic keys • Only allow unlocking during certain times or day • Require manager approval • Monitor temperature, power consumption
  • 96. Work Area Security • Server rooms, closets probably not the best place to put workspaces • High security personnel behind more secured areas • Outside of secured rooms • Security containers – locking cabinets • Clean desk approach – clean/lock everything up at the end of the day • Maintain strong password protection on workstations • Point screens away from windows • Use privacy filters or screen protectors • Shredding policy to destroy paper copies of sensitive information
  • 97. Restricted Work Areas • Sensitive Compartmented Information Facility (SCIF) • • • • • • • • • Prevent & detect visual, acoustic, technical, physical access 3 layers of 5/8 inch drywall, true floor to true ceiling One door with X-09 combination lock Door frame affixed to surrounding wall & strong enough to prevent distortion Automatic door closer Door alarms Noisemaking device over doors, pointed at windows HVAC requirements restricting size or requiring bars on ducts Intrusion detection that response force can respond to within 15 minutes
  • 98. Utilities and Power • UPS – battery backup for short term power outages • Generator • Activate automatically in power outage • Typically diesel fueled • HVAC • Heating, ventilation, air conditioning • Keeps system temperature in range to avoid damage or outages
  • 99. Fire Detection • Detectors – sound alarm to give people a chance to escape • Types • Smoke • Categories • Photoelectric • Physical process (ionization) • Flame • UV • Heat • Sudden temperature changes • High temps
  • 100. Fire Suppression • Water • • • • Wet system – filled with water that sprays until water supply is shut off Dry system – valve fills system with water when triggered Pre-action system – water held back until detectors are activated Deluge system – like pre-action but sprinkler heads are left open • Gas • Halon – outdated, leaves residue, can injure personnel • Aero-K • FM-200

Editor's Notes

  1. My salary means yearly my employer pays approximately $700 in workers comp for me. If I was in Jersey that’d be over $2000.