did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780750677882

Vulnerability Assessment of Physical Protection Systems

by
  • ISBN13:

    9780750677882

  • ISBN10:

    0750677880

  • Format: Paperback
  • Copyright: 2005-11-07
  • Publisher: Elsevier Science
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $70.95 Save up to $48.35
  • Buy New
    $70.60
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

    7-Day eTextbook Access 7-Day eTextbook Access

Supplemental Materials

What is included with this book?

Summary

Vulnerability Assessment of Physical Protection Systems guides the reader through performing an effective vulnerability assessment (VA) from the start of planning through final analysis, including the out brief to senior management. Relying on principles introduced in the best-selling Design and Evaluation of Physical Protection Systems, this practical text addresses the full spectrum of the VA, including negotiating tasks with the customer, project management and planning, team membership, step-by-step details for performing the VA, data collection and analysis, and important notes on how to use the VA to suggest design improvements and generate multiple design options.

Author Biography

Mary Lynn Garcia is a principal member of the technical staff at Sandia National Laboratories where she has helped develop security engineering curricula for several American universities and conducted vulnerability assessments at many government and private facilities. Ms. Garcia is a Certified Protection Professional of the American Society of Industrial Security

Table of Contents

Preface xv
Introduction to Vulnerability Assessment
1(32)
Risk Management and Vulnerability Assessment
2(6)
Risk Assessment and the Vulnerability Assessment Process
4(2)
Statistics and Quantitative Analysis
6(2)
Vulnerability Assessment Process Overview
8(15)
Planning the Vulnerability Assessment
10(1)
Project Management
10(1)
Establish the Vulnerability Assessment Team
11(1)
Project Kick-Off Meetings
11(1)
Protection Objectives
12(1)
Facility Characterization
13(1)
Data Collection---Detection
13(1)
Intrusion Sensors
14(1)
Alarm Assessment
15(1)
Entry Control
16(1)
Alarm Communication and Display
17(1)
Data Collection---Delay
18(2)
Data Collection---Response
20(2)
Analysis
22(1)
Reporting and Using the Vulnerability Assessment
23(1)
Systems Engineering and Vulnerability Assessment
24(8)
System Requirements
27(2)
System Design and Analysis
29(2)
System Installation and Test
31(1)
System Replacement
31(1)
Summary
32(1)
References
32(1)
Physical Protection Systems Principles and Concepts
33(12)
Physical Protection Systems Overview
33(1)
Physical Protection System Design
34(1)
PPS Functions
35(3)
Detection
35(2)
Delay
37(1)
Response
37(1)
Relationship of PPS Functions
38(1)
Characteristics of an Effective PPS
39(2)
Protection-in-Depth
40(1)
Minimum Consequence of Component Failure
40(1)
Balanced Protection
40(1)
Design and Evaluation Criteria
41(1)
Additional Design Elements
42(1)
Summary
43(1)
Reference
44(1)
Getting Started
45(20)
Project Management
45(10)
Phase One---Project Planning
46(1)
Initial Customer Contact
46(1)
Define the Project
47(2)
Phase Two---Managing the Project
49(1)
Project Status and Reporting
50(3)
Recovery Plans
53(1)
Project Management Tools
54(1)
Project Closeout
54(1)
Project Management Summary
54(1)
Establish a Vulnerability Assessment Team
55(6)
Vulnerability Assessment Project Leader
55(1)
Systems Engineer
55(1)
Security System Engineer
56(1)
SME---Intrusion Sensing Subsystem
56(1)
SME---Alarm Assessment Subsystem
57(1)
SME---Alarm Communication & Display (AC&D) Subsystem
57(1)
SME---Entry Control Subsystem
58(1)
SME---Delay Subsystem
58(1)
SME---Response Subsystem
58(1)
SME---Communications Subsystem
59(1)
SME---Analyst
59(1)
Special Note for Response Force Simulations
60(1)
Participation of On-Site Personnel
60(1)
Kick-Off Meetings for Project Team and Customer
61(3)
Project Team Kick-Off Meeting
61(1)
VA Team Guide
61(1)
Site Information
62(1)
Customer Kick-Off Meeting
63(1)
Summary
64(1)
References
64(1)
VA Process Inputs---Establish Protection Objectives
65(18)
Defining the Threat
65(7)
Listing Information Needed
66(1)
Collecting Information
66(1)
Organizing Information
67(1)
Threat Definition Methods
67(1)
Insider Threat
68(2)
Other Notes on Threat Definition
70(1)
Estimating Likelihood of Attack
71(1)
Asset Identification
72(5)
Asset Identification Methods
72(1)
Manual Listing
73(1)
Logic Diagrams
73(2)
Criteria
75(1)
Threat / Asset Matrix
75(2)
Facility Characterization
77(3)
Characterization Tools
78(1)
Facility States
79(1)
Security Checklists
80(1)
Summary
80(1)
References
80(3)
Data Collection---Intrusion Detection Subsystem
83(40)
Sensor Overview
84(1)
Exterior Intrusion Sensor Technologies and Evaluation
85(15)
Freestanding Sensors
86(1)
Exterior Microwave Sensors
86(3)
Electric-field Sensors
89(3)
Freestanding Sensors Summary
92(1)
Buried-Line Sensors
92(1)
Ported Coaxial Sensors
93(2)
Buried-Line Sensors Summary
95(1)
Fence-Associated Sensors
95(1)
Taut Wire Sensors
96(2)
Fiber Optic Sensors
98(2)
Fence-Associated Sensors Summary
100(1)
Other Exterior Intrusion Sensing Technologies
100(1)
General Exterior Intrusion Sensing Evaluation
100(4)
Summary of Exterior Intrusion Sensing
104(1)
Interior Intrusion Sensor Technologies and Evaluation
104(12)
Boundary Penetration Sensors
105(1)
Magnetic Switches
105(3)
Glass-Break Sensors
108(1)
Boundary Penetration Sensors Summary
109(1)
Volumetric Sensing Technologies
109(1)
Microwave Sensors
109(2)
Passive Infrared Sensors
111(1)
Video Motion Detection Sensors
112(2)
Volumetric Sensors Summary
114(1)
Proximity Sensing Technologies
115(1)
Pressure Sensors
115(1)
Proximity Sensors Summary
116(1)
Other Technologies
116(1)
General Interior Intrusion Sensing Evaluation
116(5)
Summary of Interior Sensing Technologies
118(1)
Intrusion Sensing by Humans
118(1)
Estimating Intrusion Sensing Performance
118(3)
Summary
121(1)
Reference
122(1)
Data Collection---Alarm Assessment Subsystem
123(28)
Alarm Assessment Overview
123(1)
Assessment versus Surveillance
124(1)
Video Assessment Performance Factors
125(23)
Evaluation Testing
126(2)
Video Assessment Subsystem
128(1)
Video Subsystem Equipment
129(1)
Cameras and Lenses
129(4)
Camera Housings
133(1)
Camera Mounting
133(3)
Lighting
136(2)
Signal Transmission
138(2)
Video Recording and Storage
140(2)
Monitors
142(2)
Other Equipment
144(2)
Procedures
146(2)
Estimating Performance
148(1)
Summary
149(1)
References
150(1)
Data Collection---Entry Control Subsystem
151(30)
Entry Control Subsystem Overview
152(3)
Personnel Control
155(13)
Tokens
156(1)
Coded Credentials
156(2)
Private Information
158(1)
Badge Control Equipment Components and Functions
159(1)
Biometrics
160(1)
Locks
161(1)
Material Control
161(1)
Personnel Metal Detection
162(3)
Trace Detection Systems
165(1)
Package Material Control
165(2)
Evaluation Criteria for Contraband Detection
167(1)
Asset Tracking
168(1)
Vehicle Control
168(2)
Subsystem Integration Issues
170(7)
Entry Control Subsystem Components
171(2)
General Evaluation Criteria
173(3)
Access Controls
176(1)
Operator Training
177(1)
Estimating Performance
177(1)
Summary
178(1)
Reference
179(2)
Data Collection---Alarm Communication and Display Subsystem
181(22)
Alarm Communication and Display Overview
182(2)
Communication
184(2)
High-Level Communications
185(1)
Low-Level Communications
185(1)
Information Handling
186(1)
Control and Display
187(6)
Offline Systems
193(1)
Evaluation Techniques
194(5)
Operator Workload
196(1)
Displays
197(1)
Video System Integration
198(1)
Network Issues
198(1)
Other Evaluation Aspects
199(1)
Estimating Performance
199(2)
Summary
201(1)
Reference
201(2)
Data Collection---Delay Subsystem
203(34)
Delay Overview
203(3)
Perimeter Barriers
206(19)
Fences
206(2)
Gates
208(1)
Chain-link Gates
208(1)
Turnstiles
209(1)
Vehicle Barriers
210(4)
Buildings
214(1)
Walls
214(1)
Floors and Roofs
215(1)
Doors
216(1)
Personnel Doors
217(2)
Attack- and Bullet-Resistant Doors
219(1)
Vehicle Doors
220(1)
Vault Doors
220(2)
Windows, Grilles, and Utility Ports
222(1)
Windows
222(2)
Grilles and Utility Ports
224(1)
Windows, Grilles, and Utility Ports Summary
225(1)
Other Barriers
225(7)
Armor
225(2)
Vaults
227(1)
Earth and Overburden
228(1)
Underground Facilities
228(1)
Airborne-Attack Barriers
229(1)
Waterborne-Attack Barriers
230(1)
Tie-downs and Restraints
230(1)
Nonlethal Weapons
231(1)
Dispensable Materials and Deployable Barriers
232(1)
General Delay Subsystem Evaluation Factors
233(1)
Estimating Performance
234(1)
Summary
234(1)
Reference
235(2)
Data Collection---Response Subsystem
237(18)
Response Overview
237(4)
Response Strategies
239(1)
Deterrence
239(1)
Denial
240(1)
Containment
240(1)
Recovery
241(1)
Delayed Response
241(2)
Equipment
242(1)
Procedures
242(1)
People
243(1)
Immediate Response
243(3)
General Warning Alarms
244(1)
Observe-and-Report
244(1)
Dispatch of Unarmed Security Personnel
245(1)
Dispatch of Armed Security Personnel
246(1)
Response Communications
246(4)
Radio Communication System
247(2)
Radio Maintenance
249(1)
Operational Issues
250(1)
Estimating Performance
250(3)
Summary
253(1)
References
253(2)
Analysis
255(40)
Analysis Overview
256(3)
Analysis Tools
258(1)
Analysis Process
259(8)
Adversary Sequence Diagrams and Path Analysis
259(2)
Scenario Analysis
261(4)
Estimate Neutralization
265(1)
Other Analysis
265(1)
Calculate System Effectiveness
266(1)
Upgrade Analysis
266(1)
Qualitative Analysis
267(10)
Facility Overview
267(6)
Path Analysis
273(1)
Scenario Analysis
274(2)
Upgrade Analysis
276(1)
Quantitative Analysis
277(16)
Facility Description
278(4)
Path Analysis
282(4)
Scenario Analysis
286(2)
Estimate Neutralization
288(1)
Baseline System Effectiveness
289(1)
Upgrade Analysis
289(4)
Summary
293(2)
Reporting and Using Results
295(14)
Overview
295(1)
Reporting Results
296(10)
Briefings
297(1)
Report Content and Format
297(8)
Protecting Results
305(1)
Reporting Summary
305(1)
Using the Vulnerability Assessment
306(2)
Design Stages
306(2)
Project Closeout
308(1)
Summary
308(1)
Appendix A---Project Management Forms and Templates 309(2)
Appendix B---Initial Briefing Template 311(8)
Appendix C---Threat and Facility Worksheets 319(8)
Appendix D---Data Collection Sheets 327(16)
Appendix E---Alarm Communication and Display Subsystem Criteria 343(8)
Appendix F---Representative Delays 351(12)
Appendix G---Results Briefing Template 363(10)
Index 373

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program