Travel Reference
In-Depth Information
oversee the implementation of needed changes, often utilizing firms with
whom they have professional contacts. In cases where many costly correc-
tions must be made, the security consulting company should be clear on
which upgrades should be addressed immediately. The better firms will
show the client how the funds already budgeted for security may be used
to greatest advantage. Often the allotted budget will be sufficient to pro-
vide for the security needs of the company. In such cases, the consultants
will merely show the client where funds are being wasted and how they
may be reallocated to accomplish the goal of greater security.
The security consultant should also be able to teach the client corpo-
ration how to make the best use of the security equipment they already
have. For example, many companies already have extensive video surveil-
lance and alarm systems. Quite often, however, these cameras are not used
to their best advantage. Both authors have seen poorly used resources
in the private and public sector. Many times, cameras are poorly aimed
and out of focus. Often the security officer is sitting before a bank of video
screens, half of which are nonoperational. More often than not, a simple
repair is all that would be needed to bring most, if not all, of the cameras
online. We will discuss alarm and video systems in greater detail in the fol-
lowing chapter.
In general, physical security refers to tangible impediments to attack
or unauthorized entry. Fences, gates, barricades, bollards, and doors are
just a few examples. An effective security system must integrate all dif-
ferent types of components, perhaps the most critical of which are the
barriers that physically prevent the worst-case scenario: a truck bomb at-
tempting to breach the perimeter at high speed. When we discuss barri-
ers, we specifically mean bollards, barriers, and hydraulic wedges. While
fences are also of critical importance, they serve a different function: to
prevent and detect unauthorized intrusions. The better fences today com-
bine some of the latest advances in perimeter alarm systems within the
physical design of the fence.
Let's spend a bit of time focusing on perimeter security and under-
standing exactly what is necessary to prevent a truck bomb attack. Once
again, the determination as to the need to defend against this type of
attack must be made subsequent to a thorough risk analysis and threat
assessment. If it is clear that the nature of the facility in question requires
this level of protection, then it is necessary to focus on the installation of
barriers sufficient to defeat the type of impact generated by a heavy-
weight vehicle moving at highway speed. Barriers must be certified and
Search WWH ::




Custom Search