荷尔蒙什么意思| 坐月子吃什么| 尿频是什么原因造成的| 老是口干舌燥是什么原因| 为什么老想睡觉| 为什么放屁特别臭| 手痒脚痒是什么原因| 金代表什么数字| 先考是什么意思| mmf是什么药| 电泳是什么| 热伤风感冒吃什么药| 三多一少指的是什么| 疑虑是什么意思| 马齿苋对什么病最有效| 一九四六年属什么生肖| 三尖瓣反流是什么意思| 什么什么的沙滩| 女人十个簸箕是什么命| 窦性心动过速是什么意思| 银屑病是什么症状| 洗牙为什么要验血| 小宇宙是什么意思| swag是什么意思| 米醋和陈醋有什么区别| 吃什么生精养精最快| 为什么睡觉出虚汗| 什么食物含dha| 灰指甲有什么症状| 巨细胞病毒抗体阳性是什么意思| 吃什么食物可以降尿酸| 什么叫有机| 前期怀孕有什么症状| 鹿晗的原名叫什么| 什么食物胆固醇含量高| 书店里买不到什么书| 俄罗斯和白俄罗斯有什么区别| 怀孕会有什么现象| 放化疗后吃什么恢复快| 良人什么意思| 六月二号是什么星座| 海参什么人不适合吃| 万岁是什么意思| 节瓜是什么瓜| 拉杆箱什么材质的好| 土土心念什么| 悠悠什么意思| mrcp是什么检查| 天天射精对身体有什么危害| 纬字五行属什么| 青少年膝盖痛什么原因| 北京晚上有什么好玩的景点| 98年属什么的| 水煮肉片放什么配菜| 疼痛科主要看什么病| 甘薯和红薯有什么区别| rem睡眠是什么意思| 低血钾是什么病| 治疗心率过快用什么药效果好| 12月8号什么星座| 什么是价值| fsh是什么| bhp是什么单位| 麻痹是什么意思| 文书是什么意思| 多吃黄瓜有什么好处| 最近嗜睡是什么原因| 红小豆和赤小豆有什么区别| 高危性行为是什么| 狗狗流眼泪是什么原因| 子宫腺肌症吃什么药| 痔疮是什么样的| 毛囊炎是什么症状图片| 肺部磨玻璃结节需要注意什么| 看客是什么意思| 处男是什么意思| 蟋蟀用什么唱歌| 关节疼痛用什么药| 蒸米饭时加什么好吃| 胡巴是什么| 足底筋膜炎挂什么科| 套马的汉子你威武雄壮是什么歌| 吃了西瓜不能吃什么| 腿上血栓是什么症状| on是什么牌子| 大肠杆菌属于什么菌| 办健康证在什么地方办| 憨厚老实是什么意思| 金牛座和什么座最配| 暴饮暴食是什么意思| 尿泡多是什么原因| 试商是什么意思| 中国人为什么要学英语| 麦芒是什么意思| 梦见剃光头是什么预兆| 回本是什么意思| 烟雾病是什么病| 丑五行属什么| 6月5号什么星座| 361是什么意思| 一什么不什么| 手指麻木是什么病的前兆| cml是什么意思| 兰州人为什么要戴头巾| 黄体功能不全是什么意思| 孕妇为什么要躲着白事| 拉肚子发烧是什么原因| scr是什么| 乡政府属于什么单位| 老年人便秘吃什么好| 什么人容易得阿尔兹海默症| 梦见自己换衣服是什么意思| 铂字五行属什么| 肾盂分离是什么意思| 口腔溃疡缺什么| 感冒适合吃什么饭菜| 阴虱有什么症状| 梦到亲人死了是什么征兆| 5月26日什么星座| 心律不齐吃什么药好| 男人时间短吃什么药好| 祸水什么意思| 钛对人体有什么好处| hvi是什么病| 微尘是什么意思| 2段和3段奶粉有什么区别| 执子之手与子偕老什么意思| 免疫球蛋白低说明什么| 三点水念什么| 口臭是什么原因引起| 吃什么长高| 沉贵宝是什么木| 百香果是什么季节的| 吃什么补红细胞最快| 巧克力囊肿有什么症状表现| 什么的树林| 手上起小水泡痒是什么原因| 醒酒最快的方法是什么| 高考准考证有什么用| 黔驴技穷是什么意思| 六月二十六是什么星座| 女性尿频吃什么药| 什么东西可以止痒| 受凉感冒吃什么药| 调制乳粉是什么意思| 屁股右边痛是什么原因| 大象喜欢吃什么食物| 儿童鼻炎挂什么科| 细菌性肠炎吃什么药| 眼睛散光和近视有什么区别| 阴虚是什么意思| 口渴是什么原因| 喝什么能补肾| 化疗有什么副作用| tf口红是什么牌子| 唔该是什么意思| 吃什么对心脏最好| 早泄吃什么补| 朱元璋为什么杀李善长| superman什么意思| 蛀牙是什么原因引起的| 牙齿遇冷热都痛是什么原因| 地震为什么会发生| 血小板计数偏高是什么意思| 男马配什么属相最好| 干黄酱是什么酱| 薄荷叶晒干后能干什么| qa和qc有什么区别| 指甲盖上有竖纹是什么原因| 少字五行属什么| cg动画是什么意思| 空调多少匹是什么意思| 鸡口牛后是什么生肖| 喝什么茶对睡眠有帮助| n标志的鞋子是什么牌子| 早上吃什么水果最好| 咽喉炎吃什么药| 喝酒后头疼是什么原因| 阁老是什么意思| 垮掉是什么意思| 志趣相投是什么意思| 相得益彰什么意思| 头顶长白头发是什么原因造成的| 川崎病是什么| 肺动脉流的是什么血| 创伤弧菌用什么抗生素| 牵牛花是什么颜色| iabp医学上是什么意思| 蹲不下去是什么原因| 农历2月12日是什么星座| 雷蒙欣氨麻美敏片是什么药| 儿童坐飞机需要带什么证件| 宫腔镜是什么手术| dvf是什么品牌| 溜达鸡是什么意思| 御木本是什么档次| 梦见前夫是什么意思| 甲木代表什么| 马提尼是什么酒| 喉结不明显的男生是什么原因| 在野是什么意思| 白开水喝多了有什么危害| 梦到蛇是什么意思周公解梦| 葡萄不能和什么一起吃| 大专跟本科有什么区别| 消费税是什么| 时光荏苒是什么意思| 三级医院是什么意思| 早上9点多是什么时辰| 肺与什么相表里| 尿酸高去医院挂什么科| 紫色代表什么| 牛肉炖什么好吃又营养| 什么地蹲着| 皮肤痒用什么药膏| 医保统筹支付什么意思| 植物神经紊乱吃什么药| 扁桃体炎吃什么药最好| 什么叫生僻字| 什么是掌跖脓疱病| 什么是纳囊| 脑震荡有什么症状| 骨肉瘤是什么病| 微白蛋白高是什么情况| 蝎子怕什么| 坚持是什么意思| 尿生化是查什么的| 小寒是什么意思| 什么水果解酒| DHL是什么| 月寸读什么| 腰椎间盘突出吃什么药好| 沮丧是什么意思| 中暑了吃什么药| 早博是什么意思| 国师是什么意思| 蛇鼠一窝指什么生肖| 早餐吃什么有营养| 3月10日是什么星座| 急性肠胃炎能吃什么| 卢沟桥事变又称什么| ts是什么品牌| 青蛙长什么样| 喝醋对身体有什么好处| 人工荨麻疹是什么原因引起的| 氢键是什么| 血儿茶酚胺是查什么的| 平反是什么意思| 胃窦是什么意思| 梦见亲人死了是什么意思| 大公鸡衣服是什么牌子| 未见血流信号是什么意思| 子午相冲是什么意思| 十三点是什么意思| 阑尾炎在什么位置疼| 橘子是什么季节的水果| 台湾以前叫什么名字| 小三阳吃什么药| 阳历7月15日是什么星座| 1993年属鸡是什么命| 健脾祛湿吃什么药效果最好| 水印相机是什么意思| 黄皮果什么时候成熟| 隔离霜和防晒霜有什么区别| 百度Jump to content

2018年“健康中原行大医献爱心”健康扶贫专项行动在信阳光山启动

From Wikipedia, the free encyclopedia
Modern prisons are among some of the most physically secure facilities, with almost every area under tight access control and surveillance. Pictured here is the exterior of Shata Prison in Israel, which is secured through the use of high fences, razor wire, protective barriers, guard towers, and security lighting.
Canadian Embassy in Washington, D.C. showing planters being used as vehicle barriers to increase the standoff distance, and barriers and gates along the vehicle entrance.
百度 全面推行权责清单制度,严格规范和约束履职行为,持之以恒深化作风建设,着力打造人民满意的服务型政府机关。

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks).[1] Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.

Overview

[edit]

Physical security systems for protected facilities can be intended to:[2][3][4]

It is up to security designers, architects and analysts to balance security controls against risks, taking into account the costs of specifying, developing, testing, implementing, using, managing, monitoring and maintaining the controls, along with broader issues such as aesthetics, human rights, health and safety, and societal norms or conventions. Physical access security measures that are appropriate for a high security prison or a military site may be inappropriate in an office, a home or a vehicle, although the principles are similar.

Elements and design

[edit]

Deterrence

[edit]

The goal of deterrence methods is to convince potential attackers that a successful attack is unlikely due to strong defenses.

The initial layer of security for a campus, building, office, or other physical space can use crime prevention through environmental design to deter threats. Some of the most common examples are also the most basic: warning signs or window stickers, fences, vehicle barriers, vehicle height-restrictors, restricted access points, security lighting and trenches.[5][6][7][8]

Physical barriers

[edit]
Spikes atop a barrier wall act as a deterrent to people trying to climb over the wall in Aldgate, London
Vehicle barrier at the US Mexico border, 2010 Physical barriers such as security fences, walls, and vehicle barriers act as the outermost layer of security. They serve to prevent, or at least delay, attacks, and also act as a psychological deterrent by defining the perimeter of the facility and making intrusions seem more difficult.

For example, tall fencing, topped with barbed wire, razor wire or metal spikes are often emplaced on the perimeter of a property, generally with some type of signage that warns people not to attempt entry. However, in some facilities imposing perimeter walls or fencing will not be possible (e.g. an urban office building that is directly adjacent to public sidewalks) or it may be aesthetically unacceptable (e.g. surrounding a shopping center with tall fences topped with razor wire); in this case, the outer security perimeter will be generally defined as the walls, windows and doors of the structure itself.[9]

Security lighting

[edit]

Security lighting is another effective form of deterrence. Intruders are less likely to enter well-lit areas for fear of being seen. Doors, gates, and other entrances, in particular, should be well lit to allow close observation of people entering and exiting. When lighting the grounds of a facility, widely distributed low-intensity lighting is generally superior to small patches of high-intensity lighting, because the latter can have a tendency to create blind spots for security personnel and CCTV cameras. It is important to place lighting in a manner that makes it difficult to tamper with (e.g. suspending lights from tall poles), and to ensure that there is a backup power supply so that security lights will not go out if the electricity is cut off.[10] The introduction of low-voltage LED-based lighting products has enabled new security capabilities, such as instant-on or strobing, while substantially reducing electrical consumption.[citation needed]

Security lighting for nuclear power plants in the United States

[edit]

For nuclear power plants in the United States (U.S.), per the U.S. Nuclear Regulatory Commission (NRC), 10 CFR Part 73, [security] lighting is mentioned four times. The most notable mentioning contained in 10 CFR 73.55(i)(6) Illumination, which clearly identifies that licensees "-shall provide a minimum illumination level of 0.2 foot-candles, measured horizontally at ground level, in the isolation zones and appropriate exterior areas within the protected area-". [Ref] This is also the minimum illumination level specified in Table H–2 Minimum Night Firing Criteria of 10 CFR 73 Appendix H, for night firing. Per 10 CFR 73.46(b)(7) "-Tactical Response Team members, armed response personnel, and guards shall qualify and requalify, at least every 12 months, for day and night firing with assigned weapons in accordance with Appendix H-"; therefore on said respective shooting range [at night] per Appendix H, Table H-2, "-all courses [shall have] 0.2 foot-candles at center mass of target area-" applicable to handguns, shotguns, and rifles. [Ref] 1 foot-candle is approximately 10.76 lux, therefore the minimum illumination requirements for the above sections also reflect 2.152 lux.

Intrusion detection and electronic surveillance

[edit]

Alarm systems and sensors

[edit]

Security alarms can be installed to alert security personnel when unauthorized access is attempted. Alarm systems work in tandem with physical barriers, mechanical systems, and security guards, serving to trigger a response when these other forms of security have been breached. They consist of sensors including perimeter sensors, motion sensors, contact sensors, and glass break detectors.[11]

However, alarms are only useful if there is a prompt response when they are triggered. In the reconnaissance phase prior to an actual attack, some intruders will test the response time of security personnel to a deliberately tripped alarm system. By measuring the length of time it takes for a security team to arrive (if they arrive at all), the attacker can determine if an attack could succeed before authorities arrive to neutralize the threat. Loud audible alarms can also act as a psychological deterrent, by notifying intruders that their presence has been detected.[12]

In some U.S. jurisdictions, law enforcement will not respond to alarms from intrusion detection systems unless the activation has been verified by an eyewitness or video.[13] Policies like this one have been created to combat the 94–99 percent rate of false alarm activation in the United States.[14]

Video surveillance

[edit]
Closed-circuit television cameras

Surveillance cameras can be a deterrent[15] when placed in highly visible locations and are useful for incident assessment and historical analysis. For example, if alarms are being generated and there is a camera in place, security personnel assess the situation via the camera feed. In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed. Although the term closed-circuit television (CCTV) is common, it is quickly becoming outdated as more video systems lose the closed circuit for signal transmission and are instead transmitting on IP camera networks.

Video monitoring does not necessarily guarantee a human response. A human must be monitoring the situation in real time in order to respond in a timely manner; otherwise, video monitoring is simply a means to gather evidence for later analysis. However, technological advances like video analytics are reducing the amount of work required for video monitoring as security personnel can be automatically notified of potential security events.[16][17][18]

Access control

[edit]

Access control methods are used to monitor and control traffic through specific access points and areas of the secure facility. This is done using a variety of methods, including CCTV surveillance, identification cards, security guards, biometric readers, locks, doors, turnstiles and gates.[19][20][21]

Mechanical access control systems

[edit]
A drop arm optical turnstile
An electronic access control system, controlling entry through a door

Mechanical access control systems include turnstiles, gates, doors, and locks. Key control of the locks becomes a problem with large user populations and any user turnover. Keys quickly become unmanageable, often forcing the adoption of electronic access control.

Electronic access control systems

[edit]

Electronic access control systems provide secure access to buildings or facilities by controlling who can enter and exit. Some aspects of these systems can include:

  • Access credentials - Access cards, fobs, or badges are used to identify and authenticate authorized users. Information encoded on the credentials is read by card readers at entry points.
  • Access control panels - These control the system, make access decisions, and are usually located in a secure area. Access control software runs on the panels and interfaces with card reader.
  • Readers - Installed at access points, these read credentials or other data, and send information to the access control panel. Readers can be proximity, magnetic stripe, smart card, biometrics, etc.
  • Door locking hardware - Electrified locks, electric strikes, or maglocks physically secure doors and release when valid credentials are presented. Integration allows doors to unlock when authorized.
  • Request to exit devices - These allow free egress through an access point without triggering an alarm. Buttons, motion detectors, and other sensors are commonly used.
  • Alarms - Unauthorized access attempts or held/forced doors can trigger audible alarms and alerts. Integration with camera systems also occurs.
  • Access levels - Software can limit access to specific users, groups, and times. For example, some employees may have 24/7 access to all areas while others are restricted.
  • Event logging - Systems record activity like access attempts, alarms, user tracking, etc. for security auditing and troubleshooting purposes.

Electronic access control uses credential readers, advanced software, and electrified locks to provide programmable, secure access management for facilities. Integration of cameras, alarms and other systems is also common.

An additional sub-layer of mechanical/electronic access control protection is reached by integrating a key management system to manage the possession and usage of mechanical keys to locks or property within a building or campus.[citation needed]

Identification systems and access policies

[edit]

Another form of access control (procedural) includes the use of policies, processes and procedures to manage the ingress into the restricted area. An example of this is the deployment of security personnel conducting checks for authorized entry at predetermined points of entry. This form of access control is usually supplemented by the earlier forms of access control (i.e. mechanical and electronic access control), or simple devices such as physical passes.

Security personnel

[edit]
Private guard of a Chinese factory

Security personnel play a central role in all layers of security. All of the technological systems that are employed to enhance physical security are useless without a security force that is trained in their use and maintenance, and which knows how to properly respond to breaches in security. Security personnel perform many functions: patrolling facilities, administering electronic access control, responding to alarms, and monitoring and analyzing video footage.[22]

See also

[edit]

References

[edit]
  1. ^ "Chapter 1: Physical Security Challenges". Field Manual 3-19.30: Physical Security. Headquarters, United States Department of Army. 2001. Archived from the original on 2025-08-14.
  2. ^ Garcia, Mary Lynn (2007). Design and Evaluation of Physical Protection Systems. Butterworth-Heinemann. pp. 1–11. ISBN 9780080554280. Archived from the original on 2025-08-14.
  3. ^ "Chapter 2: The Systems Approach". Field Manual 3-19.30: Physical Security. Headquarters, United States Department of Army. 2001. Archived from the original on 2025-08-14.
  4. ^ Anderson, Ross (2001). Security Engineering. Wiley. ISBN 978-0-471-38922-4.
  5. ^ For a detailed discussion on natural surveillance and CPTED, see Fennelly, Lawrence J. (2012). Effective Physical Security. Butterworth-Heinemann. pp. 4–6. ISBN 9780124158924. Archived from the original on 2025-08-14.
  6. ^ Task Committee; Structural Engineering Institute (1999). Structural Design for Physical Security. ASCE. ISBN 978-0-7844-0457-7. Archived from the original on 2025-08-14.
  7. ^ Baker, Paul R. (2012). "Security Construction Projects". In Baker, Paul R.; Benny, Daniel J. (eds.). The Complete Guide to Physical Security. CRC Press. ISBN 9781420099638. Archived from the original on 2025-08-14.
  8. ^ "Chapter 4: Protective Barriers". Field Manual 3-19.30: Physical Security. Headquarters, United States Department of Army. 2001. Archived from the original on 2025-08-14.
  9. ^ Talbot, Julian & Jakeman, Miles (2011). Security Risk Management Body of Knowledge. John Wiley & Sons. pp. 72–73. ISBN 9781118211267. Archived from the original on 2025-08-14.
  10. ^ Kovacich, Gerald L. & Halibozek, Edward P. (2003). The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program. Butterworth-Heinemann. pp. 192–193. ISBN 9780750674874. Archived from the original on 2025-08-14.
  11. ^ "Chapter 6: Electronic Security Systems". Field Manual 3-19.30: Physical Security. Headquarters, United States Department of Army. 2001. Archived from the original on 2025-08-14.
  12. ^ Fennelly, Lawrence J. (2012). Effective Physical Security. Butterworth-Heinemann. pp. 345–346. ISBN 9780124158924. Archived from the original on 2025-08-14.
  13. ^ "Evaluation of alternative policies to combat false emergency calls" (PDF). p. 238. Archived from the original (PDF) on 2025-08-14.
  14. ^ "Evaluation of alternative policies to combat false emergency calls" (PDF). p. 233. Archived from the original (PDF) on 2025-08-14.
  15. ^ "Evaluating the Use of Public Surveillance Cameras for Crime Control and Prevention" (PDF). Archived (PDF) from the original on 2025-08-14.
  16. ^ Crowell, William P.; et al. (2011). "Intelligent Video Analytics". In Cole, Eric (ed.). Physical and Logical Security Convergence. Syngress. ISBN 9780080558783. Archived from the original on 2025-08-14.
  17. ^ Dufour, Jean-Yves (2012). Intelligent Video Surveillance Systems. John Wiley & Sons. ISBN 9781118577868. Archived from the original on 2025-08-14.
  18. ^ Caputo, Anthony C. (2010). Digital Video Surveillance and Security. Butterworth-Heinemann. ISBN 9780080961699. Archived from the original on 2025-08-14.
  19. ^ Tyska, Louis A. & Fennelly, Lawrence J. (2000). Physical Security: 150 Things You Should Know. Butterworth-Heinemann. p. 3. ISBN 9780750672559. Archived from the original on 2025-08-14.
  20. ^ "Chapter 7: Access Control". Field Manual 3-19.30: Physical Security. Headquarters, United States Department of Army. 2001. Archived from the original on 2025-08-14.
  21. ^ Pearson, Robert (2011). "Chapter 1: Electronic Access Control". Electronic Security Systems: A Manager's Guide to Evaluating and Selecting System Solutions. Butterworth-Heinemann. ISBN 9780080494708. Archived from the original on 2025-08-14.
  22. ^ Reid, Robert N. (2005). "Guards and guard forces". Facility Manager's Guide to Security: Protecting Your Assets. The Fairmont Press. ISBN 9780881734836. Archived from the original on 2025-08-14.
[edit]
姐姐的老公叫什么 什么是绩效工资 身体机能是什么意思 什么笑组词 什么症状吃柏子养心丸
九门提督相当于现在什么官 联名款是什么意思 伤口拆线挂什么科 为什么支气管炎咳嗽长期不好 血虚是什么原因造成的
脸上长痣是什么原因造成的 g代表什么意思 左手中指戴戒指什么意思 8.2号是什么星座 做肺部ct挂什么科
海豹吃什么 孕酮代表什么 鼻子痒用什么药好 magnesium是什么意思 什么是pp材质
晚上吃什么水果对身体好hcv7jop5ns5r.cn 姓什么的人最多hcv9jop4ns4r.cn 2005年属鸡是什么命huizhijixie.com 大校上面是什么军衔hcv8jop9ns1r.cn 三星是什么军衔hcv8jop0ns2r.cn
苍蝇喜欢什么味道hcv8jop0ns1r.cn 血口喷人是什么意思hcv9jop1ns4r.cn 胃酸过多吃点什么食物比较好hcv9jop2ns9r.cn 积家手表什么档次hcv8jop9ns2r.cn 酸萝卜别吃什么意思hcv7jop6ns6r.cn
活动性肺结核是什么意思hcv8jop1ns0r.cn 无与伦比是什么意思zsyouku.com 哭有什么好处hcv7jop6ns3r.cn 硬核是什么意思hcv8jop5ns9r.cn 孕妇吐得厉害有什么办法解决hcv8jop2ns8r.cn
db是什么意思hcv8jop1ns8r.cn 马与什么属相相克相冲hcv8jop1ns9r.cn kimi是什么意思hcv9jop3ns4r.cn 手指头麻是什么原因引起的hcv8jop9ns9r.cn 妈妈的弟弟的老婆叫什么hcv8jop1ns8r.cn
百度