search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
THE PROCESS OF


security design:


T


he process of security design involves systematically planning, implementing, and managing security measures to protect assets, people, and information within a given environment. Understanding the environment is critical to ensuring that the security being suggested, whether physical, technical or deployment of officers, will be effective and efficient.


Overall, these options when employed, either in isolation or combined, need to make sure deterrence, detection and reporting are the main aims.


The following steps are an overview of what is involved in the security design process.


Define Security Objectives:


Begin by clearly defining the security objectives and goals of the project. Understand what needs to be protected, the potential threats, and the desired level of security. This is where intimate knowledge of the environment is essential and also identifying the risk appetite from key decision makers; this can set initial thresholds and offer an understanding of costs and any restrictions. Better to understand this from the outset than later in the project or on completion. This also means that “value engineering” can be avoided in the overall design and implementation of the security being proposed.


Risk Assessment:


Conduct a comprehensive risk assessment to identify potential threats, vulnerabilities, and risks associated with the environment. This step helps prioritise security measures. Although an obvious element, I am sure we can all give examples of glaring holes or issues


19 © CITY SECURITY MAGAZINE – WINTER 2023


in inherited security systems that cause issues, have obvious weakness and are generally detrimental to overall security integrity.


Regulatory Compliance:


Ensure that your security design complies with relevant laws, regulations, and industry standards. Different industries and locations may have specific security requirements that must be met. It also dictates the level of security you need and can assist in realistic costs and specific needs. As an example, if HVM does not need to meet PAS 68/69 criteria, then establishing a good alternative will save considerable amounts of money. It is also important to ensure that any insurance requirements are met; the appropriate security rating (SR) levels may be dictated by insurance policies. Secured by Design (SBD) is an excellent reference point, as is the National Protective Security Authority (NPSA) to recommend appropriate assistance and standards.


Security Policies and Procedures:


Develop security policies and procedures that outline the rules and guidelines for implementing proposed security measures. These policies should cover areas like access control, incident response, and employee security awareness. Where this needs to be


www.citysecuritymagazine.com


emphasised is the application and adherence to these. There is no point in having them in line with appropriately designed security and then have them ignored through convenience, bad practice, or apathy. They also need to be drilled and tested at regular intervals.


Access Control:


Determine who should have access to various areas, systems, and information. Implement access control measures, which may include key card systems, biometric authentication, or password policies, to enforce these restrictions. Too often we see blanket access to appease clients, operators and others that have no real need to be in certain areas or have that specific access. There are many instances where control of keys, passes and other elements is given through perceived entitlement. This leads to difficulties in auditing and an additional risk in terms of cost in replacing or managing lost security passes etc.


Physical Security Measures:


Implement physical security measures such as locks, fences, bollards, and barriers to protect assets and facilities. Although this seems to be a very obvious thing to mention, it is often overlooked or the most basic measures are implemented. Examples I have seen range from chipboard to cover gaps in fencing that is a supposed “temporary” measure, and heavy duty padlocked gates that can be climbed over or under. I am sure we have all seen these!


Surveillance and Monitoring:


Deploy surveillance systems (e.g. CCTV cameras) to monitor and record activities in critical areas, with suitable operations/control room or process to manage this. I could write forever on the issues of surveillance, poor


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36