17
Security of Magazines SU03 Slide 1

Security of Magazines SU03 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access controlled

Embed Size (px)

Citation preview

Page 1: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Security of Magazines

SU03 Slide 1

Page 2: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Why Security?

Risk Assessment process Physical security systems built in Perimeter security Access controlled at all times Authorised personnel only Trusted, security cleared staff Accompany temporary staff

SU03 Slide 2

Page 3: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Security Risk Assessment

Financial value of the contents in a facility Active hazards and frequency

• (eg leakages through espionage, theft or diversion)

Passive hazards and frequency • (eg floods, earthquakes, fires, etc)

Attractiveness indicators for active hazards Vulnerability to espionage, theft or diversion Vulnerability to sabotage or terrorist attack

SU03 Slide 3

Page 4: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Attractive to Criminal and Terrorist Organisations (ACTO)

ACTO Item Potential Terrorist Use

MANPADS - Attacks on civil aviation

Detonators - Initiation of Improvised Explosive Devices (IEDs) - Usually strictly controlled on civilian explosives market

Bulk Explosive - Used as main charge for IEDs - More powerful than home-made or commercial explosives

Man-Portable Anti-Tank Missiles - Attacks on VIP vehicles

Hand Grenades - Concealable weapon that can be used in confined spaces

Small Arms Ammunition - Close quarter assassinations

SU03 Slide 4

Page 5: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Security Plan

SU03 Slide 5

Page 6: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Access Control

Keys

Combination Locks

Entry into storage areas

SU03 Slide 6

Page 7: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Keys

SU03 Slide 7

Page 8: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Combination Locks

SU03 Slide 8

Page 9: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Entry

SU03 Slide 9

Page 10: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Locks, Doors, Windows and Grills

SU03 Slide 10

Page 11: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Locks, Doors, Windows and Grills

SU03 Slide 11

Page 12: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Locks, Doors, Windows and Grills

SU03 Slide 12

Page 13: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Staff Vetting

Attributes of Staff:

• Not have criminal convictions and be unlikely to possess criminal tendencies

• Be trained effectively

• Be likely to remain loyal, well motivated and appropriately rewarded

SU03 Slide 13

Page 14: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Staff Vetting

Elements of Vetting:

• Confirming an individual’s identity

• Looking at associations that may cause a conflict of interest

• Determining vulnerabilities in an individual’s life through which improper pressure could be applied

SU03 Slide 14

Page 15: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Diversion Risk

SU03 Slide 15

Page 16: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Worked Example

Remember – we are trying to reduce risk

to tolerable and ALARP

StartStart

Definition of intended use and reasonably

foreseen misuse

Definition of intended use and reasonably

foreseen misuse

Hazard IdentificationHazard Identification

Risk EstimationRisk Estimation

Risk EvaluationRisk Evaluation

Is tolerable risk

achieved?

Is tolerable risk

achieved?

StopStop

Risk Reduction

Risk Reduction

Ris

k A

naly

sis

Ris

k A

sses

smen

t

YESNO

SU03 Slide 16

Page 17: Security of Magazines SU03 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access controlled

Questions?

SU03 Slide 17