Upload
milo-moody
View
220
Download
0
Tags:
Embed Size (px)
Citation preview
Security of Magazines
SU03 Slide 1
Why Security?
Risk Assessment process Physical security systems built in Perimeter security Access controlled at all times Authorised personnel only Trusted, security cleared staff Accompany temporary staff
SU03 Slide 2
Security Risk Assessment
Financial value of the contents in a facility Active hazards and frequency
• (eg leakages through espionage, theft or diversion)
Passive hazards and frequency • (eg floods, earthquakes, fires, etc)
Attractiveness indicators for active hazards Vulnerability to espionage, theft or diversion Vulnerability to sabotage or terrorist attack
SU03 Slide 3
Attractive to Criminal and Terrorist Organisations (ACTO)
ACTO Item Potential Terrorist Use
MANPADS - Attacks on civil aviation
Detonators - Initiation of Improvised Explosive Devices (IEDs) - Usually strictly controlled on civilian explosives market
Bulk Explosive - Used as main charge for IEDs - More powerful than home-made or commercial explosives
Man-Portable Anti-Tank Missiles - Attacks on VIP vehicles
Hand Grenades - Concealable weapon that can be used in confined spaces
Small Arms Ammunition - Close quarter assassinations
SU03 Slide 4
Security Plan
SU03 Slide 5
Access Control
Keys
Combination Locks
Entry into storage areas
SU03 Slide 6
Keys
SU03 Slide 7
Combination Locks
SU03 Slide 8
Entry
SU03 Slide 9
Locks, Doors, Windows and Grills
SU03 Slide 10
Locks, Doors, Windows and Grills
SU03 Slide 11
Locks, Doors, Windows and Grills
SU03 Slide 12
Staff Vetting
Attributes of Staff:
• Not have criminal convictions and be unlikely to possess criminal tendencies
• Be trained effectively
• Be likely to remain loyal, well motivated and appropriately rewarded
SU03 Slide 13
Staff Vetting
Elements of Vetting:
• Confirming an individual’s identity
• Looking at associations that may cause a conflict of interest
• Determining vulnerabilities in an individual’s life through which improper pressure could be applied
SU03 Slide 14
Diversion Risk
SU03 Slide 15
Worked Example
Remember – we are trying to reduce risk
to tolerable and ALARP
StartStart
Definition of intended use and reasonably
foreseen misuse
Definition of intended use and reasonably
foreseen misuse
Hazard IdentificationHazard Identification
Risk EstimationRisk Estimation
Risk EvaluationRisk Evaluation
Is tolerable risk
achieved?
Is tolerable risk
achieved?
StopStop
Risk Reduction
Risk Reduction
Ris
k A
naly
sis
Ris
k A
sses
smen
t
YESNO
SU03 Slide 16
Questions?
SU03 Slide 17