Like this CertiGuide? Get it in PDF format!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Also available: 300-question Security+ practice test!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Security+
 9  Chapter 5:  Operational/Organizational Security (Domain 5.0; 15%)
      9  5.1  Physical Security
           9  5.1.1  Access Control

Previous Topic/Section
5.1.1  Access Control
Previous Page
Pages in Current Topic/Section
1
Next Page
5.1.1.2  Biometrics
Next Topic/Section

5.1.1.1  Physical Barriers

Good defense employs concentric rings of security. This term involves two thoughts in one term. The first is the process of effective physical security creating layered perimeters in circles that get tighter with each circle. In addition to tighter rings, as the core is approached, certain (mind & emotion) principles are applied. Once again, three points are to be considered when applying physical security to a sensitive area. For security zones they are:

  1. The outermost ring or perimeter should be the first line of defense and should contain the public activities. Continuing inward, more security measures should be incorporated as one approaches the private or high-risk areas.

  2. Prominent use of signage (symbolic language), architectural elements and natural and man-made barriers should be utilized to signify the transition from public to semi-private, and finally, private space.

  3. Clear border definition should be provided for the controlled space.

Further, there are territorial behavior strategies that contribute to physical security. There are guidelines for this aspect as well. These include:

  • Create elements to reinforce the feeling of proprietorship within an area. Use signage, reflecting the purpose of the area.

  • The physical area should support legitimate users. Architectural amenities should not attract undesirable behavior or provide concealment points.

  • Provide natural barriers for controlling activities that conflict with the purpose of the area.

Previous Topic/Section
5.1.1  Access Control
Previous Page
Pages in Current Topic/Section
1
Next Page
5.1.1.2  Biometrics
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.