Time
2 hours 33 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:01
Hello, everyone. And welcome back to cyber is and user physical security Course, this is module 2.1 perimeter access control measures. And I'm your instructor, Corey Holder,
00:14
for this lesson. I have three learning objectives. First, will define and understand the importance of limiting avenues of approach
00:22
will understand the importance of controlling the flow of vehicular and also foot traffic towards our buildings or campus.
00:33
So what is an avenue of approach?
00:35
Well, it comes from military strategy,
00:38
and it's basically
00:40
the routes that
00:42
someone can take in order to get to a destination.
00:47
I'm not talking about Google maps, but I'm talking about the different paths one contagious
00:53
in order to get to their destination.
00:56
So it's important from a security standpoint to limit these.
01:00
First of all,
01:03
it makes it easier to know who's coming and going,
01:06
and it also means we can control the flow of traffic.
01:11
Now, as you look at this map here, a map of my alma mater, ST John's University in New York,
01:18
you'll see we have
01:21
major roadways like Utopia Parkway, Grand Central Parkway,
01:26
Union Turnpike,
01:26
basically creating the perimeter for the school.
01:30
Now let's say I wanted to get to ST Albert's hole for class. Well, I know I can go in Gate five or Gate four if I'm going coming in along. You took Union, Part Turnpike.
01:42
Or, if I'm coming up Utopia Parkway from Grand Central,
01:46
I can turn in the main gate, follow the road around and get myself to ST Albert Hall.
01:51
Now
01:52
what you're seeing here is how avenues of approach work
01:57
they're controlled by a perimeter fence
02:00
and specific gates where security could be placed to ensure that
02:05
in this case, the school knows who's coming and going.
02:12
So why do we limit avenues of approach? Well,
02:15
when we're talking about security, if we
02:17
don't know where the adversary is coming from,
02:22
we can stop them. We can't react fast enough.
02:25
Just like our world cities
02:28
back. In medieval times,
02:30
wolves around
02:31
a college campus or a business complex
02:36
helps us to control what pads
02:38
someone can take to enter the facility. It also means that we can have positive control over the flow of traffic.
02:51
So what is an access control point? Well, that's Doctor Gate.
02:54
It's where people are coming into or exiting from your facility,
03:00
and
03:01
because you have
03:04
a structure there
03:06
like a access gate or ah,
03:09
or a guard shack.
03:12
You can control and stop people as they enter and exit.
03:17
So let's look at this diagram here. This
03:21
We have
03:22
basically our main roadway out here
03:24
on on the left. We have two lanes for entering traffic. We have one lane for exiting traffic, and we're not is worried about checking ID's as people leave as we are about controlling the flow coming in.
03:39
We also have a visitor center here, and you have a parking lot. And this would be where visitors for the first time,
03:46
who are coming to the facility for the first time,
03:49
would actually check in present their i. D. They're credentials. Explain who they're here to see,
03:55
etcetera
03:57
and then,
04:00
in order to enhance security way could potentially put an active barrier here. So if someone just decided, Well, I'm gonna skip the visitor center and try to go around
04:11
observance. Security can activate a barrier and prevent someone from bypassing security measures.
04:23
So
04:24
what is the importance of an access control point for vehicular traffic?
04:29
Well,
04:30
like we said before, we're limiting access avenues of approach so are limiting
04:35
we're reducing the number that they can approach from. We can also apply intrusion protection or detection methods.
04:45
Some have heavily guarded facilities. Would have
04:47
Uh huh
04:48
scanners.
04:50
They could also use mirrors on rollers to check the undersides of cars of
04:56
If you remember after 9 11 if you're like me. When I lived in New York,
05:01
heightened security was a very big deal.
05:04
Cars would be checked.
05:06
Drivers would be as to get out of their vehicle, opened the trunk, open the hood of the car so that the car could be examined to make sure they weren't bringing in something into a facility that didn't belong there.
05:19
Another measure weaken due to control speed of traffic. So if someone doesn't ram
05:26
the guard shack or potentially hurt the guards or security force that air there, we can employ something like the
05:34
the Barrick, the barricades that you see here in the lower right.
05:39
By forcing the vehicle to go around and make these tight turns,
05:44
the driver is unable to gain sufficient speed in order to
05:48
run over someone,
05:50
maybe
05:51
break through a gate or just
05:55
get past security without going through the proper checks.
06:00
Now for foot traffic is a little different because, of course,
06:04
you know barricades don't necessary work as well. So we use things like turnstiles like the one you see here.
06:11
Uh,
06:12
employees, contractors. People who are
06:16
regularly work within the facility might have a badge that they could swipe or pin code that they can enter toe. Let them through the turnstile. For someone who's a visitor, they have to call upon a phone
06:30
to the to to the gate guard and say, I need access.
06:33
They can let them through the turnstile. And at that point, since they know the person is there,
06:40
they can check credentials. They can direct them to the visitor center, or they can allow them through once they've been validated.
06:48
So let's do a check on learning
06:51
all of the following. Blocked the avenue approach except
06:57
crash proof gates
06:59
reinforce walls,
07:00
obstacle placement
07:01
or permanent spike strips,
07:18
and the answer is
07:20
obstacle placement. Now, while obstacle placement plays an important role in the security, it isn't designed to stop
07:29
or block an avenue of approach. It is Onley designed to slow the speed of the vehicle as it navigates through the obstacles
07:38
in order that the
07:40
the driver cannot use his vehicle as a weapon against security forces.
07:46
So in this lesson we discussed three key topics. First, we defined and discussed avenues of approach.
07:55
We talked about how to control the flow of vehicular traffic
07:59
and we finished up discussing controlling the flow of foot traffic.
08:03
I want to thank you for taking the time to
08:07
join me in this lesson, and I look forward to seeing you in future lessons.

Up Next

End User Physical Security

This course will introduce you to physical security and why it is important. We’ll do some time travel and go back in time to discuss ancient physical security methods.

Instructed By

Instructor Profile Image
Corey Holzer
Information Systems Engineer
Instructor