Consideration #3: Overt and Covert Systems
When installing a security system, there are interesting psychological ramifications that KTC takes into consideration to create the ultimate system for our clients. We want visitors, wanted and unwanted, to know that our sites are fully secured. We use visible cameras, guns and other systems that make all parties aware of the security measures taken. This fact, to the trained eye, is a sign of a well-formed covert security system as well as overt. Ideally, the overt and covert systems should work together to reinforce one another.
We use covert designed sensors that workContinue Reading
Tag-Archive for » securing assets «
Wednesday, July 24th, 2013 by Dr. C. Robert Kline
Category: News, Physical Security Systems
Tags: covert systems, overt systems, physical security, secure assets, securing assets
Comments off
Monday, July 08th, 2013 by Dr. C. Robert Kline
Consideration #2: Scalability, Flexibility, Installation and Disruption of Flow
When considering security for any asset many people look only into the foreseeable future. One of the most valuable features that KTC offers is an ability to scale any project for size, cost and other variables. In many cases the project is so large it must be done in phases. In these situations we know the scalability of the project and we add the element of flexibility with the installation. With our plans we are able to close sections of a factory or port to install security measures while other locationsContinue Reading
Category: News, Physical Security Systems
Tags: physical security, port security, secure assets, securing assets
Comments off
Thursday, June 06th, 2013 by Dr. C. Robert Kline
Consideration #1: Requirements Definition and Cost
The first step in any security and protection assignment is to determine to what extent a subject will be protected. This will take into account several factors.
Threat
What is the direct threat to the asset? Is the threat coming from a physical attack or a technology system attack? From an unknown source?
Vulnerabilities
Where is the asset vulnerable? The size and type of the asset will determine what types of vulnerabilities could open it for an attack. Larger assets like a tanker will have very different vulnerabilities than a piece of software.
Value of Asset
We must establishContinue Reading
Category: Physical Security Systems
Tags: physical security, secure assets, securing assets, threat
Comments off