This section provides some fundamental security concepts that place physical security into the context of overall facility security. The components of security include deception, intelligence, operational protection, and structural hardening. These components are interrelated (see Figure 5-1).

Ideally, a potential terrorist attack is prevented or pre-empted through intelligence measures. If the attack does occur, physical security measures combine with operational forces (e.g., surveillance, guards, and sensors) to provide layers of defense that delay and/or thwart the attack. Deception may be used to make the facility appear to be a more protected or lower-risk facility than it actually is, thereby making it appear to be a less attractive target. Deception can also be used to misdirect the attacker to a portion of the facility that is non-critical. As a last resort, structural hardening is provided to save lives and facilitate evacuation and rescue by preventing building collapse and limiting flying debris.
Because of the interrelationship between physical and operational security measures, it is imperative for the owner and security professional to define early in the design process what extent of operational security is planned for various threat levels.
If properly implemented, physical security measures will contribute toward the goals listed below in prioritized order.
An effective way to implement these goals is to create layers of security within the facility (see Figure 5-2). The outermost layer is the perimeter of the facility. Interior to this line is the approach zone to the facility, then the building exterior, and finally the building interior. The interior of the building may be divided into successively more protected zones, starting with publicly accessible areas such as the lobby and retail space, to the more private areas of offices, and finally the vital functions such as the control room and emergency functions. The advantage of this approach is that once a line of protection is breached, the facility has not been completely compromised. Having multiple lines of defense provides redundancy to the security system, adding robustness to the design. Also, by using this approach, not all of the focus is on the outer layer of protection, which may lead to an unattractive, fortress-like appearance.
