strategies, also known as the 5D methodology (Figure 1):
Deter, Detect, Deny, Delay and Defend.
The application of the 5D methodology during the
design and application of perimeter protection can
improve the effectiveness of the facility’s security plan
by providing defense at the outermost area of the asset
or target, while simultaneously enhancing the effective-
ness of response personnel.
By focusing on these five security objectives at each
layer of a perimeter, protection mitigation can be
designed in a way that takes the greatest advantage
of each security threat.
DETER
DETECT
July/August 2019 I 21
For purposes of this discussion, emphasis is placed
on one segment of a total security mitigation plan that
starts at the outermost boundary or the site perimeter.
One of the highest at-risk facilities with the greatest
exposure and general accessibility by the public
is an airport.
The examination of airport physical security
(a detailed discussion appears later in this article)
offers a high level of complexity while providing
a variety of considerations in mitigating physical
incursions. However, the principles discussed
herein can apply easily to any type and aspect of
a facility—from the exterior wall of a building to the
most secure interior area.
A sound security mitigation plan is rooted in the
concept of crime prevention through environmental
design (CPTED). The goal of CPTED is to prevent crime
by designing and implementing a physical environment
that positively influences human behavior by leveraging:
• Territoriality
• Natural surveillance
• Access control
• Appearance or perception
Working in conjunction with CPTED
Security-in-depth is based
upon on the application
of five fundamental security
strategies, also known
as the 5D methodology.
is the practice of applying security
protection in multiple rings or layers, also
referred to as security-in-depth. In theory,
the first layer is located at the outermost
boundary of the site, and additional layers
of protection are provided as one moves
inward toward the high-value asset
or target.
It is important that ICT professionals
understand the principles of security-
in-depth in order to design and deploy
the appropriate connectivity, whether
utilizing an optical fiber based fence
detection system or ensuring that
cybersecurity is accompanied by
the appropriate physical security
for their customers.
Security-in-depth is based on the
application of five fundamental security
DENY
DELAY
DEFEND
FIGURE 1: The 5D methodology.