- Home
- Search Result
Search Results
Filter
Topics
Industry
Threats
Article Type
Document Types
1714 results
Use of UAS - Preparing for UAS Operations PDF
Once an organisation has determined that there is a clear operational requirement to include UAS as part of their protective security model, there are a number of considerations that need to be assess...
Use of UAS - Developing an Operational Requirement PDF
There are key considerations organisations should consider when assessing whether there is an appropriate use case for the use of UAS platforms to be included as part of their protective security esta...
Threat image projection (TIP) guidance PDF
Threat image projection (TIP) guidance. TIP is a powerful tool designed to help security officers in their task of x-ray screening.
Week 2 - Key Challenges in Forensic Science PDF
Week 2 - Key Challenges in Forensic Science
Guidance on the control and use of key locks PDF
This document focusses on control of high security key locks. It provides information about secure means of purchase, the use of keys and the decommissioning of mechanical locks and keys. It should be...
Installation of bomb blast net curtains (BBNC) PDF
This note provides guidance on the installation of bomb blast net curtains (BBNC). It summarises recommended methods for installation in existing government office buildings.
Protective Security Risk Management PDF
Effective security risk management requires an organisation to have defined governance with oversight of protective security management systems.
SMC guidance for Religious Establishments PDF
This guidance document provides information on the concept of Security-Minded Communications, which should be considered when publishing information for the public. The guidance can be applied at any ...
Protective Security Risk Management Flowchart PDF
This model highlights the key steps when considering security risk management.