Access delay serves the function of ensuring that the response force has adequate time to interrupt the adversary from completing their desired task after they have been detected. Delay can be incurred through fixed barriers, activated delay, or by responders. The amount of delay provided by a barrier will depend on the characteristics of the barrier as well as the tools that the adversary has to penetrate them (which are defined in the DBT). Barrier penetration can involve passing under, over, around or through a barrier. It is important to note that delay does not occur until after the adversary has been detected.
A good delay system has two characterics. The first is that it exhibit a balanced design so that there are no weak links in the system. This means that all elements of a security layer have similar delay characteristics. The second characteristic is delay-in-depth, where there are multiple layers of delay and subsequent layers cannot be defeated using the same tactics.
Page 17 / 33