. . . . "Bezpiecze\u0144stwo fizyczne"@pl . . . . . . . . . . . . "\u0410\u0432\u0442\u043E\u043C\u0430\u0442\u0438\u0437\u043E\u0301\u0432\u0430\u043D\u0430 \u0441\u0438\u0441\u0442\u0435\u0301\u043C\u0430 \u043A\u043E\u043D\u0442\u0440\u043E\u0301\u043B\u044E \u0434\u043E\u0301\u0441\u0442\u0443\u043F\u0443 \u2014 \u0435\u043B\u0435\u043A\u0442\u0440\u043E\u043D\u043D\u0430 \u0447\u0438 \u0435\u043B\u0435\u043A\u0442\u0440\u043E\u043D\u043D\u043E-\u043C\u0435\u0445\u0430\u043D\u0456\u0447\u043D\u0430 \u0441\u0438\u0441\u0442\u0435\u043C\u0430, \u0449\u043E \u043F\u0440\u0438\u0437\u043D\u0430\u0447\u0435\u043D\u0430 \u0434\u043B\u044F \u043D\u0430\u0434\u0430\u043D\u043D\u044F \u0434\u043E\u0437\u0432\u043E\u043B\u0443 \u043D\u0430 \u043F\u0440\u043E\u0445\u0456\u0434 \u043F\u0435\u0440\u0441\u043E\u043D\u0430\u043B\u0443, \u043F\u0440\u043E\u0457\u0437\u0434 \u0442\u0440\u0430\u043D\u0441\u043F\u043E\u0440\u0442\u043D\u0438\u0445 \u0437\u0430\u0441\u043E\u0431\u0456\u0432 \u0430\u0431\u043E \u043F\u0435\u0440\u0435\u043C\u0456\u0449\u0435\u043D\u043D\u044F \u043C\u0430\u0442\u0435\u0440\u0456\u0430\u043B\u0456\u0432 \u0447\u0435\u0440\u0435\u0437 \u0432\u0445\u0456\u0434 (\u0432\u0438\u0445\u0456\u0434) \u043A\u043E\u043D\u0442\u0440\u043E\u043B\u044C\u043D\u043E-\u043F\u0440\u043E\u043F\u0443\u0441\u043A\u043D\u0438\u0445 \u043F\u0443\u043D\u043A\u0442\u0456\u0432 \u0437\u043E\u043D \u043E\u0431\u043C\u0435\u0436\u0435\u043D\u043D\u044F \u0434\u043E\u0441\u0442\u0443\u043F\u0443. \u041D\u0430\u0439\u0447\u0430\u0441\u0442\u0456\u0448\u0435 \u0432\u0438\u043A\u043E\u0440\u0438\u0441\u0442\u043E\u0432\u0443\u0454\u0442\u044C\u0441\u044F \u0432 \u043C\u0435\u0442\u0440\u043E\u043F\u043E\u043B\u0456\u0442\u0435\u043D\u0456."@uk . . . . "Bezpiecze\u0144stwo fizyczne \u2013 zapewnienie ochrony pomieszcze\u0144, sprz\u0119t\u00F3w, infrastruktury oraz personelu przed bezpo\u015Brednim dzia\u0142aniem czynnik\u00F3w fizycznych i zdarze\u0144 takich jak: po\u017Car, pow\u00F3d\u017A, kradzie\u017C, wandalizm, terroryzm. Bezpiecze\u0144stwo fizyczne uzyskuje si\u0119 poprzez kombinacj\u0119 \u015Brodk\u00F3w zabezpiecze\u0144: Inne \u015Brodki zapewniaj\u0105ce bezpiecze\u0144stwo fizyczne: \n* kontrola dost\u0119pu \n* karta identyfikacyjna \n* biometria \n* ogrodzenie \n* brama \n* drut kolczasty \n* ochrona mienia \n* pracownik ochrony"@pl . . . . . . . . . . "\uBB3C\uB9AC\uBCF4\uC548(physical security)\uC740 \uBC94\uC8C4 \uB4F1 \uC8FC\uB85C \uACE0\uC758\uC801 \uC704\uD611(threat)\uC73C\uB85C\uBD80\uD130 \uC778\uBA85, \uC2DC\uC124, \uC815\uBCF4 \uB4F1\uC758 \uC790\uC0B0(asset)\uC744 \uBCF4\uD638\uD558\uAE30 \uC704\uD574 \uBB3C\uB9AC\uC801 \uCDE8\uC57D\uC131(vulnerability)\uC744 \uD1B5\uC81C\uD558\uB294 \uD65C\uB3D9\uC774\uB2E4. \uADF8 \uD1B5\uC81C\uC218\uB2E8\uC740 \uAC74\uCD95\uBB3C\uC774\uB098 \uBCF4\uC548 \uAD00\uB828 \uC124\uBE44 \uB4F1\uC758 \uAD6C\uC870\uC801(structural) \uC694\uC18C, \uBCF4\uC548\uC2DC\uC2A4\uD15C \uB4F1\uC758 \uC804\uC790\uC801(electronic) \uC694\uC18C\uC640 \uBCF4\uC548\uC694\uC6D0 \uB4F1\uC758 \uC778\uC801(human) \uC694\uC18C\uB85C \uAD6C\uC131\uB41C\uB2E4.(\uC774\uC0C1\uD76C,\uC774\uC8FC\uB77D,2017)"@ko . . . . . . . . . . . . "\uBB3C\uB9AC\uBCF4\uC548(physical security)\uC740 \uBC94\uC8C4 \uB4F1 \uC8FC\uB85C \uACE0\uC758\uC801 \uC704\uD611(threat)\uC73C\uB85C\uBD80\uD130 \uC778\uBA85, \uC2DC\uC124, \uC815\uBCF4 \uB4F1\uC758 \uC790\uC0B0(asset)\uC744 \uBCF4\uD638\uD558\uAE30 \uC704\uD574 \uBB3C\uB9AC\uC801 \uCDE8\uC57D\uC131(vulnerability)\uC744 \uD1B5\uC81C\uD558\uB294 \uD65C\uB3D9\uC774\uB2E4. \uADF8 \uD1B5\uC81C\uC218\uB2E8\uC740 \uAC74\uCD95\uBB3C\uC774\uB098 \uBCF4\uC548 \uAD00\uB828 \uC124\uBE44 \uB4F1\uC758 \uAD6C\uC870\uC801(structural) \uC694\uC18C, \uBCF4\uC548\uC2DC\uC2A4\uD15C \uB4F1\uC758 \uC804\uC790\uC801(electronic) \uC694\uC18C\uC640 \uBCF4\uC548\uC694\uC6D0 \uB4F1\uC758 \uC778\uC801(human) \uC694\uC18C\uB85C \uAD6C\uC131\uB41C\uB2E4.(\uC774\uC0C1\uD76C,\uC774\uC8FC\uB77D,2017)"@ko . . . . "\u0410\u0432\u0442\u043E\u043C\u0430\u0442\u0438\u0437\u043E\u0301\u0432\u0430\u043D\u0430 \u0441\u0438\u0441\u0442\u0435\u0301\u043C\u0430 \u043A\u043E\u043D\u0442\u0440\u043E\u0301\u043B\u044E \u0434\u043E\u0301\u0441\u0442\u0443\u043F\u0443 \u2014 \u0435\u043B\u0435\u043A\u0442\u0440\u043E\u043D\u043D\u0430 \u0447\u0438 \u0435\u043B\u0435\u043A\u0442\u0440\u043E\u043D\u043D\u043E-\u043C\u0435\u0445\u0430\u043D\u0456\u0447\u043D\u0430 \u0441\u0438\u0441\u0442\u0435\u043C\u0430, \u0449\u043E \u043F\u0440\u0438\u0437\u043D\u0430\u0447\u0435\u043D\u0430 \u0434\u043B\u044F \u043D\u0430\u0434\u0430\u043D\u043D\u044F \u0434\u043E\u0437\u0432\u043E\u043B\u0443 \u043D\u0430 \u043F\u0440\u043E\u0445\u0456\u0434 \u043F\u0435\u0440\u0441\u043E\u043D\u0430\u043B\u0443, \u043F\u0440\u043E\u0457\u0437\u0434 \u0442\u0440\u0430\u043D\u0441\u043F\u043E\u0440\u0442\u043D\u0438\u0445 \u0437\u0430\u0441\u043E\u0431\u0456\u0432 \u0430\u0431\u043E \u043F\u0435\u0440\u0435\u043C\u0456\u0449\u0435\u043D\u043D\u044F \u043C\u0430\u0442\u0435\u0440\u0456\u0430\u043B\u0456\u0432 \u0447\u0435\u0440\u0435\u0437 \u0432\u0445\u0456\u0434 (\u0432\u0438\u0445\u0456\u0434) \u043A\u043E\u043D\u0442\u0440\u043E\u043B\u044C\u043D\u043E-\u043F\u0440\u043E\u043F\u0443\u0441\u043A\u043D\u0438\u0445 \u043F\u0443\u043D\u043A\u0442\u0456\u0432 \u0437\u043E\u043D \u043E\u0431\u043C\u0435\u0436\u0435\u043D\u043D\u044F \u0434\u043E\u0441\u0442\u0443\u043F\u0443. \u041D\u0430\u0439\u0447\u0430\u0441\u0442\u0456\u0448\u0435 \u0432\u0438\u043A\u043E\u0440\u0438\u0441\u0442\u043E\u0432\u0443\u0454\u0442\u044C\u0441\u044F \u0432 \u043C\u0435\u0442\u0440\u043E\u043F\u043E\u043B\u0456\u0442\u0435\u043D\u0456."@uk . "Unter Bewachung wird die Sicherung eines Objektes verstanden."@de . "\uBB3C\uB9AC \uBCF4\uC548"@ko . "58725"^^ . "1123661582"^^ . . . . . . . . . . . . "Physical security"@en . . "La sicurezza fisica \u00E8 il complesso di misure che prevengono o dissuadono gli attaccanti dall'accedere a un locale, a una risorsa o a informazioni e delle linee guida su come progettare strutture in grado di resistere ad atti ostili. Pu\u00F2 essere semplice come una serratura di una porta o elaborato, come una struttura di guardie giurate armate e . La sicurezza fisica non \u00E8 un concetto moderno. La sicurezza fisica esiste per scoraggiare le persone ad entrare in una struttura. Esempi storici di sicurezza fisica comprendono le mura cittadine, i fossati. Il fattore chiave \u00E8 che la tecnologia usata per la sicurezza fisica \u00E8 cambiata nel tempo. Mentre nelle ere passate, non c'erano tecnologie basate sull'infrarosso passivo (Passive Infrared, PIR), sistemi di controllo accessi elettronici, o telecamere di un sistema di videosorveglianza, la metodologia base della sicurezza fisica non \u00E8 mutata nel tempo."@it . . . "Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property."@en . . . . "Seguridad F\u00EDsica es el conjunto de mecanismos y acciones que buscan la detecci\u00F3n y prevenci\u00F3n de riesgos, con el fin de proteger alg\u00FAn recurso o bien material.\u200B En el caso de recintos como edificios, oficinas, residencias, otros, se entiende como, los mecanismos que llevan a disminuir las probabilidades que ocurran eventos que atenten contra el bienestar de los individuos y sus posesiones (robos, violaciones, entre otros)."@es . . . . . "\u0623\u0645\u0646 \u0645\u0627\u062F\u064A"@ar . . . . . . . . . . . . . . . . . . "Sicurezza fisica"@it . . . . . . . . . . . "Bewachung"@de . . . "Unter Bewachung wird die Sicherung eines Objektes verstanden."@de . . . . . . "Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property."@en . . . . . . . . . . . . . "\u064A\u0635\u0641 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0645\u0627\u062F\u064A Physical security \u0627\u0644\u062A\u062F\u0627\u0628\u064A\u0631 \u0627\u0644\u0623\u0645\u0646\u064A\u0629 security \u0627\u0644\u062A\u064A \u062A\u0645 \u062A\u0635\u0645\u064A\u0645\u0647\u0627 \u0644\u0645\u0646\u0639 \u0627\u0644\u0648\u0635\u0648\u0644 \u063A\u064A\u0631 \u0627\u0644\u0645\u0635\u0631\u062D \u0628\u0647 \u0625\u0644\u0649 \u0627\u0644\u0645\u0631\u0627\u0641\u0642 \u0648\u0627\u0644\u0645\u0639\u062F\u0627\u062A \u0648\u0627\u0644\u0645\u0648\u0627\u0631\u062F\u060C \u0648\u062D\u0645\u0627\u064A\u0629 \u0627\u0644\u0623\u0641\u0631\u0627\u062F \u0648\u0627\u0644\u0645\u0645\u062A\u0644\u0643\u0627\u062A \u0645\u0646 \u0627\u0644\u062A\u0644\u0641 \u0623\u0648 \u0627\u0644\u0636\u0631\u0631 (\u0645\u062B\u0644 \u0627\u0644\u062A\u062C\u0633\u0633 Espionage \u0623\u0648 \u0627\u0644\u0633\u0631\u0642\u0629 Theft\u060C \u0623\u0648 \u0627\u0644\u0647\u062C\u0645\u0627\u062A \u0627\u0644\u0625\u0631\u0647\u0627\u0628\u064A\u0629 Terrorist). \u064A\u0646\u0637\u0648\u064A \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0645\u0627\u062F\u064A \u0639\u0644\u0649 \u0627\u0633\u062A\u062E\u062F\u0627\u0645 \u0637\u0628\u0642\u0627\u062A \u0645\u062A\u0639\u062F\u062F\u0629 \u0645\u0646 \u0646\u0638\u0645 \u0645\u062A\u0631\u0627\u0628\u0637\u0629\u060C \u062A\u0634\u0645\u0644 \u0627\u0644\u062F\u0648\u0627\u0626\u0631 \u0627\u0644\u062A\u0644\u0641\u0632\u064A\u0648\u0646\u064A\u0629 \u0627\u0644\u0645\u063A\u0644\u0642\u0629 CCTV\u060C \u0648\u062D\u0631\u0627\u0633 \u0627\u0644\u0623\u0645\u0646 Security guards\u060C \u062D\u0648\u0627\u062C\u0632 \u0648\u0627\u0642\u064A\u0629 Protective barriers\u060C \u0648\u0627\u0644\u0623\u0642\u0641\u0627\u0644 locks\u060C \u0648\u0628\u0631\u0648\u062A\u0648\u0643\u0648\u0644\u0627\u062A \u0627\u0644\u062A\u062D\u0643\u0645 \u0641\u064A \u0627\u0644\u0648\u0635\u0648\u0644 Access control \u060C \u0648\u0627\u0644\u0639\u062F\u064A\u062F \u0645\u0646 \u0627\u0644\u062A\u0642\u0646\u064A\u0627\u062A \u0627\u0644\u0623\u062E\u0631\u0649."@ar . . "Bezpiecze\u0144stwo fizyczne \u2013 zapewnienie ochrony pomieszcze\u0144, sprz\u0119t\u00F3w, infrastruktury oraz personelu przed bezpo\u015Brednim dzia\u0142aniem czynnik\u00F3w fizycznych i zdarze\u0144 takich jak: po\u017Car, pow\u00F3d\u017A, kradzie\u017C, wandalizm, terroryzm. Bezpiecze\u0144stwo fizyczne uzyskuje si\u0119 poprzez kombinacj\u0119 \u015Brodk\u00F3w zabezpiecze\u0144: \n* pasywnych: \n* odstraszaj\u0105cych lub zapobiegaj\u0105cych zagro\u017Ceniom \u2013 np. oznakowanie terenu prywatnego, \n* op\u00F3\u017Aniaj\u0105cych niekorzystne dzia\u0142ania \u2013 np. ogrodzenia, sejfy, \n* aktywnych: \n* wykrywaj\u0105cych zagro\u017Cenie \u2013 np. telewizja przemys\u0142owa, systemy alarmowe, \n* przeciwdzia\u0142aj\u0105cych zagro\u017Ceniom \u2013 np. systemy ga\u015Bnicze, ochrona mienia. Inne \u015Brodki zapewniaj\u0105ce bezpiecze\u0144stwo fizyczne: \n* kontrola dost\u0119pu \n* karta identyfikacyjna \n* biometria \n* ogrodzenie \n* brama \n* drut kolczasty \n* ochrona mienia \n* pracownik ochrony"@pl . "23943"^^ . "La sicurezza fisica \u00E8 il complesso di misure che prevengono o dissuadono gli attaccanti dall'accedere a un locale, a una risorsa o a informazioni e delle linee guida su come progettare strutture in grado di resistere ad atti ostili. Pu\u00F2 essere semplice come una serratura di una porta o elaborato, come una struttura di guardie giurate armate e ."@it . . . . . . . . . . . "\u0410\u0432\u0442\u043E\u043C\u0430\u0442\u0438\u0437\u043E\u0432\u0430\u043D\u0430 \u0441\u0438\u0441\u0442\u0435\u043C\u0430 \u043A\u043E\u043D\u0442\u0440\u043E\u043B\u044E \u0434\u043E\u0441\u0442\u0443\u043F\u0443"@uk . . "Seguridad f\u00EDsica"@es . . . "\u064A\u0635\u0641 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0645\u0627\u062F\u064A Physical security \u0627\u0644\u062A\u062F\u0627\u0628\u064A\u0631 \u0627\u0644\u0623\u0645\u0646\u064A\u0629 security \u0627\u0644\u062A\u064A \u062A\u0645 \u062A\u0635\u0645\u064A\u0645\u0647\u0627 \u0644\u0645\u0646\u0639 \u0627\u0644\u0648\u0635\u0648\u0644 \u063A\u064A\u0631 \u0627\u0644\u0645\u0635\u0631\u062D \u0628\u0647 \u0625\u0644\u0649 \u0627\u0644\u0645\u0631\u0627\u0641\u0642 \u0648\u0627\u0644\u0645\u0639\u062F\u0627\u062A \u0648\u0627\u0644\u0645\u0648\u0627\u0631\u062F\u060C \u0648\u062D\u0645\u0627\u064A\u0629 \u0627\u0644\u0623\u0641\u0631\u0627\u062F \u0648\u0627\u0644\u0645\u0645\u062A\u0644\u0643\u0627\u062A \u0645\u0646 \u0627\u0644\u062A\u0644\u0641 \u0623\u0648 \u0627\u0644\u0636\u0631\u0631 (\u0645\u062B\u0644 \u0627\u0644\u062A\u062C\u0633\u0633 Espionage \u0623\u0648 \u0627\u0644\u0633\u0631\u0642\u0629 Theft\u060C \u0623\u0648 \u0627\u0644\u0647\u062C\u0645\u0627\u062A \u0627\u0644\u0625\u0631\u0647\u0627\u0628\u064A\u0629 Terrorist). \u064A\u0646\u0637\u0648\u064A \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0645\u0627\u062F\u064A \u0639\u0644\u0649 \u0627\u0633\u062A\u062E\u062F\u0627\u0645 \u0637\u0628\u0642\u0627\u062A \u0645\u062A\u0639\u062F\u062F\u0629 \u0645\u0646 \u0646\u0638\u0645 \u0645\u062A\u0631\u0627\u0628\u0637\u0629\u060C \u062A\u0634\u0645\u0644 \u0627\u0644\u062F\u0648\u0627\u0626\u0631 \u0627\u0644\u062A\u0644\u0641\u0632\u064A\u0648\u0646\u064A\u0629 \u0627\u0644\u0645\u063A\u0644\u0642\u0629 CCTV\u060C \u0648\u062D\u0631\u0627\u0633 \u0627\u0644\u0623\u0645\u0646 Security guards\u060C \u062D\u0648\u0627\u062C\u0632 \u0648\u0627\u0642\u064A\u0629 Protective barriers\u060C \u0648\u0627\u0644\u0623\u0642\u0641\u0627\u0644 locks\u060C \u0648\u0628\u0631\u0648\u062A\u0648\u0643\u0648\u0644\u0627\u062A \u0627\u0644\u062A\u062D\u0643\u0645 \u0641\u064A \u0627\u0644\u0648\u0635\u0648\u0644 Access control \u060C \u0648\u0627\u0644\u0639\u062F\u064A\u062F \u0645\u0646 \u0627\u0644\u062A\u0642\u0646\u064A\u0627\u062A \u0627\u0644\u0623\u062E\u0631\u0649."@ar . "Seguridad F\u00EDsica es el conjunto de mecanismos y acciones que buscan la detecci\u00F3n y prevenci\u00F3n de riesgos, con el fin de proteger alg\u00FAn recurso o bien material.\u200B En el caso de recintos como edificios, oficinas, residencias, otros, se entiende como, los mecanismos que llevan a disminuir las probabilidades que ocurran eventos que atenten contra el bienestar de los individuos y sus posesiones (robos, violaciones, entre otros). La seguridad f\u00EDsica orientada a domicilios, oficinas y otras edificaciones es puesta en pr\u00E1ctica por la ciudadan\u00EDa y por profesionales en el \u00E1rea (seguridad privada, cerrajeros, sistemas de vigilancia).Cualidad de estar libre y exento de todo peligro,da\u00F1o o riesgo."@es . . .