Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Physical security
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Measures designed to deny unauthorized access}} {{multiple image |align = right |direction = vertical |width = 300 |image1 = Xatta137.jpg |caption1 = Modern [[prisons]] are among some of the most physically secure facilities, with almost every area under tight [[access control]] and [[surveillance]]. Pictured here is the exterior of Shata Prison in [[Israel]], which is secured through the use of high fences, [[razor wire]], [[protective barriers]], [[guard towers]], and security lighting. |image2 = Canadian Embassy DC 2007 002.jpg |caption2 = [[Embassy of Canada, Washington, D.C.|Canadian Embassy in Washington, D.C.]] showing planters being used as vehicle barriers to increase the [[standoff distance]], and barriers and gates along the vehicle entrance. }} '''Physical security''' describes [[security]] measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as [[espionage]], [[theft]], or [[terrorist]] attacks).<ref>{{Cite book|title=Field Manual 3-19.30: Physical Security|publisher=Headquarters, United States Department of Army|year=2001|chapter=Chapter 1: Physical Security Challenges|url=http://www.globalsecurity.org/military/library/policy/army/fm/3-19-30/ch1.htm|url-status=live|archive-url=https://web.archive.org/web/20130313232001/http://www.globalsecurity.org/military/library/policy/army/fm/3-19-30/ch1.htm|archive-date=2013-03-13}}</ref> Physical security involves the use of multiple layers of interdependent systems that can include [[CCTV]] surveillance, [[security guards]], [[protective barriers]], [[Lock (security device)|locks]], [[access control]], [[perimeter intrusion detection]], deterrent systems, [[fire protection]], and other systems designed to protect persons and property. == Overview == Physical security systems for protected facilities can be intended to:<ref>{{cite book|author=Garcia, Mary Lynn|title=Design and Evaluation of Physical Protection Systems|publisher=Butterworth-Heinemann|year=2007|isbn=9780080554280|pages=1β11|url=https://books.google.com/books?id=NDMVuN_4VfIC&pg=PA1|url-status=live|archive-url=https://web.archive.org/web/20130921071009/http://books.google.com/books?id=NDMVuN_4VfIC&pg=PA1|archive-date=2013-09-21}}</ref><ref>{{Cite book|title=Field Manual 3-19.30: Physical Security|publisher=Headquarters, United States Department of Army|year=2001|chapter=Chapter 2: The Systems Approach|url=http://www.globalsecurity.org/military/library/policy/army/fm/3-19-30/ch2.htm|url-status=live|archive-url=https://web.archive.org/web/20130921055650/http://www.globalsecurity.org/military/library/policy/army/fm/3-19-30/ch2.htm|archive-date=2013-09-21}}</ref><ref name="Security_Engineering">{{cite book| author = Anderson, Ross| title = Security Engineering| year = 2001| publisher = Wiley| isbn = 978-0-471-38922-4| url-access = registration| url = https://archive.org/details/securityengineer00ande}}</ref> * deter potential intruders (e.g. warning signs, [[security lighting]]); * detect intrusions, and identify, monitor and record intruders (e.g. [[security alarm|security alarms]], [[access control]] and CCTV systems); * trigger appropriate incident responses (e.g. by security guards and police); * delay or prevent hostile movements (e.g. [[door security|door reinforcements]], [[Grille (architecture)|grilles]]); * protect the assets (e.g. [[safe|safes]]). It is up to security designers, architects and analysts to balance security controls against risks, taking into account the costs of specifying, developing, testing, implementing, using, managing, monitoring and maintaining the controls, along with broader issues such as [[aesthetics]], [[human rights]], health and safety, and societal norms or conventions. Physical access security measures that are appropriate for a high security [[prison]] or a military site may be inappropriate in an office, a home or a vehicle, although the principles are similar. ==Elements and design== === Deterrence === The goal of deterrence methods is to convince potential attackers that a successful attack is unlikely due to strong defenses. The initial layer of security for a campus, building, office, or other physical space can use [[crime prevention through environmental design]] to deter threats. Some of the most common examples are also the most basic: warning signs or window stickers, [[fence]]s, vehicle barriers, vehicle height-restrictors, restricted access points, [[security lighting]] and trenches.<ref>For a detailed discussion on natural surveillance and CPTED, see {{cite book|author=Fennelly, Lawrence J.|title=Effective Physical Security|publisher=Butterworth-Heinemann|year=2012|isbn=9780124158924|pages=4β6|url=https://books.google.com/books?id=hfuODGScv_0C&pg=PA4|url-status=live|archive-url=https://web.archive.org/web/20180105015948/https://books.google.com/books?id=hfuODGScv_0C&pg=PA4|archive-date=2018-01-05}}</ref><ref name="PhysicalSecurity">{{cite book| author = Task Committee| author2 = Structural Engineering Institute| title = Structural Design for Physical Security| year = 1999| publisher = ASCE| isbn = 978-0-7844-0457-7| url = https://books.google.com/books?id=1j5TNJCwI6wC| url-status = live| archive-url = https://web.archive.org/web/20180105015948/https://books.google.com/books?id=1j5TNJCwI6wC&printsec=frontcover| archive-date = 2018-01-05}}</ref><ref>{{Cite book|author=Baker, Paul R.|chapter=Security Construction Projects|editor=Baker, Paul R.|editor2=Benny, Daniel J.|title=The Complete Guide to Physical Security|publisher=CRC Press|year=2012|isbn=9781420099638|chapter-url=https://books.google.com/books?id=U7U6Lc2ZYaYC&pg=PA47|url-status=live|archive-url=https://web.archive.org/web/20180105015948/https://books.google.com/books?id=U7U6Lc2ZYaYC&pg=PA47|archive-date=2018-01-05}}</ref><ref>{{Cite book|title=Field Manual 3-19.30: Physical Security|publisher=Headquarters, United States Department of Army|year=2001|chapter=Chapter 4: Protective Barriers|url=http://www.globalsecurity.org/military/library/policy/army/fm/3-19-30/ch4.htm|url-status=live|archive-url=https://web.archive.org/web/20130313231758/http://www.globalsecurity.org/military/library/policy/army/fm/3-19-30/ch4.htm|archive-date=2013-03-13}}</ref> === Physical barriers === {{See also|Door security|Window security}} {{multiple image |align = right |direction = vertical |width = 200 |image1 = Security spikes 1.jpg |caption1 = Spikes atop a barrier wall act as a deterrent to people trying to climb over the wall in [[Aldgate]], [[London]] |image2 = Border barrier near IBM 9.JPG |caption2 = Vehicle barrier at the US Mexico border, 2010 Physical barriers such as [[security fence|security fences]], walls, and [[Hostile vehicle mitigation|vehicle barriers]] act as the outermost layer of security. They serve to prevent, or at least delay, attacks, and also act as a psychological deterrent by defining the perimeter of the facility and making intrusions seem more difficult. }} For example, tall fencing, topped with [[barbed wire]], [[razor wire]] or metal spikes are often emplaced on the perimeter of a property, generally with some type of signage that warns people not to attempt entry. However, in some facilities imposing perimeter walls or fencing will not be possible (e.g. an urban [[office building]] that is directly adjacent to public sidewalks) or it may be aesthetically unacceptable (e.g. surrounding a shopping center with tall fences topped with razor wire); in this case, the outer [[perimeter security|security perimeter]] will be generally defined as the [[wall|walls]], [[window|windows]] and [[door|doors]] of the structure itself.<ref>{{cite book|author1=Talbot, Julian|author2=Jakeman, Miles|name-list-style=amp|title=Security Risk Management Body of Knowledge|publisher=John Wiley & Sons|year=2011|isbn=9781118211267|pages=72β73|url=https://books.google.com/books?id=5xAhp9B1264C&pg=PT73|url-status=live|archive-url=https://web.archive.org/web/20180105015948/https://books.google.com/books?id=5xAhp9B1264C&pg=PT73|archive-date=2018-01-05}}</ref> === Security lighting === {{See also|Natural surveillance}} [[Security lighting]] is another effective form of deterrence. Intruders are less likely to enter well-lit areas for fear of being seen. Doors, gates, and other entrances, in particular, should be well lit to allow close observation of people entering and exiting. When lighting the grounds of a facility, widely distributed low-intensity lighting is generally superior to small patches of high-intensity lighting, because the latter can have a tendency to create blind spots for security personnel and CCTV cameras. It is important to place lighting in a manner that makes it difficult to tamper with (e.g. suspending lights from tall poles), and to ensure that there is a backup power supply so that security lights will not go out if the electricity is cut off.<ref>{{cite book|author=Kovacich, Gerald L.|author2=Halibozek, Edward P.|name-list-style=amp|title=The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program|publisher=Butterworth-Heinemann|year=2003|isbn=9780750674874|pages=192β193|url=https://books.google.com/books?id=WZ9_hnqNpH0C&pg=PA193|url-status=live|archive-url=https://web.archive.org/web/20180105015948/https://books.google.com/books?id=WZ9_hnqNpH0C&pg=PA193|archive-date=2018-01-05}}</ref> The introduction of low-voltage LED-based lighting products has enabled new security capabilities, such as instant-on or strobing, while substantially reducing electrical consumption.<ref>{{Cite web|title=Use of LED Lighting for Security Purposes|url=http://silvaconsultants.com/use-of-led-lighting-for-security-purposes.html#:~:text=More%20directional:%20LED%20lights%20can,and%20in%20other%20security%20applications.|access-date=2020-10-06|website=silvaconsultants.com}}</ref> ==== Security lighting for nuclear power plants in the United States ==== For [[Nuclear power in the United States|nuclear power plants in the United States (U.S.)]], per the [[Nuclear Regulatory Commission|U.S. Nuclear Regulatory Commission (NRC)]], [[Nuclear safety and security#Title 10 CFR Part 73 (U.S. NRC)|10 CFR Part 73]], ''[security] lighting'' is mentioned four times. The most notable mentioning contained in [https://www.ecfr.gov/current/title-10/part-73#p-73.55(i)(6) 10 CFR 73.55(i)(6) Illumination], which clearly identifies that licensees "-shall provide a '''<u>minimum [[Illumination (lighting)|illumination]] level of 0.2 [[Foot-candle|foot-candles]],</u>''' measured horizontally at ground level, in the isolation zones and appropriate exterior areas within the protected area-". [https://www.ecfr.gov/current/title-10/chapter-I/part-73#p-73.55(i)(6) <sup><nowiki>[Ref]</nowiki></sup>] This is also the minimum illumination level specified in [https://www.ecfr.gov/current/title-10/chapter-I/part-73/appendix-Appendix%20H%20to%20Part%2073 Table Hβ2 Minimum Night Firing Criteria of 10 CFR 73 Appendix H], for night firing. Per [https://www.ecfr.gov/current/title-10/part-73#p-73.46(b)(7) 10 CFR 73.46(b)(7)] "-Tactical Response Team members, armed response personnel, and guards shall qualify and requalify, at least every 12 months, for day and '''night''' '''firing''' with assigned weapons in accordance with Appendix H-"; therefore on said respective [[shooting range]] '''[at night]''' per [https://www.ecfr.gov/current/title-10/chapter-I/part-73/appendix-Appendix%20H%20to%20Part%2073 Appendix H, Table H-2], "-all courses [shall have] 0.2 '''<u>[[Foot-candle|foot-candles]]</u>''' at center mass of target area-" applicable to [[Handgun|handguns]], [[Shotgun|shotguns]], and [[Rifle|rifles.]] [https://www.ecfr.gov/current/title-10/chapter-I/part-73/appendix-Appendix%20H%20to%20Part%2073 <sup><nowiki>[Ref]</nowiki></sup>] 1 [[foot-candle]] is approximately 10.76 [[lux]], therefore the minimum illumination requirements for the above sections also reflect '''<u>2.152 [[lux]]</u>'''. === Intrusion detection and electronic surveillance === {{Main|Surveillance|Intrusion detection system}} ====Alarm systems and sensors==== {{Main|Security alarm}} [[Security alarm|Security alarms]] can be installed to alert security personnel when unauthorized access is attempted. Alarm systems work in tandem with physical barriers, mechanical systems, and security guards, serving to trigger a response when these other forms of security have been breached. They consist of sensors including [[Perimeter intrusion detection system|perimeter sensors]], [[motion sensors]], contact sensors, and [[glass break detector]]s.<ref>{{Cite book|title=Field Manual 3-19.30: Physical Security|publisher=Headquarters, United States Department of Army|year=2001|chapter=Chapter 6: Electronic Security Systems|url=http://www.globalsecurity.org/military/library/policy/army/fm/3-19-30/ch6.htm|url-status=live|archive-url=https://web.archive.org/web/20130313231931/http://www.globalsecurity.org/military/library/policy/army/fm/3-19-30/ch6.htm|archive-date=2013-03-13}}</ref> However, alarms are only useful if there is a prompt response when they are triggered. In the reconnaissance phase prior to an actual attack, some intruders will test the response time of security personnel to a deliberately tripped alarm system. By measuring the length of time it takes for a security team to arrive (if they arrive at all), the attacker can determine if an attack could succeed before authorities arrive to neutralize the threat. Loud audible [[alarm device|alarms]] can also act as a psychological deterrent, by notifying intruders that their presence has been detected.<ref>{{cite book|author=Fennelly, Lawrence J.|title=Effective Physical Security|publisher=Butterworth-Heinemann|year=2012|isbn=9780124158924|pages=345β346|url=https://books.google.com/books?id=hfuODGScv_0C&pg=PA345|url-status=live|archive-url=https://web.archive.org/web/20130921072054/http://books.google.com/books?id=hfuODGScv_0C&pg=PA345|archive-date=2013-09-21}}</ref> In some U.S. jurisdictions, law enforcement will not respond to alarms from intrusion detection systems unless the activation has been verified by an eyewitness or video.<ref>{{cite web |url=http://isc.temple.edu/economics/wkpapers/Pubs/FalsePolicy.pdf |title=Evaluation of alternative policies to combat false emergency calls |page=238 |url-status=dead |archive-url=https://web.archive.org/web/20121101083705/http://isc.temple.edu/economics/wkpapers/Pubs/FalsePolicy.pdf |archive-date=2012-11-01 }}</ref> Policies like this one have been created to combat the 94–99 percent rate of false alarm activation in the United States.<ref>{{cite web |url=http://isc.temple.edu/economics/wkpapers/Pubs/FalsePolicy.pdf |title=Evaluation of alternative policies to combat false emergency calls |page=233 |url-status=dead |archive-url=https://web.archive.org/web/20121101083705/http://isc.temple.edu/economics/wkpapers/Pubs/FalsePolicy.pdf |archive-date=2012-11-01 }}</ref> ====Video surveillance==== [[File:Surveillance quevaal.jpg|thumb|right|Closed-circuit television cameras]] {{Main|CCTV}} [[Closed-circuit television camera|Surveillance cameras]] can be a deterrent<ref>{{cite web |url=http://www.urban.org/uploadedpdf/412401-Evaluating-the-Use-of-Public-Surveillance-Cameras-for-Crime-Control-and-Prevention-A-Summary.pdf |title=Evaluating the Use of Public Surveillance Cameras for Crime Control and Prevention |url-status=live |archive-url=https://web.archive.org/web/20121201231521/http://www.urban.org/uploadedpdf/412401-Evaluating-the-Use-of-Public-Surveillance-Cameras-for-Crime-Control-and-Prevention-A-Summary.pdf |archive-date=2012-12-01 }}</ref> when placed in highly visible locations and are useful for incident assessment and historical analysis. For example, if alarms are being generated and there is a camera in place, security personnel assess the situation via the camera feed. In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed. Although the term [[closed-circuit television]] (CCTV) is common, it is quickly becoming outdated as more video systems lose the closed circuit for signal transmission and are instead transmitting on [[IP camera]] networks. Video monitoring does not necessarily guarantee a human response. A human must be monitoring the situation in real time in order to respond in a timely manner; otherwise, video monitoring is simply a means to gather evidence for later analysis. However, technological advances like [[video analytics]] are reducing the amount of work required for video monitoring as security personnel can be automatically notified of potential security events.<ref>{{cite book|author=Crowell, William P.|editor=Cole, Eric|chapter=Intelligent Video Analytics|title=Physical and Logical Security Convergence|publisher=Syngress|year=2011|isbn=9780080558783|chapter-url=https://books.google.com/books?id=a4h_c4TqZM4C&pg=PA445|display-authors=etal|url-status=live|archive-url=https://web.archive.org/web/20180105015948/https://books.google.com/books?id=a4h_c4TqZM4C&pg=PA445|archive-date=2018-01-05}}</ref><ref>{{Cite book|author=Dufour, Jean-Yves|title=Intelligent Video Surveillance Systems|publisher=John Wiley & Sons|year=2012|isbn=9781118577868|url=https://books.google.com/books?id=YYGIFHgxFIgC|url-status=live|archive-url=https://web.archive.org/web/20180105015948/https://books.google.com/books?id=YYGIFHgxFIgC&printsec=frontcover|archive-date=2018-01-05}}</ref><ref>{{Cite book|author=Caputo, Anthony C.|title=Digital Video Surveillance and Security|publisher=Butterworth-Heinemann|year=2010|isbn=9780080961699|url=https://books.google.com/books?id=Nf40glaXZooC|url-status=live|archive-url=https://web.archive.org/web/20130929052842/http://books.google.com/books?id=Nf40glaXZooC&printsec=frontcover|archive-date=2013-09-29}}</ref> === Access control === {{Main|Access control}} [[Access control]] methods are used to monitor and control traffic through specific access points and areas of the secure facility. This is done using a variety of methods, including [[CCTV]] [[surveillance]], [[identification cards]], [[security guards]], [[Biometric device|biometric readers]], [[lock and key|locks]], doors, [[turnstile|turnstiles]] and [[gate|gates]].<ref>{{cite book|author1=Tyska, Louis A.|author2=Fennelly, Lawrence J.|name-list-style=amp|title=Physical Security: 150 Things You Should Know|publisher=Butterworth-Heinemann|year=2000|isbn=9780750672559|page=3|url=https://books.google.com/books?id=XQuUY8FSq5EC&pg=PA3|url-status=live|archive-url=https://web.archive.org/web/20180105015948/https://books.google.com/books?id=XQuUY8FSq5EC&pg=PA3|archive-date=2018-01-05}}</ref><ref>{{Cite book|title=Field Manual 3-19.30: Physical Security|publisher=Headquarters, United States Department of Army|year=2001|chapter=Chapter 7: Access Control|url=http://www.globalsecurity.org/military/library/policy/army/fm/3-19-30/ch7.htm|url-status=live|archive-url=https://web.archive.org/web/20070510060217/http://www.globalsecurity.org/military/library/policy/army/fm/3-19-30/ch7.htm|archive-date=2007-05-10}}</ref><ref>{{cite book|author=Pearson, Robert|chapter=Chapter 1: Electronic Access Control|title=Electronic Security Systems: A Manager's Guide to Evaluating and Selecting System Solutions|publisher=Butterworth-Heinemann|year=2011|isbn=9780080494708|url=https://books.google.com/books?id=pnR-lR0nikgC&pg=PA1|url-status=live|archive-url=https://web.archive.org/web/20180105015948/https://books.google.com/books?id=pnR-lR0nikgC&pg=PA1|archive-date=2018-01-05}}</ref> ====Mechanical access control systems==== {{multiple image |align = right |direction = vertical |width = 200 |image1 = Q-Lane Space Saver Turnstiles.jpg |caption1 = A drop arm optical [[turnstile]] |image2 = 1-Wire lock.jpg |caption2 = An electronic access control system, controlling entry through a door }} {{Main|Lock (security device)}} ''Mechanical access control systems'' include turnstiles, gates, doors, and locks. [[Key management (access control)|Key control]] of the locks becomes a problem with large user populations and any user turnover. [[Key (lock)|Keys]] quickly become unmanageable, often forcing the adoption of electronic access control. ====Electronic access control systems==== Electronic access control systems provide secure access to buildings or facilities by controlling who can enter and exit. Some aspects of these systems can include: * Access credentials - Access cards, fobs, or badges are used to identify and authenticate authorized users. Information encoded on the credentials is read by card readers at entry points. * Access control panels - These control the system, make access decisions, and are usually located in a secure area. Access control software runs on the panels and interfaces with [[card reader]]. * Readers - Installed at access points, these read credentials or other data, and send information to the access control panel. Readers can be proximity, magnetic stripe, smart card, [[biometrics]], etc. * Door locking hardware - Electrified locks, electric strikes, or [[electromagnetic lock|maglocks]] physically secure doors and release when valid credentials are presented. Integration allows doors to unlock when authorized. * Request to exit devices - These allow free egress through an access point without triggering an alarm. Buttons, motion detectors, and other sensors are commonly used. * Alarms - Unauthorized access attempts or held/forced doors can trigger audible alarms and alerts. Integration with camera systems also occurs. * Access levels - Software can limit access to specific users, groups, and times. For example, some employees may have 24/7 access to all areas while others are restricted. * Event logging - Systems record activity like access attempts, alarms, user tracking, etc. for security auditing and troubleshooting purposes. Electronic access control uses credential readers, advanced software, and electrified locks to provide programmable, secure access management for facilities. Integration of cameras, alarms and other systems is also common. An additional sub-layer of mechanical/electronic access control protection is reached by integrating a [[key management]] system to manage the possession and usage of mechanical keys to locks or property within a building or campus.{{citation needed|date=August 2013}} ====Identification systems and access policies==== Another form of access control (''procedural'') includes the use of policies, processes and procedures to manage the ingress into the restricted area. An example of this is the deployment of security personnel conducting checks for authorized entry at predetermined points of entry. This form of access control is usually supplemented by the earlier forms of access control (i.e. mechanical and electronic access control), or simple devices such as physical passes. === Security personnel === {{Main|Security guard}} [[File:Private factory guard.jpg|thumb|right|Private guard of a [[Economy of China#Industry and manufacturing|Chinese factory]]]] ''Security personnel'' play a central role in all layers of security. All of the technological systems that are employed to enhance physical security are useless without a security force that is trained in their use and maintenance, and which knows how to properly respond to breaches in security. Security personnel perform many functions: patrolling facilities, administering electronic access control, responding to alarms, and monitoring and analyzing video footage.<ref>{{cite book|author=Reid, Robert N.|chapter=Guards and guard forces|title=Facility Manager's Guide to Security: Protecting Your Assets|publisher=The Fairmont Press|year=2005|isbn=9780881734836|chapter-url=https://books.google.com/books?id=rqFQdGnyXsYC&pg=PA237|url-status=live|archive-url=https://web.archive.org/web/20180105015948/https://books.google.com/books?id=rqFQdGnyXsYC&pg=PA237|archive-date=2018-01-05}}</ref> ==See also== {{Wikiversity|Physical security}} {{Commonscat|Physical security}} * [[Alarm management]] * [[Artificial intelligence for video surveillance]] * [[Biometric device]] * [[Biometrics]] * [[Computer security]] * [[Door security]] * [[Executive protection]] * [[Guard tour patrol system]] * [[Information security]] * [[Infrastructure security]] * [[Logical security]] * [[Nuclear security]] * [[Perimeter intrusion detection system]] * [[Physical Security Professional]] * [[Security alarm]] * [[Security company]] * [[Security convergence]] * [[Security engineering]] * [[Surveillance]] * [[High-voltage transformer fire barriers]] ==References== {{Reflist|colwidth=35em}} == External links == * [https://www.npsa.gov.uk/tools-catalogues-and-standards UK NPSA Tools, Catalogues and Standards] {{Authority control}} {{Locksmithing}} {{DEFAULTSORT:Physical Security}} [[Category:Physical security]] [[Category:Security]] [[Category:Crime prevention]] [[Category:Public safety]] [[Category:National security]] [[Category:Warning systems]] [[Category:Security engineering]] [[Category:Perimeter security]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Authority control
(
edit
)
Template:Citation needed
(
edit
)
Template:Cite book
(
edit
)
Template:Cite web
(
edit
)
Template:Commonscat
(
edit
)
Template:Locksmithing
(
edit
)
Template:Main
(
edit
)
Template:Multiple image
(
edit
)
Template:Reflist
(
edit
)
Template:See also
(
edit
)
Template:Short description
(
edit
)
Template:Wikiversity
(
edit
)