48
Topic 6 Security Systems

Topic_6 services in tall building

Embed Size (px)

DESCRIPTION

Topic_6 services in tall building

Citation preview

  • Topic6SecuritySystems

  • Introduc3onandIssues

    Securityisafundamentalhumanrequirement.Itisanaturalins3ncttopreserveourselves,ourlovedonesandourpropertyfromanyintrusionoranydanger.

    Thislecturelooksatthesecurityfactorsaec3ngthedesignofthebuilding,itsinteriorlayoutsandsurroundings.

    Wewilllookatrelatedaspectsoftypesofsecuritybreachesplanning,detec3ondevicesandalarmsystems.

  • Inreality,allpartsofabuildingcanbepenetrated,eventhosemadeofsteelandreinforcedconcrete.Allbuildings,nomaCerhowsmall,shouldprovidesomelevelofsecurity.

    Securitysystemscanbedividedintotwomajortypes,passivesystemsandac3vesystems.

    Passivesystemsdonotincludeanydedicatedhardwareforsecurity,butisbasedmainlyonspa3alplanningandorganiza3on,managementandbuildingfabricandconstruc3on.

    Ac3vesecuritysystemsemploydedicatedhardwarethatac3velydetectsandcontrolssecuritybreachesandcondi3ons.Ac3vesystemsincludedetec3onandalarmsystems.

  • SecurityPlanning

    Eventhoughthereisnofullproofsecuritysystems,theobjec3veofsecurityplanningistodelay,confuseandcontrolintrudersthroughoutthebuildingslife3me.

    Therstaspectofsecurityplanningistodeterminethelevelofriskfromintrusionthatthebuildingissuscep3bletoandtostrategiseaccordingly.

  • Thereare5levelsofsecurityLevel1 Securityagainstvandalsandopportunists.Forexampletargeted

    publicameni3es,conden3alinforma3on.Level2 Securityagainstintrudersandinterlopers,unwantedand

    unwelcomevisitorswithdubiousinten3ons.Level3 Securityagainstburglarsandburglariesofhouseholditems,

    importantinforma3on.Level4 Securityagainstplannedanddeliberatecrimes.Securityforhigh

    valueitemssuchasjewelry,valuablepain3ngs,cashetc.Level5 Securityagainstactsofterrorismandespionagee.g.industrialand

    poli3cal

  • TypesofIntrusionsIntrusionsandsecuritybreachesbecomeincreasinglymorecomplexdaybyday

    intermsoftechniquesandtargets.

    Thesecanbeclassiedintothefollowing:

    Voyeurism,vandalismandunplannedtheUs.Takingadvantageandopportuni3esofinsecureloca3ons.

    Spyingandespionageaswellasplannedrobberies.Theintruderdeterminesthetargetandthemethods.Thisincludesdecep3onsandembezzlements.Canoccurfromwithoutorwithinanorganiza3on.Countermeasuresontopofphysicalaspectsinclude3ghteningofmanagementsystems.

    Sabotage.Intendeddestruc3onofpropertyorindustrial/businessprocesses.Arson,explosions,etc.

    Assault.Usuallytowardsanimportanttarget,coreofanorganiza3on.Eec3veac3veandpassivesystemsarenecessary,includingtheuseofsecuritypersonnel.

  • VandalismandDesignSolu3ons

    Vandalismresultsinthedestruc3onofpublicpropertyinpublicplaces.Signicantsocialstudieshavebeenconductedandtheoriesappliedbuttheproblemisdiculttocontrol.Mi3ga3onprocedurescannonethelessbetaken.

  • Whydoesvandalismoccur?

    Vandalismisusuallyassociatedwithcrimesormisdemeanorscarriedoutbyjuvenilesunder15yearsofage.Betweentheagesof10and15,vandalismisconsideredasagame.Asthechildgrowsolder,interestschangeandthesenseofresponsibilityandpossessionincreases.Actsofvandalismarealsoconductedbyadultsespeciallywherethereissocialdecay.Targetsofvandalismincludepropertythatisseenaspublicandwithoutdirectownership.Insuchcases,itisimportanttoinculcatethesenseofbelongingandcommunityamongthesurroundingpeople.

    Examplesoftargets:Playgrounds,walkways,liUs,publicfurnitureandtoilets.

    Typesofvandalism:destruc3on,gra3andmisuse.

  • Whattriggersvandalism?

    Factorswhichtriggervandalisminclude: Untendedproperty Propertythatisalreadydamaged,e.g.Dirtywallsandbrokenwindows

    Con3nuousdeteriora3onoftheaboveleadingtosocialdistressandlowqualitysurroundingsanddiscomfortresul3nginslumareas.

  • Howtoavoidvandalism?

    DefensibleSpace Applytheconceptsofdefensiblespacewherethespiritof

    ownershipandbelongingisinculcated,andwherepublicandpublicaccessspacesareobservablebysegmentsofthecommunity.

    Reducethenumberofpublicspacesandencouragesocialsurveillance.Surveillancebyindividualsand/orgroupsofindividualsthathaveastakeorcommitmenttowardsapar3cularspace.

    PlacesthatappearwithoutownersareoUentargeted.

  • DefensiveConcepts Ensurethatpublicameni3esaremadeofsternermaterialsthatarediculttodamage.

    ManagementConcept. Ensuredamagedpropertyoritemsarerepairedquicklybeforethesitua3ondeteriorates.

    PublicAwarenessCampaigns.

  • SecurityPlanning

    Securityplanningconsistsof

    PhysicalPlanningmadeupofpassivesecuritysystemscombinedwithac3vesecuritysystem.

    includeshardwareaswellaswhatisalreadyphysicallyinplace.

    ManagementPlanning includesthepoliciesinplacewithintheorganiza3onsandtheworkculture.

  • PhysicalPlanning

    Useofphysicalbarriersasalineofdefensearoundanarea,spaceorbuilding.

    TherearethreestagesofphysicalPlanningforsecurity:

  • 3 Lines of Defense

    Fig 6.1 Three Lines of Defense

  • PhysicalPlanningFirstLineofdefense

    Normallyoccurringaroundtheperimeteralongthesiteboundary.

    Itcanbeeithermanmade(gates,fencesetc.)ornatural(rivers,lakes,clisetc)

    Servestodelayortemporarilyobstructintendedintruders.Servesasadeterrentanddiscouragesrandomactsofsecuritybreach.

    Elementsthatneedconsidera3onareingressandegress,emergenciesandcontrol.

  • Canbecombinedwithac3vesecuritysystemsWhenthebarriersarelocatedoverawidearea,aclearzonecanbecreatedoverwhichvisualsurveillancecanoccur,betweenthe1stand2ndlineofdefense. Ifthereisconsiderablelandscaping,itisadvisabletoincludeac3vesystems.Thornyplantsaddtothesecurityaspect.Asecuritytowersystemcanbeu3lized.Itseec3venessdependsonitsloca3onandheight.Itsisolatedloca3onmayresultinareduc3oninalertnessofthesecuritypersonnel.

  • 2ndLineofDefense

    Thisisa3dimensionalmechanismwhichismoreimportantthanthe1stlineofdefenseasthereareseveralpoten3alweakpoints.Elementsthatneedpar3cularaCen3onare:

    Doorshingesandlocksneedpar3cularconsidera3ondependingonthebuildingsriskfactors.

    WindowstheweakestpointconsideringglassisoUenused.Forhighriskbuildingsthatdonothavesecuritygrilles,sensoralarmsystemsshouldbeused.

    EmergencydoorsIfnotplannedproperly,thisisthemostvulnerablepointofintruderentry.Directonewayexitthatisunlockedshouldbeconnectedtosecuritysensors.Theseexitsshouldbelocatedinexposedareasthatarenothiddenfromgeneralviews.

    Roofs

  • 3rdlineofDefense

    A3dimensionalsystemthatifdesignedproperlycanpreventtransgressorsfromacquiringvaluables.

    Examplesaresafes,strongrooms,panicrooms.

    Risklevelswilldeterminethetypeofsecurityrequired.

    Valuablesshouldonlybehandledandguardedbyspecicpersonnelonly.

    Aneec3vebarrierisaroomwithinabuildingthatisisolatedfromotherareas.

    Itsloca3onisoUeninthecentralpartsofabuildingwithoutwindowsordirectexitpoints.

    Entrypointsareminimizedandcontrolled.Avoidcommonwallswithotherbuildings.

  • InternalCircula3onandSecurityManagement

    Properlyplannedbuildingslimitareasthatneedtobeprotected,reduceentrancesandprovidenounobservedlinesofapproach.

    Costsofprovidingalarms,securityguardsandprotec3onarereducedandmoresecurebuildingsresult.

    Internalcircula3onofabuildingcanpresentmanysecurityproblemsespeciallyatentrances.

    Eachunsupervisedentranceisariskdayandnightand24hoursupervisionwithholidaysandreliefcanbearsignicantcost.

  • 3typesofintrudersforbuildingsinuseare: Unauthorisedpersons Authorisedpersonswhocommittransgressions

    Visitorswithocialbusinesswhotakeadvantage

  • Onlypropersecuritymanagementsystemscanprevent2and3above.

    Architectsmustallowforsecurityplanningtoenabletheorganiza3ontoplanitsmanagementofsecurityespeciallyforhighriskbuildings.

  • TargetRisks

    Everybuildinghashighrisktargets,example:cashregisters,safes,strongroomsetc.

    Concentriczonesaccordingtothelevelofsecurityriskscanbeu3lizedtoraisetheawarenessofthelevelsofsecurityforstaandvisitors.

  • Ac3veIntrusionDetec3onSystems

    Tounderstandthedesignofintrusiondetec3onsystems,itisnecessaryrsttounderstandthecharacteris3csofthecommonlyavailableintrusiondetectors(sensors)onwhichthesesystemsarebased.

    Onceanintrusionalarmhasbeengivenbyasensor,thesignalmustbeprocessedandappropriateac3ontaken.Thismayincludesoundingloudalarms,turningonlights,sendingsignalstoproprietaryorprivatesurveillanceservicesorpoliceetc.

  • Elementsinanac3veIntrusionDetec3onSysteminclude: Detec3ondevicesorSensors ControlEquipmentswitches,relays,resetbuCons Signalinglinkwiredconnec3ontoalarmbellsorsurveillance

    serviceprovidersorpolice. Wiredconnec3ontopowersourcemainsorbaCery. Powersource

  • MechanicalMo=onDetectors Thiscanbeusedwherewindowfoilorxedcontactsare

    imprac3cal. Thisdeviceisaspringmountedcontactsuspendedinsidea

    secondcontactsurface. Anyappreciablemo3onofthesurfaceonwhichthedeviceis

    placedcausesthecontactstoconnecttemporarily,turninginanalarm.

    Thesedevicesareverysensi3veandcanbeac3vatedbysonicbooms,wind,andevenaheavytruckpassingby.Forthisreasonsuchunitsareprovidedwithsensi3veadjustment.

  • PhotoElectricDevices Thesedevicesoperateonthesimpleprincipleofbeaminterrup3on.

    Whenthebeamisreceived,acontactinthereceiverisclosed. Interrup3oninthebeamcausesthecontacttoopensefngofthe

    alarm. Olderdevicesusevisiblelightbeamwhichiseec3veindoors,but

    outdoordust,insects,birdsetc.showtheloca3onofthebeam.Birdsandsmallanimalssetito.Dispersionoflightalsolimitsthethrowofthedevicesoutside.

    Modernunitsuselasersandinfrared(IR)beams,whicharelesseasilydetectedandcanbearrangedtodieren3atebetweenintrudersandotherdisturbances.

    Whenalaserbeamisused,thesignalcanbepickedup,ampliedandtransmiCedadierentdirec3on,thusestablishingaperimetersecurityfencefromasinglesource.

  • Theabilitytofocusonapar3cularareaisu3lizedtocoverareasbothhorizontallyandver3cally.

    AsthePIRdetectorsarenotsensi3vetomo3onbutaretoheatitisusablewheremo3onisunavoidable.

    TheprincipledisadvantageofPIRdetectorsisthatrapidtemperaturechangescausedbydirectinsola3on,acoldbreeze,aheaterturningonetccancausethealarmtotrigger.

    PIRdetectorscanbeusedasmo3ondetectorsbyusingamul3beam(zone)unit.

    Mo3onisdetectedaschangesinIRradia3onofadjacentzonesorintheradia3onofazoneorintheradia3onofazonewithrespecttothebackground,bothofwhichcharacterizemo3on.

  • HoweverbecauseDopplereectdependsonrela3vemo3onbetweenthesourceandthemovingbody,anintrudermovinglaterallymaygoundetectedifsensi3vityhasbeenreducedtoavoidfalsealarms.

    Thereforeunitsshouldbelocatedsothatthepathofanintruderisasnearlyaspossibledirectlytowardorawayfromthedetector.

    Ultrasonicunitsarecheaperthanmicrowaveunitsbutcanbedisturbedbystrongairturbulenceandveryloudnoises.

    Microwaveunitsareundisturbedbyairornoisebutbecausetheypenetratesolidstheycanbeaectedbymo3onoutsidetheprotectedarea.

  • Acous=cDetectors Theseunitsalarmwhenthenoiselevelexceedsapresetmaximum.

    Alterna3velytheycanbearrangedtorespondtoapar3cularrangeoffrequenciescorrespondingtothenoiseofbreakingglass,forcedentryorwhateverisdesired.

    Althoughappliedprincipallyinsecuritysystems,theycanalsobeusedasoccupancysensorsforswitchingofligh3ng.

  • Mul3pleDetectors Aswithredetectors,abalancemustbestruckbetweenthesensi3vityof

    detectorsandthenuisanceoffalsealarmsasincreasingtheformerincreasesthelaCeraswell.

    Oneveryeec3vemethodistousemul3pledetectorswithdierenttechnologiesthatverifyeachother.UnitsareavailablethatcombinePIRandultrasonicdetectorsinasinglehousing.

    Itdoesnottransmitanalarmun3lbothdetectorsindicateintrusion.Thisdualtechniqueisapplicableforareaandperimeterprotec3onaswellasportalsurveillance.

  • Residen3alIntrusionAlarmSystems

    Residencesusuallyu3lizedoorandwindowmagne3cswitchesaswellasPIRand/ormo3ondetectors.

    Amanualswitchattheendofalongcordisalsoprovidedsothataresidentmaysetothealarmatwillifanintruderisheard.

    Ifthesystememploysthesameaudiblesignaldevicesastheresystem,thesoundshouldbedis3nc3vesothatthenatureofthealarmcouldbediscernedaurally.

    Intrusionalarmsystemscanbecon3nuallysupervisedbyconnec3onswithcentralsta3onsofcompanieswhosebusinessissuchsupervisionandthatresponddirectlytoanalarmcallorno3fylocalpoliceofanyillegalentry.

  • Mul3pleDwellingEntryandSecuritySystems

    Apartmenthousesandotherlargeresidencescombinethefunc3onsofthefamiliarlobbytoapartmentcommunica3onsystem.

    ThemostbasicsystemisaseriesofpushbuConsinthelobbyandanintercomspeakerortelephonewithwhichtocommunicatewithresidents.

    AttheotherendthetenanthasaspeakermicrophoneplusalobbydooropenerbuCon.

    Thissystemcanalsobearrangedtou3lizethetenantsregulartelephone.

  • Whenthenumberoftenantsisverylarge,analphabe3calrosterisaddedtotheapartmentbuConpaneltoavoidthenuisanceofscanningalltheapartmentnameswhenthesoughtpartysapartmentnumberisnotknown.

    Forevenlargernumbers,analphabe3caltenantregisterplusabuConphoneisused.Closedcircuitt.v.systemisfrequentlyaddedtothelobbysystemenablingthetenanttoalsoseethecaller.

    Suchasystemincreasestheelectricalcontractcostforanaverageapartmenthouse5%to7%.

  • CallbuConswithinapartmentscanbeusedtoperformanyalarmfunc3onsrequiredtodealwithanintruderwhomanagestobypassthelobbysecuritycheck.

    Ingeriatrichousingdesigns,thesebuConsalsoservetounlocktheapartmentdoortoallowhelperstoenterifsummonedbylightsandalarms.

    Inluxuryapartmentbuildings,apartmentdoorscanbemonitoredfromacentralsecuritydeskandanyunscheduleddoormovementsubjectedtoimmediateinves3ga3on.

    Thesesystemsarecustomdesignedtomeettherequirementsoftheowner.

  • HotelsandMotelsSecuritySystems

    Asecurityproblemapplicabletoallfacili3es,includingresiden3al,involveslimi3ngentryinunsupervisedareastoauthorizedpersons(i.e.unsupervisedaccesscontrol)

    Theproblemsofkeysandlocksiswellknown,despiteadvancesinthateld.

    Moresophis3catedmeansincludemagne3ccardsandelectroniccombina3onlockswhich,becauseoftheeaseofcodechange,arepar3cularlyusefulforresiden3alfacili3esthatcaterfortransients.

  • Theemergencycallsystemisalsoappropriateforallhousinginstalla3onsespeciallyfortheelderlyandhandicapped.

    Thepurposeofthesystemistoalertoutsiderstoanemergencysitua3oninsideaclosedapartment.Thealarmsystemisawaytocallforhelpin3mesofillnessorotherdistress.

    MostoUenthesesystemsprescribeacallini3a3onbuConineachbedroomandbathroomthatregistersanaudible(alarm)andvisible(annunciated)signalataloca3onthatismonitoredlocallyorremotely24hoursaday.

    Addi3onalsignalsarerequiredintheoorcorridorandattheapartment,toalerttheimmediateneighbours.

  • HotelsandMotelsSecuritySystems

    Becauseofthetransientpopula3onofthesefacili3esandtheneedtoprovidemaximumserviceandsecurityforguestsduringtheirstay,theprincipalprobleminaddi3ontoroomaccesssecurityishotelequipmentsecurity(i.e.preven3onofshrinkage).

  • RoomAccessSecurity. Theineec3venessofkeylocksinpreven3ngundesiredentryeveninprivate

    homesiswellknowninhotels.ThekeyisliClemorethanapsychologicalbarrier.

    Asaresultmostmodernhotelshaveinstalledelectronicroomlockswhoseopeningdevicecodeischangedwitheverynewguest.

    TheselocksmaybeofthecodedpushbuContypewhosecodingischangeablefromacentrallocksecurityconsole;amagne3callyorpunchholecodedcardtype(gure6.9);oraprogrammablecodedlockandcodedkeytype(gure6.10).

    Allofthesesystemshaverela3veadvantagesanddisadvantages,dependingonthenumberofrooms,whethertheinstalla3onisnewconstruc3onorretrot,andtheaveragelengthofthegueststay.

  • EquipmentSecurity. Theneedtoprovideexpectedservicesrequiresthatguestrooms

    beequippedwithatelevisionandpossiblyotherelectronica.v.devices,mee3ngroomswitht.v.s,computersandLCDprojectors;andthattheseandotherdevicesbemadeavailableforguestsuseaspartoftheroomfeeoronarentalbasis.

    Onesystemthatsalsoapplicableinschools,ocesandindustrialbuildingssensesthedisconnec3onoftheequipmentfromitspowerconnec3on(wallplugs)andtransmitsanalarmoverthepowerlinestoanannunciatorataselectedcontrolloca3on.

    Thishastheadvantageofalarmingimmediatelyofequipmentremovalpermifngappropriateretrievalac3ontobetakenin3me.

  • SchoolSecuritySystems Althoughintrusionalarmandsecuritysystemsarenothistorically

    normalschoolrequirements,thesitua3onhasunfortunatelychanged.

    Sensingdevicesonwindowsanddoorscanbearrangedbothtotriplocalalarmsandviaauxiliarycircuits,tono3fypoliceheadquarters.

    OUenvandalscanbefrightenedobyhavingthealarmsystemactuateaprotec3veligh3ngsystemthatilluminatesabuildingexteriorandanybuildinginteriorrequired,suchasrecordrooms.

    Aperimeteralarmdetec3onsystemofthetypesdescribedearliercanbeinstalledinpar3cularlyvandalproneareastoassistinpreven3ngentrytoschoolpremisesaUerhours.

  • Onemodelofdooropeneralarmsrequiresacon3nuouspressureonthedooropeningbarof10to20secondsbeforethedooropens,withthedoorbeingimmediatelyac3vatedupontheapplica3onofpressure.

    Thisarrangement(usedonlywhererecodespermit)allowssucient3meforthefacilitysstatoinves3gatetheaCemptedexitbeforethedooropensandisapplicableonlywhereexitcontrolistheoverridingconsidera3on.

    Stairandexitdoorlockscanbearrangedtobecentrallyreleasedfromtherecontrolcentre.

  • Alterna3velytheclockiswallmountedandtheguardcarrieswithhimakey.

    Acomputerizedversionofthissystemisavailablethatsimpliessta3oncheckin,automa3callychecksinguardvisitdata,andprovidesahardcopydata.

    Guardtoursystemsarealsoavailablethatpermitsconstantsupervisionandarepar3cularlyac3vewhentherearemorethanoneguardonduty.

    Suchsystemsshowonapaneltheloca3onandprogressofthewatchmanbymeansoflightsthatglowwhenthedeviceateachloca3onisoperated.

  • Becausepartoftheeec3venessofthesesystemsliesinthe3mingofthetour,asystemcanbearrangedtosoundanalarmifapar3cularsta3onisnotoperatedwithinaspecic3meperiod.

    Telephonejacksalongtherouteallowtheguardtocommunicatewiththesupervisingoceorotherpointwithoutinterrup3ngthescheduledtour.

    Forprotec3onofareascontaininghighlyvaluableitems,anintrusionalarmsystemcanbeemployed.

  • IndustrialBuildingsSecuritySystems

    Thedesignandengineeringofpersonnelaccesscontrolsystemsisaspecialtythathasburgeonedsincethe1980sandisnowanindependentprofession.

    Thelargevarietyofiden3ca3ontechnologiesplusthecontrolandsupervisoryfunc3onsofcomputers,hasgreatlyenhancedtheaccesscontrolcapabili3esofevenarela3velysmallsystem.

  • Thetradi3onalaccesscontrolques3onwasalwayswhoispermiCedtopassthroughaspecicportal?

    Themeansbywhichtheiden3ca3onismadethatanswersthisques3onvarieswiththeimportanceofaccesscontrolatthatportal.

    Thusentrancetoalarge,mul3purposespaceusedbymanypeoplemustberapidandmustavoidthedelaycausedbyaphysicalbarrier.

    Themeanscommonlyusedisoneormoreguardswhovisuallyandinarela3velycursoryfashioninspectabadgewithanIDphoto.

  • Whenaphysicalaccessbarrierisinvolved,passageisslow,dependingonlypartlyontheiden3ca3onprocess.

    Evenwiththemostrapidelectroniciden3ca3on,adoororportalclosuremustbephysicallyreleasedandoperated,whichcanbevery3meconsuming.Inthepar3cularinstanceshowningure30.23,theiden3ca3onprocessisvery3meconsumingaswellasitinvolveshumaninterven3on.

    UnaCendedphysicalbarrierscanbereleasedbyamul3tudeofiden3ca3ontechnologiesdependingontheirlevelofimportance.Atthelowerendofthesecurityscalearebarriersthatrequiresomeknowledgeand/orinspectanobjectpresentedbytheusersuchasamagne3c,barcodedorproximityreadercard(gure30.24).Becauselockscanbecontrolledelectronicallyandprogrammedremotely,theycanbeprogrammedtogiveaccessatcertain3mesonly,tospecicgroupsofcardsorindividualcardsonly,ortopreventaccesstospeciccards(e.g.cardsreportedlost)orforanyotherreason.Theelementof3mecontrolledaccessisrela3velynew;itintegratesrela3velywellwithintrusionsecuritysystemsbecauseportalscanbeeasilycoordinatedwithchangingworkschedules.Thusapersoncanbebarredformenteringanareainwhichheisnotconcernedwithatthat3meofday(gure30.25)

  • Becauselockscanbecontrolledelectronicallyandprogrammedremotely,theycanbeprogrammedtogiveaccessatcertain3mesonly,tospecicgroupsofcardsorindividualcardsonly,ortopreventaccesstospeciccards(e.g.cardsreportedlost)orforanyotherreason.

    Theelementof3mecontrolledaccessisrela3velynew;itintegratesrela3velywellwithintrusionsecuritysystemsbecauseportalscanbeeasilycoordinatedwithchangingworkschedules.

    Thusapersoncanbebarredformenteringanareainwhichheisnotconcernedwithatthat3meofday(gure6.16)

  • Inviewofthemanymethodsofavailableaccesscontroltechnologies,accesscontrolisusedtolimitaccesstootheraspectssuchastocopymachines,faxmachines,phonelinesandotherocefacili3esfrequentlyusedbyemployeesforotherthanpurelybusinesspurposes.