Upload
cheganji
View
21
Download
6
Embed Size (px)
DESCRIPTION
Topic_6 services in tall building
Citation preview
Topic6SecuritySystems
Introduc3onandIssues
Securityisafundamentalhumanrequirement.Itisanaturalins3ncttopreserveourselves,ourlovedonesandourpropertyfromanyintrusionoranydanger.
Thislecturelooksatthesecurityfactorsaec3ngthedesignofthebuilding,itsinteriorlayoutsandsurroundings.
Wewilllookatrelatedaspectsoftypesofsecuritybreachesplanning,detec3ondevicesandalarmsystems.
Inreality,allpartsofabuildingcanbepenetrated,eventhosemadeofsteelandreinforcedconcrete.Allbuildings,nomaCerhowsmall,shouldprovidesomelevelofsecurity.
Securitysystemscanbedividedintotwomajortypes,passivesystemsandac3vesystems.
Passivesystemsdonotincludeanydedicatedhardwareforsecurity,butisbasedmainlyonspa3alplanningandorganiza3on,managementandbuildingfabricandconstruc3on.
Ac3vesecuritysystemsemploydedicatedhardwarethatac3velydetectsandcontrolssecuritybreachesandcondi3ons.Ac3vesystemsincludedetec3onandalarmsystems.
SecurityPlanning
Eventhoughthereisnofullproofsecuritysystems,theobjec3veofsecurityplanningistodelay,confuseandcontrolintrudersthroughoutthebuildingslife3me.
Therstaspectofsecurityplanningistodeterminethelevelofriskfromintrusionthatthebuildingissuscep3bletoandtostrategiseaccordingly.
Thereare5levelsofsecurityLevel1 Securityagainstvandalsandopportunists.Forexampletargeted
publicameni3es,conden3alinforma3on.Level2 Securityagainstintrudersandinterlopers,unwantedand
unwelcomevisitorswithdubiousinten3ons.Level3 Securityagainstburglarsandburglariesofhouseholditems,
importantinforma3on.Level4 Securityagainstplannedanddeliberatecrimes.Securityforhigh
valueitemssuchasjewelry,valuablepain3ngs,cashetc.Level5 Securityagainstactsofterrorismandespionagee.g.industrialand
poli3cal
TypesofIntrusionsIntrusionsandsecuritybreachesbecomeincreasinglymorecomplexdaybyday
intermsoftechniquesandtargets.
Thesecanbeclassiedintothefollowing:
Voyeurism,vandalismandunplannedtheUs.Takingadvantageandopportuni3esofinsecureloca3ons.
Spyingandespionageaswellasplannedrobberies.Theintruderdeterminesthetargetandthemethods.Thisincludesdecep3onsandembezzlements.Canoccurfromwithoutorwithinanorganiza3on.Countermeasuresontopofphysicalaspectsinclude3ghteningofmanagementsystems.
Sabotage.Intendeddestruc3onofpropertyorindustrial/businessprocesses.Arson,explosions,etc.
Assault.Usuallytowardsanimportanttarget,coreofanorganiza3on.Eec3veac3veandpassivesystemsarenecessary,includingtheuseofsecuritypersonnel.
VandalismandDesignSolu3ons
Vandalismresultsinthedestruc3onofpublicpropertyinpublicplaces.Signicantsocialstudieshavebeenconductedandtheoriesappliedbuttheproblemisdiculttocontrol.Mi3ga3onprocedurescannonethelessbetaken.
Whydoesvandalismoccur?
Vandalismisusuallyassociatedwithcrimesormisdemeanorscarriedoutbyjuvenilesunder15yearsofage.Betweentheagesof10and15,vandalismisconsideredasagame.Asthechildgrowsolder,interestschangeandthesenseofresponsibilityandpossessionincreases.Actsofvandalismarealsoconductedbyadultsespeciallywherethereissocialdecay.Targetsofvandalismincludepropertythatisseenaspublicandwithoutdirectownership.Insuchcases,itisimportanttoinculcatethesenseofbelongingandcommunityamongthesurroundingpeople.
Examplesoftargets:Playgrounds,walkways,liUs,publicfurnitureandtoilets.
Typesofvandalism:destruc3on,gra3andmisuse.
Whattriggersvandalism?
Factorswhichtriggervandalisminclude: Untendedproperty Propertythatisalreadydamaged,e.g.Dirtywallsandbrokenwindows
Con3nuousdeteriora3onoftheaboveleadingtosocialdistressandlowqualitysurroundingsanddiscomfortresul3nginslumareas.
Howtoavoidvandalism?
DefensibleSpace Applytheconceptsofdefensiblespacewherethespiritof
ownershipandbelongingisinculcated,andwherepublicandpublicaccessspacesareobservablebysegmentsofthecommunity.
Reducethenumberofpublicspacesandencouragesocialsurveillance.Surveillancebyindividualsand/orgroupsofindividualsthathaveastakeorcommitmenttowardsapar3cularspace.
PlacesthatappearwithoutownersareoUentargeted.
DefensiveConcepts Ensurethatpublicameni3esaremadeofsternermaterialsthatarediculttodamage.
ManagementConcept. Ensuredamagedpropertyoritemsarerepairedquicklybeforethesitua3ondeteriorates.
PublicAwarenessCampaigns.
SecurityPlanning
Securityplanningconsistsof
PhysicalPlanningmadeupofpassivesecuritysystemscombinedwithac3vesecuritysystem.
includeshardwareaswellaswhatisalreadyphysicallyinplace.
ManagementPlanning includesthepoliciesinplacewithintheorganiza3onsandtheworkculture.
PhysicalPlanning
Useofphysicalbarriersasalineofdefensearoundanarea,spaceorbuilding.
TherearethreestagesofphysicalPlanningforsecurity:
3 Lines of Defense
Fig 6.1 Three Lines of Defense
PhysicalPlanningFirstLineofdefense
Normallyoccurringaroundtheperimeteralongthesiteboundary.
Itcanbeeithermanmade(gates,fencesetc.)ornatural(rivers,lakes,clisetc)
Servestodelayortemporarilyobstructintendedintruders.Servesasadeterrentanddiscouragesrandomactsofsecuritybreach.
Elementsthatneedconsidera3onareingressandegress,emergenciesandcontrol.
Canbecombinedwithac3vesecuritysystemsWhenthebarriersarelocatedoverawidearea,aclearzonecanbecreatedoverwhichvisualsurveillancecanoccur,betweenthe1stand2ndlineofdefense. Ifthereisconsiderablelandscaping,itisadvisabletoincludeac3vesystems.Thornyplantsaddtothesecurityaspect.Asecuritytowersystemcanbeu3lized.Itseec3venessdependsonitsloca3onandheight.Itsisolatedloca3onmayresultinareduc3oninalertnessofthesecuritypersonnel.
2ndLineofDefense
Thisisa3dimensionalmechanismwhichismoreimportantthanthe1stlineofdefenseasthereareseveralpoten3alweakpoints.Elementsthatneedpar3cularaCen3onare:
Doorshingesandlocksneedpar3cularconsidera3ondependingonthebuildingsriskfactors.
WindowstheweakestpointconsideringglassisoUenused.Forhighriskbuildingsthatdonothavesecuritygrilles,sensoralarmsystemsshouldbeused.
EmergencydoorsIfnotplannedproperly,thisisthemostvulnerablepointofintruderentry.Directonewayexitthatisunlockedshouldbeconnectedtosecuritysensors.Theseexitsshouldbelocatedinexposedareasthatarenothiddenfromgeneralviews.
Roofs
3rdlineofDefense
A3dimensionalsystemthatifdesignedproperlycanpreventtransgressorsfromacquiringvaluables.
Examplesaresafes,strongrooms,panicrooms.
Risklevelswilldeterminethetypeofsecurityrequired.
Valuablesshouldonlybehandledandguardedbyspecicpersonnelonly.
Aneec3vebarrierisaroomwithinabuildingthatisisolatedfromotherareas.
Itsloca3onisoUeninthecentralpartsofabuildingwithoutwindowsordirectexitpoints.
Entrypointsareminimizedandcontrolled.Avoidcommonwallswithotherbuildings.
InternalCircula3onandSecurityManagement
Properlyplannedbuildingslimitareasthatneedtobeprotected,reduceentrancesandprovidenounobservedlinesofapproach.
Costsofprovidingalarms,securityguardsandprotec3onarereducedandmoresecurebuildingsresult.
Internalcircula3onofabuildingcanpresentmanysecurityproblemsespeciallyatentrances.
Eachunsupervisedentranceisariskdayandnightand24hoursupervisionwithholidaysandreliefcanbearsignicantcost.
3typesofintrudersforbuildingsinuseare: Unauthorisedpersons Authorisedpersonswhocommittransgressions
Visitorswithocialbusinesswhotakeadvantage
Onlypropersecuritymanagementsystemscanprevent2and3above.
Architectsmustallowforsecurityplanningtoenabletheorganiza3ontoplanitsmanagementofsecurityespeciallyforhighriskbuildings.
TargetRisks
Everybuildinghashighrisktargets,example:cashregisters,safes,strongroomsetc.
Concentriczonesaccordingtothelevelofsecurityriskscanbeu3lizedtoraisetheawarenessofthelevelsofsecurityforstaandvisitors.
Ac3veIntrusionDetec3onSystems
Tounderstandthedesignofintrusiondetec3onsystems,itisnecessaryrsttounderstandthecharacteris3csofthecommonlyavailableintrusiondetectors(sensors)onwhichthesesystemsarebased.
Onceanintrusionalarmhasbeengivenbyasensor,thesignalmustbeprocessedandappropriateac3ontaken.Thismayincludesoundingloudalarms,turningonlights,sendingsignalstoproprietaryorprivatesurveillanceservicesorpoliceetc.
Elementsinanac3veIntrusionDetec3onSysteminclude: Detec3ondevicesorSensors ControlEquipmentswitches,relays,resetbuCons Signalinglinkwiredconnec3ontoalarmbellsorsurveillance
serviceprovidersorpolice. Wiredconnec3ontopowersourcemainsorbaCery. Powersource
MechanicalMo=onDetectors Thiscanbeusedwherewindowfoilorxedcontactsare
imprac3cal. Thisdeviceisaspringmountedcontactsuspendedinsidea
secondcontactsurface. Anyappreciablemo3onofthesurfaceonwhichthedeviceis
placedcausesthecontactstoconnecttemporarily,turninginanalarm.
Thesedevicesareverysensi3veandcanbeac3vatedbysonicbooms,wind,andevenaheavytruckpassingby.Forthisreasonsuchunitsareprovidedwithsensi3veadjustment.
PhotoElectricDevices Thesedevicesoperateonthesimpleprincipleofbeaminterrup3on.
Whenthebeamisreceived,acontactinthereceiverisclosed. Interrup3oninthebeamcausesthecontacttoopensefngofthe
alarm. Olderdevicesusevisiblelightbeamwhichiseec3veindoors,but
outdoordust,insects,birdsetc.showtheloca3onofthebeam.Birdsandsmallanimalssetito.Dispersionoflightalsolimitsthethrowofthedevicesoutside.
Modernunitsuselasersandinfrared(IR)beams,whicharelesseasilydetectedandcanbearrangedtodieren3atebetweenintrudersandotherdisturbances.
Whenalaserbeamisused,thesignalcanbepickedup,ampliedandtransmiCedadierentdirec3on,thusestablishingaperimetersecurityfencefromasinglesource.
Theabilitytofocusonapar3cularareaisu3lizedtocoverareasbothhorizontallyandver3cally.
AsthePIRdetectorsarenotsensi3vetomo3onbutaretoheatitisusablewheremo3onisunavoidable.
TheprincipledisadvantageofPIRdetectorsisthatrapidtemperaturechangescausedbydirectinsola3on,acoldbreeze,aheaterturningonetccancausethealarmtotrigger.
PIRdetectorscanbeusedasmo3ondetectorsbyusingamul3beam(zone)unit.
Mo3onisdetectedaschangesinIRradia3onofadjacentzonesorintheradia3onofazoneorintheradia3onofazonewithrespecttothebackground,bothofwhichcharacterizemo3on.
HoweverbecauseDopplereectdependsonrela3vemo3onbetweenthesourceandthemovingbody,anintrudermovinglaterallymaygoundetectedifsensi3vityhasbeenreducedtoavoidfalsealarms.
Thereforeunitsshouldbelocatedsothatthepathofanintruderisasnearlyaspossibledirectlytowardorawayfromthedetector.
Ultrasonicunitsarecheaperthanmicrowaveunitsbutcanbedisturbedbystrongairturbulenceandveryloudnoises.
Microwaveunitsareundisturbedbyairornoisebutbecausetheypenetratesolidstheycanbeaectedbymo3onoutsidetheprotectedarea.
Acous=cDetectors Theseunitsalarmwhenthenoiselevelexceedsapresetmaximum.
Alterna3velytheycanbearrangedtorespondtoapar3cularrangeoffrequenciescorrespondingtothenoiseofbreakingglass,forcedentryorwhateverisdesired.
Althoughappliedprincipallyinsecuritysystems,theycanalsobeusedasoccupancysensorsforswitchingofligh3ng.
Mul3pleDetectors Aswithredetectors,abalancemustbestruckbetweenthesensi3vityof
detectorsandthenuisanceoffalsealarmsasincreasingtheformerincreasesthelaCeraswell.
Oneveryeec3vemethodistousemul3pledetectorswithdierenttechnologiesthatverifyeachother.UnitsareavailablethatcombinePIRandultrasonicdetectorsinasinglehousing.
Itdoesnottransmitanalarmun3lbothdetectorsindicateintrusion.Thisdualtechniqueisapplicableforareaandperimeterprotec3onaswellasportalsurveillance.
Residen3alIntrusionAlarmSystems
Residencesusuallyu3lizedoorandwindowmagne3cswitchesaswellasPIRand/ormo3ondetectors.
Amanualswitchattheendofalongcordisalsoprovidedsothataresidentmaysetothealarmatwillifanintruderisheard.
Ifthesystememploysthesameaudiblesignaldevicesastheresystem,thesoundshouldbedis3nc3vesothatthenatureofthealarmcouldbediscernedaurally.
Intrusionalarmsystemscanbecon3nuallysupervisedbyconnec3onswithcentralsta3onsofcompanieswhosebusinessissuchsupervisionandthatresponddirectlytoanalarmcallorno3fylocalpoliceofanyillegalentry.
Mul3pleDwellingEntryandSecuritySystems
Apartmenthousesandotherlargeresidencescombinethefunc3onsofthefamiliarlobbytoapartmentcommunica3onsystem.
ThemostbasicsystemisaseriesofpushbuConsinthelobbyandanintercomspeakerortelephonewithwhichtocommunicatewithresidents.
AttheotherendthetenanthasaspeakermicrophoneplusalobbydooropenerbuCon.
Thissystemcanalsobearrangedtou3lizethetenantsregulartelephone.
Whenthenumberoftenantsisverylarge,analphabe3calrosterisaddedtotheapartmentbuConpaneltoavoidthenuisanceofscanningalltheapartmentnameswhenthesoughtpartysapartmentnumberisnotknown.
Forevenlargernumbers,analphabe3caltenantregisterplusabuConphoneisused.Closedcircuitt.v.systemisfrequentlyaddedtothelobbysystemenablingthetenanttoalsoseethecaller.
Suchasystemincreasestheelectricalcontractcostforanaverageapartmenthouse5%to7%.
CallbuConswithinapartmentscanbeusedtoperformanyalarmfunc3onsrequiredtodealwithanintruderwhomanagestobypassthelobbysecuritycheck.
Ingeriatrichousingdesigns,thesebuConsalsoservetounlocktheapartmentdoortoallowhelperstoenterifsummonedbylightsandalarms.
Inluxuryapartmentbuildings,apartmentdoorscanbemonitoredfromacentralsecuritydeskandanyunscheduleddoormovementsubjectedtoimmediateinves3ga3on.
Thesesystemsarecustomdesignedtomeettherequirementsoftheowner.
HotelsandMotelsSecuritySystems
Asecurityproblemapplicabletoallfacili3es,includingresiden3al,involveslimi3ngentryinunsupervisedareastoauthorizedpersons(i.e.unsupervisedaccesscontrol)
Theproblemsofkeysandlocksiswellknown,despiteadvancesinthateld.
Moresophis3catedmeansincludemagne3ccardsandelectroniccombina3onlockswhich,becauseoftheeaseofcodechange,arepar3cularlyusefulforresiden3alfacili3esthatcaterfortransients.
Theemergencycallsystemisalsoappropriateforallhousinginstalla3onsespeciallyfortheelderlyandhandicapped.
Thepurposeofthesystemistoalertoutsiderstoanemergencysitua3oninsideaclosedapartment.Thealarmsystemisawaytocallforhelpin3mesofillnessorotherdistress.
MostoUenthesesystemsprescribeacallini3a3onbuConineachbedroomandbathroomthatregistersanaudible(alarm)andvisible(annunciated)signalataloca3onthatismonitoredlocallyorremotely24hoursaday.
Addi3onalsignalsarerequiredintheoorcorridorandattheapartment,toalerttheimmediateneighbours.
HotelsandMotelsSecuritySystems
Becauseofthetransientpopula3onofthesefacili3esandtheneedtoprovidemaximumserviceandsecurityforguestsduringtheirstay,theprincipalprobleminaddi3ontoroomaccesssecurityishotelequipmentsecurity(i.e.preven3onofshrinkage).
RoomAccessSecurity. Theineec3venessofkeylocksinpreven3ngundesiredentryeveninprivate
homesiswellknowninhotels.ThekeyisliClemorethanapsychologicalbarrier.
Asaresultmostmodernhotelshaveinstalledelectronicroomlockswhoseopeningdevicecodeischangedwitheverynewguest.
TheselocksmaybeofthecodedpushbuContypewhosecodingischangeablefromacentrallocksecurityconsole;amagne3callyorpunchholecodedcardtype(gure6.9);oraprogrammablecodedlockandcodedkeytype(gure6.10).
Allofthesesystemshaverela3veadvantagesanddisadvantages,dependingonthenumberofrooms,whethertheinstalla3onisnewconstruc3onorretrot,andtheaveragelengthofthegueststay.
EquipmentSecurity. Theneedtoprovideexpectedservicesrequiresthatguestrooms
beequippedwithatelevisionandpossiblyotherelectronica.v.devices,mee3ngroomswitht.v.s,computersandLCDprojectors;andthattheseandotherdevicesbemadeavailableforguestsuseaspartoftheroomfeeoronarentalbasis.
Onesystemthatsalsoapplicableinschools,ocesandindustrialbuildingssensesthedisconnec3onoftheequipmentfromitspowerconnec3on(wallplugs)andtransmitsanalarmoverthepowerlinestoanannunciatorataselectedcontrolloca3on.
Thishastheadvantageofalarmingimmediatelyofequipmentremovalpermifngappropriateretrievalac3ontobetakenin3me.
SchoolSecuritySystems Althoughintrusionalarmandsecuritysystemsarenothistorically
normalschoolrequirements,thesitua3onhasunfortunatelychanged.
Sensingdevicesonwindowsanddoorscanbearrangedbothtotriplocalalarmsandviaauxiliarycircuits,tono3fypoliceheadquarters.
OUenvandalscanbefrightenedobyhavingthealarmsystemactuateaprotec3veligh3ngsystemthatilluminatesabuildingexteriorandanybuildinginteriorrequired,suchasrecordrooms.
Aperimeteralarmdetec3onsystemofthetypesdescribedearliercanbeinstalledinpar3cularlyvandalproneareastoassistinpreven3ngentrytoschoolpremisesaUerhours.
Onemodelofdooropeneralarmsrequiresacon3nuouspressureonthedooropeningbarof10to20secondsbeforethedooropens,withthedoorbeingimmediatelyac3vatedupontheapplica3onofpressure.
Thisarrangement(usedonlywhererecodespermit)allowssucient3meforthefacilitysstatoinves3gatetheaCemptedexitbeforethedooropensandisapplicableonlywhereexitcontrolistheoverridingconsidera3on.
Stairandexitdoorlockscanbearrangedtobecentrallyreleasedfromtherecontrolcentre.
Alterna3velytheclockiswallmountedandtheguardcarrieswithhimakey.
Acomputerizedversionofthissystemisavailablethatsimpliessta3oncheckin,automa3callychecksinguardvisitdata,andprovidesahardcopydata.
Guardtoursystemsarealsoavailablethatpermitsconstantsupervisionandarepar3cularlyac3vewhentherearemorethanoneguardonduty.
Suchsystemsshowonapaneltheloca3onandprogressofthewatchmanbymeansoflightsthatglowwhenthedeviceateachloca3onisoperated.
Becausepartoftheeec3venessofthesesystemsliesinthe3mingofthetour,asystemcanbearrangedtosoundanalarmifapar3cularsta3onisnotoperatedwithinaspecic3meperiod.
Telephonejacksalongtherouteallowtheguardtocommunicatewiththesupervisingoceorotherpointwithoutinterrup3ngthescheduledtour.
Forprotec3onofareascontaininghighlyvaluableitems,anintrusionalarmsystemcanbeemployed.
IndustrialBuildingsSecuritySystems
Thedesignandengineeringofpersonnelaccesscontrolsystemsisaspecialtythathasburgeonedsincethe1980sandisnowanindependentprofession.
Thelargevarietyofiden3ca3ontechnologiesplusthecontrolandsupervisoryfunc3onsofcomputers,hasgreatlyenhancedtheaccesscontrolcapabili3esofevenarela3velysmallsystem.
Thetradi3onalaccesscontrolques3onwasalwayswhoispermiCedtopassthroughaspecicportal?
Themeansbywhichtheiden3ca3onismadethatanswersthisques3onvarieswiththeimportanceofaccesscontrolatthatportal.
Thusentrancetoalarge,mul3purposespaceusedbymanypeoplemustberapidandmustavoidthedelaycausedbyaphysicalbarrier.
Themeanscommonlyusedisoneormoreguardswhovisuallyandinarela3velycursoryfashioninspectabadgewithanIDphoto.
Whenaphysicalaccessbarrierisinvolved,passageisslow,dependingonlypartlyontheiden3ca3onprocess.
Evenwiththemostrapidelectroniciden3ca3on,adoororportalclosuremustbephysicallyreleasedandoperated,whichcanbevery3meconsuming.Inthepar3cularinstanceshowningure30.23,theiden3ca3onprocessisvery3meconsumingaswellasitinvolveshumaninterven3on.
UnaCendedphysicalbarrierscanbereleasedbyamul3tudeofiden3ca3ontechnologiesdependingontheirlevelofimportance.Atthelowerendofthesecurityscalearebarriersthatrequiresomeknowledgeand/orinspectanobjectpresentedbytheusersuchasamagne3c,barcodedorproximityreadercard(gure30.24).Becauselockscanbecontrolledelectronicallyandprogrammedremotely,theycanbeprogrammedtogiveaccessatcertain3mesonly,tospecicgroupsofcardsorindividualcardsonly,ortopreventaccesstospeciccards(e.g.cardsreportedlost)orforanyotherreason.Theelementof3mecontrolledaccessisrela3velynew;itintegratesrela3velywellwithintrusionsecuritysystemsbecauseportalscanbeeasilycoordinatedwithchangingworkschedules.Thusapersoncanbebarredformenteringanareainwhichheisnotconcernedwithatthat3meofday(gure30.25)
Becauselockscanbecontrolledelectronicallyandprogrammedremotely,theycanbeprogrammedtogiveaccessatcertain3mesonly,tospecicgroupsofcardsorindividualcardsonly,ortopreventaccesstospeciccards(e.g.cardsreportedlost)orforanyotherreason.
Theelementof3mecontrolledaccessisrela3velynew;itintegratesrela3velywellwithintrusionsecuritysystemsbecauseportalscanbeeasilycoordinatedwithchangingworkschedules.
Thusapersoncanbebarredformenteringanareainwhichheisnotconcernedwithatthat3meofday(gure6.16)
Inviewofthemanymethodsofavailableaccesscontroltechnologies,accesscontrolisusedtolimitaccesstootheraspectssuchastocopymachines,faxmachines,phonelinesandotherocefacili3esfrequentlyusedbyemployeesforotherthanpurelybusinesspurposes.