This chapter discusses the electronic alarm systems, focusing on design concerns and selection issues. The alarm system with its associated sensors should detect an intruder as early as possible. ...This requires both exterior and interior sensors. The electronic alarm system collects the sensor inputs and provides the alarm and location information to the operator in the security control center (SCC). The goal of a security program is to provide cost effective detection, assessment, delay, and response. A properly designed alarm system provides the first component goal, which is detection. For the corporate security professional, there is a strong interest in utilizing systems that communicate on Internet Protocol (IP) based architecture. The push has been to minimize cost by using existing IT infrastructure in the company. Developing a solid alarm philosophy requires an understanding of the functional requirements. These requirements are developed by understanding the security vulnerabilities, the business risks, the appropriate levels of protection, and the key assets and threats.
This chapter explores the ways to automate tasks. The automation effort must shift to the security control center (SCC) to evaluate ways to automate activities in the SCC. The goal of automation is ...to enhance the operation of security from both the SCC operator and the employee/contractor/visitor/customer user's standpoint. There are many applications that can be automated in the field. Security design is not an engineering discipline where one plug in the information and the output is the only correct answer. It is more of an art where creativity is needed. This chapter explores into automating controlled car parking areas. An automated gate often controls these areas. Another automation example deals with CCTV alarm coverage providing display and recording. CCTV coverage should always be a part of the exterior alarm system, particularly if the system includes outdoor sensors. Another automation approach illustrated in the chapter is a badge reader that is placed at the health center or at the HR office area.
5 - Fire Systems Robert L. Pearson
Electronic Security Systems,
2007
Book Chapter
Fire systems are composed of two basic but distinct functional areas. One is the plumbing/mechanical side and the other is the electronic side. This chapter discusses both the aspects of a typical ...fire system but primarily focuses on the electronic side. Fire and emergency response is important to every security professional. Monitoring these systems may or may not be the part of the security control center (SCC) function; however, the response and evacuation systems are part of the security tasks. Therefore, it is important to understand the inner workings of a fire alarm system. By explaining the physical piping, sensors, and electronic panels, the mystery as to why these systems sometimes cause false evacuations in the buildings is addressed in the chapter. The sprinkler system extinguishes fire. The concept of a sprinkler system is simple: fires develop heat that rises; when that heat reaches the same temperature as the sprinkler head rating, the fusible link in the sprinkler head melts and the water is released.
This chapter discusses the security design process. A tremendous effort goes into the approval process for a new installation project. Months and maybe years go by having areas with poor security or ...a security control center (SCC) that is inadequate and inefficient. Security is always competing against other groups within the company for limited funding. As companies focus on their core business, it is even more difficult to designate funds for security, when it could be used by the part of the company that makes money. The Security department is considered a “necessary evil” and an overhead burden on the company. Although the Security department does not normally make a profit, it does enable other departments to do so. To assure the success of security design project, it is important that the steps up to the point of acceptance of the project are properly handled. These steps include security survey, functional requirements, design, procurement, installation, testing, initial operation, and ongoing support.
This chapter discusses the early decisions that affect the system and their impact on the alarm/access control database, and the many aspects of protection needed to secure a reliable database. The ...development of a security alarm and an access control system for a large facility requires tremendous effort. This effort starts with a list of functional requirements that are translated into a system of alarm and access points. A solidly designed system must be developed and carefully controlled through conception to acceptance. The proper steps that must be taken to ensure an effective security system may take months to complete. The system may incorporate thousands of alarm points and hundreds of badge readers, which will affect all employees in the facility on a daily basis. To assure minimal disruption, a database containing all the alarm points, badge readers, approved access levels, and badges must be accurate, well-maintained, and protected from corruption.
This chapter discusses the maintenance and testing aspects. These functions are tied together, because testing often shows problems that must be addressed by repairing the equipment. Maintenance can ...be broken down into three areas: requested, preventive, and predictive. Requested maintenance is the approach that is taken by the vast majority of Security departments—that is, the “fail-and-fix” mode of maintenance. Preventive and predictive maintenance on security systems is not normally considered to be a cost effective approach; therefore, requested maintenance is the norm. Testing must be scheduled to find these problems. There are hard failures that are easy to find and requested maintenance is the best way to solve them. To address issues of a hardware failure, one must also consider examples of a camera that failed or a badge reader that stopped working. Testing is often overlooked in security centers because of the associated costs.