Perimeter Security. Michael J. Arata, Jr. McGraw-Hill

Size: px
Start display at page:

Download "Perimeter Security. Michael J. Arata, Jr. McGraw-Hill"

Transcription

1

2 Perimeter Security Michael J. Arata, Jr. McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto

3 Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher The material in this ebook also appears in the print version of this title: All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill ebooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please contact George Hoare, Special Sales, at george_hoare@mcgraw-hill.com or (212) TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. ( McGraw-Hill ) and its licensors reserve all rights in and to the work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill s prior consent. You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right to use the work may be terminated if you fail to comply with these terms. THE WORK IS PROVIDED AS IS. McGRAW-HILL AND ITS LICENSORS MAKE NO GUARANTEES OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE WORK, INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR OTH- ERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill and its licensors do not warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill nor its licensors shall be liable to you or anyone else for any inaccuracy, error or omission, regardless of cause, in the work or for any damages resulting therefrom. McGraw-Hill has no responsibility for the content of any information accessed through the work. Under no circumstances shall McGraw-Hill and/or its licensors be liable for any indirect, incidental, special, punitive, consequential or similar damages that result from the use of or inability to use the work, even if any of them has been advised of the possibility of such damages. This limitation of liability shall apply to any claim or cause whatsoever whether such claim or cause arises in contract, tort or otherwise. DOI: /

4 Professional Want to learn more? We hope you enjoy this McGraw-Hill ebook! If you d like more information about this book, its author, or related books and websites, please click here.

5 DEDICATION ACKNOWLEDGMENT ABOUT THE AUTHOR This book is dedicated to my wife, Karla, for putting up with me during the writing of this book; and to my daughter, Kristen; and son, Jimmy, without whose patience and understanding of late nights and weekends spent writing and rewriting, this book would not have been possible. Thank you Victoria Roberts of Lone Wolf Enterprises for the excellent, expert job you did in editing and guidance; without it this project would not have been possible. Michael Arata has over 15 years of security experience that includes positions from manager to vice president and consultant. He has developed and managed successful security programs from the ground up for several large organizations including the Director of Corporate Security for a major West Coast construction company. He holds a master s degree in Public Administration, a B.A. in Business/Public Administration, and a B.S. in Safety and Fire Protection Technology. He has attended numerous seminars and training programs relating to security and holds CISSP, CPP, CFE and ACLM, professional certifications. He has spoken at various professional organization seminars on the subject of security and written articles about security for trade publications. He has guest lectured at the Oklahoma State University and the University of California, Berkeley on safety and security related subjects. He is an adjunct instructor of Criminal Justice at a local college. Copyright 2006 by The McGraw-Hill Companies, Inc. Click here for terms of use.

6 For more information about this title, click here Contents CHAPTER 1 INTRODUCTION CHAPTER 2 THREAT ASSESSMENT AND RISK ANALYSIS BASICS How to Do a Threat Assessment Identify the Risks Analyze the Risk for Probability of Occurrence Calculating the Cost of a Loss The Survey Form The Crime Statistics Risk Analysis Steps Choosing the Method to Mitigate the Risk Planning and Designing CHAPTER 3 PERIMETER FENCE Types of Perimeter Fences Chain Link Wrought Iron Wood Fences Concrete Walls Fence Openings Barbed Wire Razor Wire Fence Design Specifications CHAPTER 4 PROTECTIVE BARRIERS Natural Protective Barriers Man-Made Protective Barriers Decorative Planters Bollards K-Rail Welded Steel Guard Rails Vehicle Arrest Systems Berms and Ditches Design Considerations for Protective Barriers Conclusion CHAPTER 5 SECURITY LIGHTING Foot-Candle Power Categories of Security Lighting Types of Lamps (Luminaries) Types of Security Lighting Lighting Requirements for Perimeter Protection Lighting Requirements for CCTV Electrical Power Sources for Security Lighting Wiring and Lighting Controls Maintenance of Lighting Systems Security Lighting Design Considerations Conclusion CHAPTER 6 ELECTRONIC ACCESS CONTROL Biometric Systems Hand Geometry Fingerprint Reader Iris Scanner Retina Scan Voice Recognition Signature Recognition Facial Recognition Error Rates Combination Systems Access Control System Cards Magnetic Strip Proximity Cards Smart Cards iv

7 Contents v Dual Technology Cards Designing the Access Control System Types of Access Control System Locks Request to Exit Device (REX) Door Contacts Automatic Door Closer Access Control System Panels Sample Design Specifications CHAPTER 7 ALARMS (INTRUSION DETECTION SYSTEMS) Alarm Categories Exterior Intrusion Detection Sensors Interior Intrusion Detection Sensors Sensor Technology Switches Magnetic Switches Balanced Magnetic Switches Mechanical Switches Volumetric Sensors Ultrasonic Sensors Infrared Glass Breaks Microwave Vibration Sensors Fence Vibration Sensors Fiber Optic Electric Field Capacitance Taut Wire Photo Electric Beam Video Motion Detection Intrusion Detection System Design Specifications. 132 CHAPTER 8 PARKING LOTS AND GARAGES Physical Design Features That Enhance Security Natural Surveillance Territorial Reinforcement Natural Access Control Target Hardening Parking Garages Natural Access Control Natural Surveillance Traditional Physical Security Access Control Security Officers Security Survey Parking Lots Lighting in Parking Lots Landscaping in Parking Lots CCTV in Parking Lots Emergency Call Boxes Security Officers Sample Design Specifications for a Parking Garage. 153 CHAPTER 9 CLOSED CIRCUIT TELEVISION (CCTV) CCTV System Components Camera Coaxial Cable Fiber Optic Cable Microwave MUX Monitor Recorders Wireless Cameras IP Addressable Cameras Basic System Design Considerations Lighting CHAPTER 10 LOCKS AND KEYS Types of Locks Keying Systems Specifications CHAPTER 11 DOORS AND WINDOWS Types of Window Frames Types of Window Glass Design Considerations for Doors and Windows CHAPTER 12 DEFENSE-IN-DEPTH People and Defense-in-Depth

8 vi Perimeter Security Physical Security Implementing the Physical Security The Perimeter Fence and Natural Barriers Protective Lighting Access Control Intrusion Detection CCTV Locks and Keys Windows and Doors Blast and Bullet Resistant Protection Fire Protection Protected Zones CHAPTER 13 SECURE AREAS IN A BUILDING Design and Construction of the Secure Room Design and Construction of the Secured (Caged) Area Emergency Power Design Considerations for Secure Rooms and Secure Areas CHAPTER 14 SECURITY DESIGN XYZ Pharmaceutical Company Security Design for the XYZ Pharmaceutical Company Perimeter Security Continuous Lighting Standby Lighting Movable Lighting Emergency Lighting Interior Security CCTV Fire Protection Intrusion Detection Alarm Annunciation Sample Design Specifications CHAPTER 15 PROTECTION OF UTILITIES (ELECTRIC, PHONE, WATER) Protecting Fiber Data Lines and T1 lines Securing the Manhole Covers Protecting the Electric Utility Vaults Securing the Electrical Switchgear Room Securing the Telephone Room/or Closet Securing the Emergency Backup Power System Securing the Water Lines and Wells on Site CHAPTER 16 BLAST PROTECTION Assessment for Blast Protection Physical Security Survey Blast-Hardening CHAPTER 17 FIRE PROTECTION Fire Codes Fire Suppression Systems Wet Pipe Sprinkler Systems Dry Pipe Sprinkler Systems Gaseous Fire Suppression Systems Smoke and Fire Detection Systems Flame Detection Emergency Backup Power Deigning Fire Detection and Suppression Systems. 323 CHAPTER 18 SOUND CONTROL Eavesdropping Devices - The Extent of the Threat. 325 The Devices Soundproofing a Room CHAPTER 19 SHIPPING AND RECEIVING Physical Security for Shipping and Receiving Access Control Intrusion Detection CCTV for Shipping and Receiving Lighting Securing Shipping and Receiving CHAPTER 20 CHECKLISTS AND FORMS INDEX

9 Introduction CHAPTER 1 The news today is filled with heightened awareness and sensitivity about physical or perimeter security due to the threat of terrorism. What does perimeter security mean? We will explore perimeter security in depth in the book. Perimeter security is defined as the protection of the outer boundary of your facility. With the advent of network security, perimeter security is defined as the protection of outer boundaries of the network. We are only going to focus on physical perimeter security in the book. What does perimeter security entail? Perimeter security starts at the property line. This is either a natural or manmade barrier. In most cases it is the fence line. Then there are gates, lighting, the building or structure itself, walls, windows, doors, alarms, etc. Sometimes intrusion detection is used to monitor the perimeter fence line or the detectors are located in the ground. In the chapters that follow we are going to explore in detail each of the elements that make up perimeter security. In Chapter 2 we will examine the security survey and threat assessment. You can t design effective perimeter security that also brings value to the company or the owner without first understanding what you are protecting and who you are protecting it from. Therefore the security survey and threat assessment is the first step. One important aspect is to obtain and understand the crime statistics for the area your project or building is located. The statistics can be obtained from the local police departments. There is also a company that will provide the information and you don t need to purchase any software. All you need to do is to give them an address and they will provide scores for that address based on certain data. The scores are a predictor of the occurrence of crime by type. There are checklists for performing a risk analysis and checklists for completing a security survey. Copyright 2006 by The McGraw-Hill Companies, Inc. Click here for terms of use. 1

10 2 Perimeter Security Chapter 3 will outline the specifications for chain-link fences. The specifications are the Federal DOD requirements which are a standard in the security industry. The types of fences will also be discussed along with their uses. Sample design specifications are also presented. Chapter 4 is all about protective barriers and how they are effective in physical security and protecting the perimeter. The types of barriers will be presented. The designs and their uses will be discussed. Portable and permanent barriers types and uses are explained. Chapter 5 addresses protective lighting the types of systems, uses and the design of the protective lighting system to enhance perimeter security. The proper illumination of lighting for security purposes is discussed and the definition of a foot-candle and its importance to security lighting is presented. Chapter 6 is about access control systems and what is available and the benefits of using dual technology systems. Sample detailed design specifications are provided for the access control system. The integration of alarms and CCTV into one system is discussed. Chapter 7 presents intrusion detection systems (IDS). The use of dual technology systems when deploying an IDS is discussed. All the types of IDS systems are presented and how they work. Sample design specifications a re included in the chapter for use as a guide for developing a set of specification for a project. Chapter 8 concentrates on parking garages and parking lots and how to include security into the design and construction of them. The type of lighting that enhances security in parking garages and lots is outlined. The use CCTV and other security devices to help make the users of the parking garage and lots feel safe. As with the other chapters sample design specifications are included in the chapter. Chapter 9 looks at the world of CCTV. The types of systems used are presented but emphasis is on the digital systems since this is the current trend of the CCTV today. Deign issues are also discussed and as some of the problems that may be encountered in the design and installation. Chapter 10 is all about locks and keys. The uses of the various locking devices are discussed. Key control programs are also presented. Sample design specifications for deigning locking devices into a project are presented. Chapter 11 windows and doors are on the perimeter and a likely point of entry for intruders. The ways to protect the windows and doors by using two types of IDS and better locking devices is explored. The chapter has a sample design specification document for designing secure windows and doors. Chapter 12 the concept of defense-in-depth is explained and how it can improve security in a new facility by designing layers of security. The layered approach will help enhance security because when one layer is defeated there is another layer to tackle for the intruder. The defense-in-depth approach helps to harden the target by making it harder to gain entry and the possibility of being detected.

Tips & Traps for Growing and Maintaining the Perfect Lawn

Tips & Traps for Growing and Maintaining the Perfect Lawn Tips & Traps for Growing and Maintaining the Perfect Lawn This page intentionally left blank Tips & Traps for Growing and Maintaining the Perfect Lawn Rodney Johns MCGRAW-HILL New York Chicago San Francisco

More information

Physical and Environmental Security. CISSP Guide to Security Essentials Chapter 8

Physical and Environmental Security. CISSP Guide to Security Essentials Chapter 8 Physical and Environmental Security CISSP Guide to Security Essentials Chapter 8 Objectives Site access controls including key card access systems, biometrics, video surveillance, fences and walls, notices,

More information

Protecting Multi-level Residential Buildings By GERALD A. O ROURKE, CPP

Protecting Multi-level Residential Buildings By GERALD A. O ROURKE, CPP Residential High-rises and Apartment Complexes Part Two Protecting Multi-level Residential Buildings By GERALD A. O ROURKE, CPP Over the last several years there has been a rapid increase in successful

More information

Australian Standard. Closed circuit television (CCTV) Part 4: Remote video AS AS

Australian Standard. Closed circuit television (CCTV) Part 4: Remote video AS AS AS 4806.4 2008 AS 4806.4 2008 Australian Standard Closed circuit television (CCTV) Part 4: Remote video This Australian Standard was prepared by Committee EL-051, Non-Broadcast Television. It was approved

More information

ADT Security Website Terms of Use

ADT Security Website Terms of Use ADT Security Website Terms of Use Last revised: August 30, 2012 These ADT Website Terms and Conditions of Use (the "Terms") govern your use any websites that are owned or operated by ADT LLC, d/b/a ADT

More information

Construction Method, Material Selection, Fire Prevention & Building Security System For Project 9a : Board 4 ; For Project 9b : Part 4

Construction Method, Material Selection, Fire Prevention & Building Security System For Project 9a : Board 4 ; For Project 9b : Part 4 Construction Method, Material Selection, Fire Prevention & Building Security System For Project 9a : Board 4 ; For Project 9b : Part 4 Issued by: Sr Dr. Md Azree Othuman Mydin 1. Construction Method Which

More information

The. Long Beach, California August 14-17, Solutions Network. Physical Security PERIMETER SECURITY TECHNOLOGIES. Leon Snyman GVI Security, Inc.

The. Long Beach, California August 14-17, Solutions Network. Physical Security PERIMETER SECURITY TECHNOLOGIES. Leon Snyman GVI Security, Inc. Long Beach, California August 14-17, 2005 The Solutions Network Physical Security PERIMETER SECURITY TECHNOLOGIES Leon Snyman GVI Security, Inc. Why Secure the Perimeter? Your Perimeter is Your FIRST line

More information

Intrusion Detection Measures Against Insider Threats In Al-Tuwaitha Nuclear Site

Intrusion Detection Measures Against Insider Threats In Al-Tuwaitha Nuclear Site Intrusion Detection Measures Against Insider Threats In Al-Tuwaitha Nuclear Site 1 Contents Description of Al-Tuwaitha Site. Potential threats inside the site. The responsibilities of the Nuclear Security

More information

Perimeter Product Overview. Effective protection for your business

Perimeter Product Overview. Effective protection for your business Perimeter Product Overview Effective protection for your business The Gallagher difference Our innovation is driven by the desire to solve problems, meet your needs and provide real business value. We

More information

Oracle Retail Merchandise Financial Planning

Oracle Retail Merchandise Financial Planning Oracle Retail Merchandise Financial Planning Release Notes Release 13.4 December 2012 Oracle Retail Merchandise Financial Planning (MFP) provides strategic and financial product planning functions. These

More information

Why Should You Invest In An Access Management System?

Why Should You Invest In An Access Management System? Why Should You Invest In An Access Management System? The key word in this question is Invest. Buying and installing an access system by itself is an investment that will increase security, enhance overall

More information

Using technology to safeguard your people and your property

Using technology to safeguard your people and your property Using technology to safeguard your people and your property Going the extra mile to keep you safe Whether your business is industry, health or education, you can be confident that Chris Lewis Fire & Security

More information

Intelligent Security and Fire Solutions. Southern Africa

Intelligent Security and Fire Solutions. Southern Africa Intelligent Security and Fire Solutions Southern Africa Chubb Southern Africa page 01 MAKING YOUR WORLD A SAFER PLACE Building Possible Chubb Fire and Security South Africa offers one of the world s most

More information

End-to-end security for a Smarter, Safer world

End-to-end security for a Smarter, Safer world End-to-end security for a Smarter, Safer world Introduction Company Profile About Our Company CONSLINT INTEGRATED SECURITY SYSTEMS LTD was established in 2009 to engage in the business of Design, supply,

More information

342 Perimeter Security SECURITY SURVEY FORMS

342 Perimeter Security SECURITY SURVEY FORMS 342 Perimeter Security SECURITY SURVEY FORMS SECURITY SURVEY PART 1 BUILDING and/or SITE PHYSICAL FEATURES 1. Location of facility: 2. Job: 3. Street Address and Zip: 4. Telephone: 5. Number of structures

More information

Gallagher Perimeter Product Overview

Gallagher Perimeter Product Overview Gallagher Perimeter Product Overview 1 security.gallagher.com Gallagher is a global leader in the innovation, manufacture and delivery of security solutions. Meeting our customers needs inspires us to

More information

Millenium Electronic Access Control Systems Networked Real-Time Access Control

Millenium Electronic Access Control Systems Networked Real-Time Access Control Millenium Electronic Access Control Systems Networked Real-Time Access Control N e t w o r k e d R e a Automate routine security issues throughout your facilities. Millenium achieves increased security

More information

Oracle Communications Performance Intelligence Center

Oracle Communications Performance Intelligence Center Oracle Communications Performance Intelligence Center System Alarms Guide Release 10.2.1 E77506-01 June 2017 1 Oracle Communications Performance Intelligence Center System Alarms Guide, Release 10.2.1

More information

SIA/IAPSC CAD Security Symbols

SIA/IAPSC CAD Security Symbols APPENDIX A TABLE OF SYMBOLS (This Appendix shall be considered a fully binding part of this standard.) 1. ANNOTATION 1.01 REF Device Reference A: Drawing Sheet B: Detail C: Device / Zone Number 2. ACCESS

More information

DR Series Appliance Cleaner Best Practices. Technical Whitepaper

DR Series Appliance Cleaner Best Practices. Technical Whitepaper DR Series Appliance Cleaner Best Practices Technical Whitepaper Quest Engineering November 2017 2017 Quest Software Inc. ALL RIGHTS RESERVED. THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

Refrigeration And Air Conditioning Technology 7th Edition

Refrigeration And Air Conditioning Technology 7th Edition We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with refrigeration and air

More information

System Requirements and Supported Platforms for Oracle Real-Time Decisions Applications. Version May 2008

System Requirements and Supported Platforms for Oracle Real-Time Decisions Applications. Version May 2008 System Requirements and Supported Platforms for Oracle Real-Time Decisions Applications Version 2.2.1 May 2008 Copyright 2008, Oracle. All rights reserved. Part Number: E12184-01 The Programs (which include

More information

CompleteView Alarm Client User Manual. CompleteView Version 4.6.1

CompleteView Alarm Client User Manual. CompleteView Version 4.6.1 CompleteView Alarm Client User Manual CompleteView Version 4.6.1 Table of Contents Introduction... 1 Overview...2 System Requirements...2 Configuration... 3 Starting the Alarm Client...3 Menus...3 File

More information

Applying the Patch Release

Applying the Patch Release Oracle Retail Invoice Matching Release Notes Release 13.2.6 July 2013 Oracle Retail Invoice Matching (ReIM) Release 13.2.6 is a patch release for ReIM 13.2. ReIM 13.2.6 includes selected defect fixes and

More information

NZQA registered unit standard 5881 version 6 Page 1 of 5. Demonstrate knowledge of electronic security devices

NZQA registered unit standard 5881 version 6 Page 1 of 5. Demonstrate knowledge of electronic security devices Page 1 of 5 Title Demonstrate knowledge of electronic security devices Level 2 Credits 6 Purpose People credited with this unit standard are able to demonstrate knowledge of the purpose and application

More information

INTRUSION SOLUTIONS. Yehans Surveillance & Security Systems. laser perimeter alarming CONTACT US ON

INTRUSION SOLUTIONS. Yehans Surveillance & Security Systems. laser perimeter alarming CONTACT US ON Yehans Surveillance CONTACT US ON Website: www.yehansinternational.com/ Email: sales@yehansinternational.com Telephone: +233 302 51 25 25 WhasApp: +233 244 31 90 79 Location/Address: GD-185-7157 75 Boundary

More information

Ekin PATROL The First and Only Smart Patrol of the World

Ekin PATROL The First and Only Smart Patrol of the World Ekin PATROL The First and Only Smart Patrol of the World Leader in Safe City Technologies The first and only smart patrol of the world that performs number plate recognition, face recognition, and speed

More information

INDEX INDEX 2 FOREWARD 3 SECTION 1 COMPANY INFORMATION 4 SECTION 2 GRADING AND CERTIFICATION 5 SECTION 3: ADDITIONAL REQUIREMENTS 6 7

INDEX INDEX 2 FOREWARD 3 SECTION 1 COMPANY INFORMATION 4 SECTION 2 GRADING AND CERTIFICATION 5 SECTION 3: ADDITIONAL REQUIREMENTS 6 7 Code of Practice INDEX INDEX 2 FOREWARD 3 SECTION 1 COMPANY INFORMATION 4 SECTION 2 GRADING AND CERTIFICATION 5 SECTION 3: ADDITIONAL REQUIREMENTS 6 7 SECTION 4 EMERGENCY SERVICES 8 9 SECTION 5 POLICE

More information

Hardware and Software Requirements. Integration Enhancements. Functional Enhancements

Hardware and Software Requirements. Integration Enhancements. Functional Enhancements Oracle Retail Point-of-Service Release Notes Release 13.4 E25272-01 December 2011 This document highlights the major changes for Release 13.4 of Oracle Retail Point-of-Service. Overview Oracle Retail Point-of-Service

More information

GE Security. Challenger V8 & V9. User Manual

GE Security. Challenger V8 & V9. User Manual GE Security Challenger V8 & V9 User Manual Copyright Disclaimer Trademarks and patents Intended use Copyright 2008, GE Security Pty. Ltd.. All rights reserved. This document may not be copied or otherwise

More information

APPENDIX G PHYSICAL SECURITY STANDARDS

APPENDIX G PHYSICAL SECURITY STANDARDS APPENDIX G PHYSICAL SECURITY STANDARDS A. Vault and Secure Room Construction Standards 1. w a. Floor and Walls. Eight inches of concrete reinforced to meet current standards. Walls are to extend to the

More information

COMPANY OVERVIEW IN PURSUIT OF OUR COMPANY GOALS WE ARE COMMITTED TO: - Continual improvement. - Trained and dedicated personnel

COMPANY OVERVIEW IN PURSUIT OF OUR COMPANY GOALS WE ARE COMMITTED TO: - Continual improvement. - Trained and dedicated personnel COMPANY OVERVIEW Wordsmart as a company established their reputation by constantly expanding their operating base & offering quality products and services.wordsmart is the foremost security company in

More information

VIDEO SURVEILLANCE MARKET

VIDEO SURVEILLANCE MARKET VIDEO SURVEILLANCE MARKET GLOBAL FORECAST TO 2022 BY SYSTEM (ANALOG & IP), COMPONENT (CAMERA, MONITOR, STORAGE DEVICE, SOFTWARE), SERVICE (VSAAS, MAINTENANCE), APPLICATION (INFRASTRUCTURE, COMMERCIAL,

More information

Integrating & Synthesizing Data for Perimeter Security Awareness

Integrating & Synthesizing Data for Perimeter Security Awareness Integrating & Synthesizing Data for Perimeter Security Awareness ANSI HSSP Perimeter Security Summit May 17, 2005 Mark Bonatucci Lockheed Martin Transportation & Security Solutions Rockville, MD Phone:

More information

Security Considerations for Secure Workplaces

Security Considerations for Secure Workplaces Security Considerations for Secure Workplaces Mitchell Factor HMA Consulting, Inc. USA Canada UK UAE Overview Security Risk Assessment The Process Security Design Process Technology Updates & Design Considerations

More information

GARCIA GALUSKA DESOUSA Consulting Engineers

GARCIA GALUSKA DESOUSA Consulting Engineers L#57297 /Page 1/July 21, 2017 ELECTRICAL SYSTEMS NARRATIVE REPORT The following is the Electrical Systems narrative, which defines the scope of work and capacities of the Power and Lighting systems, as

More information

1.1 Ensure the room is in the ACCESS state. Workstation indicates zone is in ACCESS state.

1.1 Ensure the room is in the ACCESS state. Workstation indicates zone is in ACCESS state. Title: Arming/Disarming Keypad Test Objective: Verify device is installed using acceptable standards and practices, communicates properly with the IDS, and provides proper protection of assets and meets

More information

GAPS Guidelines THEFT GAP.16.3 INTRODUCTION POSITION. Inventory and Accounting. Physical Security Measures

GAPS Guidelines THEFT GAP.16.3 INTRODUCTION POSITION. Inventory and Accounting. Physical Security Measures A Publication of Global Asset Protection Services LLC THEFT INTRODUCTION Theft losses can occur in unattended or unsupervised areas that have no security services. Implement physical security measures

More information

Technology Today. Raytheon s Command, Control, Communications and Intelligence Core Market Delivering Operational Advantages for Our Customers

Technology Today. Raytheon s Command, Control, Communications and Intelligence Core Market Delivering Operational Advantages for Our Customers Technology Today HIGHLIGHTING RAYTHEON S TECHNOLOGY 2007 Issue 3 Raytheon s Command, Control, Communications and Intelligence Core Market Delivering Operational Advantages for Our Customers The Perimeter

More information

Introductions. Security Assessments and Security Master Planning For College Campuses

Introductions. Security Assessments and Security Master Planning For College Campuses Security Assessments and Security Master Planning For College Campuses Presented by: Michael Amaro, PSP, CPTED, C&S Companies Bridgette Anderson, Dutchess Community College Introductions Bridgette Anderson

More information

A COMMERCIAL SECURITY SURVEY. Genaro Cortez, Safety and Risk Manager 3007 N. Ben Wilson, Ste

A COMMERCIAL SECURITY SURVEY. Genaro Cortez, Safety and Risk Manager 3007 N. Ben Wilson, Ste A COMMERCIAL SECURITY SURVEY PREPARED FOR: The University of Houston - Victoria 3402 N. Ben Wilson Victoria, TX 77901-5731 CONTACT: Genaro Cortez, Safety and Risk Manager 3007 N. Ben Wilson, Ste. 107 361-570-4245

More information

Accessories for SMA Inverters Fan Retrofit Kit FANKIT02-10

Accessories for SMA Inverters Fan Retrofit Kit FANKIT02-10 Accessories for SMA Inverters Fan Retrofit Kit FANKIT02-10 Installation Manual FANKIT02-IA-US_en-12 Version 1.2 CA US SMA America, LLC Legal Restrictions Legal Restrictions Copyright 2014 SMA America,

More information

Access Control. Total Perimeter Protection Solutions from one Source

Access Control. Total Perimeter Protection Solutions from one Source Access Control Total Perimeter Protection Solutions from one Source FENCE SOLUTIONS IN ORNAMENTAL CHAIN LINK WOOD PVC ACCESS CONTROL WWW.MERCHANTSMETALS.COM 866-888-5611 A C C E S S C O N T R O L The success

More information

One call protects it all.

One call protects it all. One call protects it all. 2 // Tyco Integrated Fire & Security Two industry leaders. One great resource. Driven by our shared passion for protecting the employees and operations of businesses and institutions

More information

ELECTRONICACCESS ANDELECTRONICSECURITY BUDGETPRESENTATION

ELECTRONICACCESS ANDELECTRONICSECURITY BUDGETPRESENTATION ELECTRONICACCESS ANDELECTRONICSECURITY BUDGETPRESENTATION University of Florida Physical Plant Division February 19 th, 2013 AGENDA Overview Strategic Value Complexity of Management Governance & Staffing

More information

MEDIUM-DENSITY HOUSING # 7. Fire safety

MEDIUM-DENSITY HOUSING # 7. Fire safety BRANZ FACTS MEDIUM-DENSITY HOUSING # 7 Fire safety Moving from low-density to medium-density housing (MDH) involves people living in closer proximity. This has a number of implications for fire safety

More information

Minimal Electric Charge Detection Device for Perimeter Security Systems

Minimal Electric Charge Detection Device for Perimeter Security Systems Journal of Electrical Engineering 5 (2017) 329-334 doi: 10.17265/2328-2223/2017.06.005 D DAVID PUBLISHG Minimal Electric Charge Detection Device for Perimeter Security Systems Odgerel Ayurzana 1 and Hiesik

More information

A basic guide to BS 8418:2015 CCTV Systems for Installers

A basic guide to BS 8418:2015 CCTV Systems for Installers A basic guide to BS 8418:2015 CCTV Systems for Installers April 2017 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form

More information

EVERY DAY IN FIRST CLASS

EVERY DAY IN FIRST CLASS 5560 EXPLORER DRIVE AEROCENTREOFFICES.COM EVERY DAY IN FIRST CLASS EVERY DAY IN FIRST CLASS 5560 EXPLORER DRIVE SF AVAILABILTY ASKING RATE COMMENTS GROUND FLOOR SUITE 101 10,013 Immediate $17.50 Net Ground

More information

Environmental Monitoring SmartSlot Card

Environmental Monitoring SmartSlot Card Environmental Monitoring SmartSlot Card AP9612TH Installation and Quick Start Manual Contents Introduction............................. 1 Overview 1 Product inventory 1 Safety notice 2 Your inspection

More information

Environmental Monitoring Card

Environmental Monitoring Card Environmental Monitoring ard AP9612TH Installation and Quick-Start Manual ontents Introduction............................. 1 Overview............................. 1 Product inventory......................

More information

Oracle Retail Furniture Retail System (FRS) Pricewriter to Xmargin Guide Release October 2015

Oracle Retail Furniture Retail System (FRS) Pricewriter to Xmargin Guide Release October 2015 Oracle Retail Furniture Retail System (FRS) Pricewriter to Xmargin Guide Release 1101 October 2015 Oracle Retail Furniture Retail System (FRS) Pricewriter to Xmargin Guide, Release 1101 Copyright 2015,

More information

Certified Solution for Milestone

Certified Solution for Milestone Certified Solution for Milestone Araani SmokeCatcher Table of Contents Executive Summary... 4 Certified Products... 4 System Topology:... 5 Integrated Functionality... 7 Conclusion... 8 References... 8

More information

A guide to the changes of Amendment 1 of BS

A guide to the changes of Amendment 1 of BS A guide to the changes of Amendment 1 of BS 8418 2015 May 2018 For other information please contact: British Security Industry Association t: 01905 342 020 e: info@bsia.co.uk www.bsia.co.uk Form No. 334

More information

A guide to the changes between BS 8418:2010 and BS 8418:2015

A guide to the changes between BS 8418:2010 and BS 8418:2015 A guide to the changes between BS 8418:2010 and BS 8418:2015 March 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form

More information

Duct Mount. Installation Instructions

Duct Mount. Installation Instructions Duct Mount Installation Instructions 00809-0600-4975 Legal Notice The Flame Detector described in this document is the property of Rosemount. No part of the hardware, software, or documentation may be

More information

Dual Laser InfraRed (IR) Thermometer

Dual Laser InfraRed (IR) Thermometer User Manual Dual Laser InfraRed (IR) Thermometer MODEL 42512 Introduction Congratulations on your purchase of the Model 42512 IR Thermometer. This Infrared thermometer measures and displays non-contact

More information

Simple Steps That Will Have. Home Security. Checklist

Simple Steps That Will Have. Home Security. Checklist Simple Steps That Will Have The Most Impact Effective Home Security Effective Home Security Who Is Tim Schmidt? You may know me as the President and Founder of the Home Defense Association of America ()

More information

2-Port alarmcharge Hub - Manual

2-Port alarmcharge Hub - Manual Installation Manual 1. What s in the box 2. Fixture preparation 3. Mounting 4. Mechanical 5. Device power Operation Manual 6. Device connectors and connections 7. Alarming remote control 8. Safety 9. Warranty

More information

Eye Alert System EA405, EA410, EA420 USER MANUAL

Eye Alert System EA405, EA410, EA420 USER MANUAL Eye Alert System EA405, EA410, EA420 USER MANUAL Version 2013.04.30 I. Product introduction The EA410 product family (EA405, EA410, EA420) driver fatigue alarm system is the most advanced non-contact method

More information

User s Manual and Warranty Information for Counterweighted Chain Drive ThyssenKrupp Access

User s Manual and Warranty Information for Counterweighted Chain Drive ThyssenKrupp Access II User s Manual and Warranty Information for Counterweighted Chain Drive ThyssenKrupp Access Part #2139703 Rev. G II Table of Contents Introduction...3 Elevator Overview...4 Description of Features...5-7

More information

G-MAX IVS R123 Vibration Sensors Perimeter Intrusion Detection System

G-MAX IVS R123 Vibration Sensors Perimeter Intrusion Detection System PS-4001-48461-A G-MAX IVS R123 Sensors Perimeter Intrusion Detection System Product Specifications G-Max Security Tech Ltd a l d o r e c o t e c L td. I n t e g r a t e d S e c u r i t y s y s t e m s

More information

CALL FOR A FREE SURVEY

CALL FOR A FREE SURVEY CCTV FIRE & SECURITY SOLUTIONS MADE SAFE CCTV Systems specifically designed and tailored for the commercial CCTV market What is CCTV? Closed-circuit television (CCTV), also known as video surveillance,

More information

Crime Central Station Burglary Alarm Systems

Crime Central Station Burglary Alarm Systems Page 1 of 10 Scope This criteria is intended to provide Loss Control Representatives with specific guidelines and information for evaluating central station burglar alarm systems for risks carrying crime

More information

Safety Function: Single-beam Area Access Control (AAC)

Safety Function: Single-beam Area Access Control (AAC) Application Technique Safety Function: Single-beam Area Access Control (AAC) Products: Guardmaster Dual-input Safety Relay, Single-beam Area Access Control Sensors with E-stop Safety Rating: CAT. 4, PLe

More information

Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System. FiberPatrol FP1100X

Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System. FiberPatrol FP1100X Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System FiberPatrol FP1100X December 2017 Page 1 of 14 AE-FP-001-IN-R5-E-12/17 This document is intended to provide

More information

Notice... 1 Trademarks... 1 US Patent Numbers... 1 Technical Services Contact Information... 2 Document Conventions... 2 Warranty...

Notice... 1 Trademarks... 1 US Patent Numbers... 1 Technical Services Contact Information... 2 Document Conventions... 2 Warranty... Table of Contents Preface 1 Notice... 1 Trademarks... 1 US Patent Numbers... 1 Technical Services Contact Information... 2 Document Conventions... 2 Warranty... 2 Chapter 1 Radius Overview 6 1.1 About

More information

3820, 3820i, 4820, 4820i

3820, 3820i, 4820, 4820i 3820, 3820i, 4820, 4820i Cordless Imaging Systems Quick Start Guide Note: Refer to your user s guide for information about cleaning your device. For localized language versions of this document, go to

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction Chapter 1 provides an overview of the fundamental aspects of the industries that influence electronic safety and security (ESS) design. Table of Contents Introduction to Safety

More information

SU2000-SM. model OPTICAL TURNSTILES DESCRIPTIVE SPECIFICATIONS TYPICAL INSTALLATION SITES COMMON APPLICATIONS ALVARADOMFG.COM

SU2000-SM. model OPTICAL TURNSTILES DESCRIPTIVE SPECIFICATIONS TYPICAL INSTALLATION SITES COMMON APPLICATIONS ALVARADOMFG.COM model The Supervisor 2000-SM is our thinnest barrier-free turnstile. Its compact form is well suited for applications where space is at a premium. COMMON APPLICATIONS Employee and Visitor Access Control

More information

Marine Insurance Day 2011

Marine Insurance Day 2011 Cargo Loss Prevention Committee Warehouse Security Presentation For Marine Insurance Day 2011 Friday, September 30, 2011 1 Moderator: Peter J. Scrobe, CLPC Chairman Panel: Noreen Graham, Program Chair

More information

BUYERS GUIDE PRODUCT & SERVICE CATEGORIES

BUYERS GUIDE PRODUCT & SERVICE CATEGORIES BUYERS GUIDE PRODUCT & SERVICE CATEGORIES BURGLAR ALARM EQUIPMENT ANNUNCIATORS, LIGHTS, AND SOUNDERS 10100 Annunciators 10150 Entry/Exit 10200 Graphic Displays 10250 Zone Displays 10300 Lights 10350 Emergency

More information

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies Complete solutions for commercial security Verex delivers leading intrusion, access and video products to protect today s companies Scalable, cost-effective security designed for today s businesses Designed

More information

Development of a Security Manual for Historic Covered Bridges. National Center for Wood Transportation Structures

Development of a Security Manual for Historic Covered Bridges. National Center for Wood Transportation Structures Development of a Security Manual for Historic Covered Bridges National Center for Wood Transportation Structures Acknowledgement Federal Highway Administration USDA Forest Products Laboratory All But a

More information

Accessories for SMA Inverters Fan Retrofit Kit FANKIT02-10

Accessories for SMA Inverters Fan Retrofit Kit FANKIT02-10 Accessories for SMA Inverters Fan Retrofit Kit FANKIT02-10 Installation Manual FANKIT02-IA-US_en-10 IMUS-FANK-TL21 Version 1.0 CA US SMA America, LLC Legal Restrictions Legal Restrictions Copyright 2013

More information

BS 8418: 2015 Installation and remote monitoring of detector-activated CCTV systems Code of practice

BS 8418: 2015 Installation and remote monitoring of detector-activated CCTV systems Code of practice administered by BS 8418: 2015 Installation and remote monitoring of detector-activated CCTV systems Code of practice SB 01.2015 Version 1 IMPORTANT NOTICE This document has been developed through RISCAuthority

More information

2018 Annual Fire Safety Report

2018 Annual Fire Safety Report 2018 Annual Fire Safety Report THE CAMPUS FIRE SAFETY RIGHT-TO-KNOW ACT The Higher Education Opportunity Act enacted in August 2008 requires institutions that maintain on campus student housing facilities

More information

Challenger Series Users Manual

Challenger Series Users Manual Challenger Series Users Manual P/N MAUSER-TS1016 05 20AUG15 Copyright Trademarks and patents Manufacturer 2015 UTC Fire & Security Australia Pty Ltd. All rights reserved. The Challenger name and logo are

More information

Hardware and Software Requirements

Hardware and Software Requirements Oracle Retail Xstore Suite Release Notes Release 16.0.0.1 E86009-01 March 2017 This document highlights the major changes for the 16.0.0.1 bundled hot fix of Oracle Retail Xstore Suite. Overview Oracle

More information

Owner s Manual. PIR-1 IR Learner

Owner s Manual. PIR-1 IR Learner Owner s Manual PIR-1 IR Learner PIR-1 Owner s Manual 2010-2013 Universal Remote Control, Inc. The information in this owner s manual is copyright protected. No part of this manual may be copied or reproduced

More information

NX8601BF-AA. Data Sheet R08DS0109EJ0100 Rev.1.00 Apr 19, 2013 LASER DIODE DESCRIPTION FEATURES

NX8601BF-AA. Data Sheet R08DS0109EJ0100 Rev.1.00 Apr 19, 2013 LASER DIODE DESCRIPTION FEATURES A Business Partner of Renesas Electronics Corporation. NX8601BF-AA LASER DIODE 1 625 nm InGaAsP MQW-DFB LASER DIODE COAXIAL MODULE FOR OTDR APPLICATION Data Sheet R08DS0109EJ0100 Rev.1.00 DESCRIPTION The

More information

Tire Storage. Michigan Fire Inspectors Society Fall Conference

Tire Storage. Michigan Fire Inspectors Society Fall Conference Tire Storage Michigan Fire Inspectors Society Fall Conference September 15, 2016 This material, including the illustrations, represent the opinion of the author and instructor. This material is not designed,

More information

Integrated Security and Building Automation Technology Solutions and Services. SDI Security Center of Excellence Charleston, SC

Integrated Security and Building Automation Technology Solutions and Services. SDI Security Center of Excellence Charleston, SC Integrated Security and Building Automation Technology Solutions and Services SDI Security Center of Excellence Charleston, SC SDI 7445 Cross County Road, Suite 10 North Charleston, SC 29418 843.554.7622

More information

Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System. FiberPatrol FP1150

Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System. FiberPatrol FP1150 Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System FiberPatrol FP1150 April 2018 Page 1 of 14 AE-FP-005-IN-R1-E-04/18 This document is intended to provide

More information

Apartment building safety audit assessment

Apartment building safety audit assessment Apartment building safety audit assessment This apartment building safety audit assessment is designed to help residents, tenants and security staff assess the safety and security of their apartment building.

More information

Vacant Building Loss Prevention Best Practices

Vacant Building Loss Prevention Best Practices Vacant Building Loss Prevention Best Practices Vacant properties are susceptible to a unique set of hazards that should be considered and addressed to avoid losses. Occupants are often the eyes and ears

More information

Oracle Retail Distribution Management Release Notes Release October 2007

Oracle Retail Distribution Management Release Notes Release October 2007 Oracle Retail Distribution Management Release Notes Release 10.3.14 October 2007 Oracle Distribution Management Release Notes, Release 10.3.14 Copyright 2007, Oracle. All rights reserved. Primary Author:

More information

Section PERIMETER SECURITY SYSTEMS

Section PERIMETER SECURITY SYSTEMS Section 28 16 43 PERIMETER SECURITY SYSTEMS PART 1 GENERAL 1.1 SUMMARY A. Provide and install a perimeter security system as herein specified for the purpose of detecting entry into a designated security

More information

Avigilon System Integration Guide. Avigilon Control Center with AMAG Symmetry Security Management System 7.0

Avigilon System Integration Guide. Avigilon Control Center with AMAG Symmetry Security Management System 7.0 Avigilon System Integration Guide Avigilon Control Center with AMAG Symmetry Security Management System 7.0 2013-2016, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, HDSM, HIGH

More information

636 and 646 Keypads. User s Manual

636 and 646 Keypads. User s Manual 636 and 646 Keypads 636 646 User s Manual Table Of Contents Basic Operation... 2 Access Codes... 4 Arming & Disarming... 5 Panic Zones... 11 Key Access Programming... 12 Additional Features... 13 Trouble

More information

PASS Security Plan Checklist

PASS Security Plan Checklist [School District Name] PASS Security Plan Checklist SCHOOL DISTRICT INFORMATION Address: Telephone Number: Fax Number: Number of Employees: Number of Students: School Resource Officer: TIER CONTINUUM:

More information

PLUMBING CODE REFERENCE Second Edition

PLUMBING CODE REFERENCE Second Edition PLUMBING CODE REFERENCE Second Edition Written by American Contractors Exam Services Published by /guides 1111135940 DeWalt Plumbing Reference_CS4.indd 1 6/25/10 10:24 AM DEWALT Plumbing Code Reference:

More information

integrated security management

integrated security management Making security easier for you integrated security management Security Scalable Without Loss of Investment From a small system programmed by a single keypad to a large networked system with multiple locations

More information

Fiber Optic Cable Fence Disturbance Sensor

Fiber Optic Cable Fence Disturbance Sensor Architectural & Engineering Specification for Fiber Optic Cable Fence Disturbance Sensor Purpose of document This document is intended to provide performance specifications and operational requirements

More information

ABOUT THIS DOCUMENT AND THE DOCUMENT STRUCTURE WE USE

ABOUT THIS DOCUMENT AND THE DOCUMENT STRUCTURE WE USE ABOUT THIS DOCUMENT AND THE DOCUMENT STRUCTURE WE USE isocket Smart Relay is a complex Smart House system which is installed in the fuse cabinet (electric cabinet) in the house. We therefore assume that

More information

Technical Bulletin April Opticom Infrared System. Optical Preemption Detector Identification Guide

Technical Bulletin April Opticom Infrared System. Optical Preemption Detector Identification Guide Technical Bulletin April 2010 Opticom Infrared System Optical Preemption Detector Identification Guide Overview This document is intended to be used as a guide to identify the various manufacturers and

More information

User Guide. Contents. About this guide. i-on Style Security System

User Guide. Contents. About this guide. i-on Style Security System i-on Style Security System User Guide Contents About this guide.... 1 About i-on Style... 2 System components.... 2 Control unit... 2 Detectors... 2 External sirens... 3 Remote controls... 3 HUA transmitters...

More information

Southern Baptist Theological Seminary. The Michael Minger Act Report for 2008 Activity Reported for Calendar Year 2007

Southern Baptist Theological Seminary. The Michael Minger Act Report for 2008 Activity Reported for Calendar Year 2007 Southern Baptist Theological Seminary The Michael Minger Act Report for 2008 Activity Reported for Calendar Year 2007 Section 1: Campus Security Authority List campus security authority personnel (definition

More information

Perimeter protection for airports with intelligent video surveillance

Perimeter protection for airports with intelligent video surveillance White paper Perimeter protection for airports with intelligent video surveillance Reflections on the service rendered and the return on investment June 2018 Table of contents 1. Introduction 3 2. Traditional

More information

Voice Module Installation Guide. For use with ProSYS 16, ProSYS 40, ProSYS 128

Voice Module Installation Guide. For use with ProSYS 16, ProSYS 40, ProSYS 128 Voice Module Installation Guide For use with ProSYS 16, ProSYS 40, ProSYS 128 Important Notice This guide is delivered subject to the following conditions and restrictions: This guide contains proprietary

More information