0% found this document useful (0 votes)
998 views

TOPIC 5 Building Security System

The document discusses building security systems. It covers physical security concepts for buildings, including perimeter control, access control, and monitoring/surveillance. Components of security systems are listed as lighting, perimeter control, access control, pedestrian traffic control and monitoring. Domestic/home security systems including alarm systems and CCTV are also covered. Details are provided on physical security levels of outer perimeter, inner perimeter and interior.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
998 views

TOPIC 5 Building Security System

The document discusses building security systems. It covers physical security concepts for buildings, including perimeter control, access control, and monitoring/surveillance. Components of security systems are listed as lighting, perimeter control, access control, pedestrian traffic control and monitoring. Domestic/home security systems including alarm systems and CCTV are also covered. Details are provided on physical security levels of outer perimeter, inner perimeter and interior.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

BUILDING

SECURITY SYSTEM
SECURITY SYSTEM IN BUILDING

• 1. PHYSICAL SECURITY FOR BUILDING


• 2. CONCEPTS OF SECURITY SYSTEM
• 3. COMPONENTS OF SECURITY SYSTEMS:
• a. lighting
• b. perimeter control
• c. access control
• d. pedestrian traffic control
• e. monitoring and surveillance
SECURITY SYSTEM IN
BUILDING
• 4. DOMESTIC SECURITY SYSTEM
• a. home alarm system
• b. access control system
• c. CCTV
PHYSICAL SECURITY FOR
BUILDING

Three Levels of Physical Security


Physical Security addresses actions you can take to protect buildings, property and assets against intruders.

When designing a physical security program, the three levels you need to protect are your outer
perimeter, your inner perimeter and your interior.
If you can implement two or three forms of security at each level, then you will more than likely have an
effective physical security system.
PHYSICAL SECURITY FOR
BUILDING
Outer Perimeter Security
The outer perimeter of your property is defined by your actual property lines. In securing the outer
perimeter, your goal is to control who can walk or drive onto your property.

• One of the more extreme forms of perimeter security is a barbed wire fence with a gate protected by an armed
guard.
• In other cases, a simple hedge may be sufficient.
• In deciding what type of perimeter security to implement, you need to weigh the risk of an intruder entering your
property with the cost of the available physical security measures.
Two security concepts involved in perimeter security are Natural Access Control and Territorial Reinforcement.
PHYSICAL SECURITY FOR
BUILDING
Outer Perimeter Security - Natural Access Control
Criminals like to feel that they are in control as they enter and exit an area. When they are in control, they
have a low perception of risk, since they believe they are able to move about unnoticed. However, this sense
of control can be denied by limiting and clearly marking the approaches to buildings and properties, thereby
channeling visitors into a defined area.

Natural Access Control is the use of building and landscaping features to guide people as they enter and
exit a space. When applying Natural Access Control, both entrances and exits should be taken into
consideration. Not only do you want to discourage intruders, but you also want to close of any potential
escape routes
PHYSICAL SECURITY FOR
BUILDING
Outer Perimeter Security - Natural Access Control
1. The location of the building and area of that building to be protected

2. The value or desirability of the goods or information within the building

3. The risks relating to the loss of, orinterruption to, business should someone be able to gain
unauthorized entry to the building

4. The use of other security products and technology, including CCTV, intruder detection equipment,
licensed security staff, “theft resistant” products and asset marking system
PHYSICAL SECURITY FOR
BUILDING
Outer Perimeter Security - Natural Access Control
Here is a quick checklist that you can use when implementing Natural Access Control:

•Is vehicle traffic limited to a controlled entrance or entrances?

•Can pedestrians enter my building without being noticed or greeted by an employee?

•Is my rooftop accessible from outside?

•Can a criminal leave my building or property unnoticed?


PHYSICAL SECURITY FOR
BUILDING
Outer Perimeter Security - Natural Access Control
1. Lighting – outdoor, indoor
2. Perimeter control
3. Access Control
4. Pedestrian traffic control
5. Monitoring and surveillance
PHYSICAL SECURITY FOR
BUILDING
Outer Perimeter Security - Territorial Reinforcement
The purpose of Territorial Reinforcement is to prevent unauthorized entry and to create a clear distinction
between public and private property.
This distinction is important for two reasons: legitimate occupants have a sense of ownership and will notice
people who don't belong; intruders, on the other hand, will have a hard time blending in.

Territorial Reinforcement is not the same thing as perimeter security, but the goal of both is the same: keeping
intruders off of your property.
PHYSICAL SECURITY FOR
BUILDING

Inner Perimeter Security


Your inner perimeter consists of the doors, windows and walls of your building(s).

Protecting your inner perimeter is usually accomplished with locks, keys and alarm systems.

The purpose of locks and keys is to keep intruders out. An electronic access control system is also a useful tool
to control the flow of traffic into your inner perimeter.

Finally, the alarm system warns you when the perimeter is breached.

When designing any perimeter security system, be careful not to lose control of your keys. If an unauthorized
person can make copies of your keys without your knowledge, then you have a serious security weakness.
PHYSICAL SECURITY FOR
BUILDING
Interior Security
Interior security is your final level of security and consists of the interior of your building(s).

Security cameras are an effective tool for monitoring the interior of your business as well as recording
evidence of crimes for later investigation.

You can protect your interior with motion detectors that will sense the presence of intruders, security guards
and volunteer floor marshalls.

Electronic access control systems can also be employed to control the flow of traffic within your facility and
prevent unauthorized people from gaining access to protected areas.
PHYSICAL SECURITY FOR
BUILDING
HOME SECURITY
Home security is something applicable to all of us and involves the hardware in place on a property, and
personal security practices. The hardware would be the doors, locks, alarm systems, lighting,
motion detectors, and cameras systems that is installed on your property.
Personal security practices would be ensuring doors are locked, alarms activated, windows closed and many
other routine tasks which act to prevent a burglary.
PHYSICAL SECURITY FOR
BUILDING
HOME SECURITY

1. Robbery alarm; Input devices, output devices, alarm panel, keypads

2. Access Control System; control point, readers, control panel

3. Closed circuit television system (CCTV); cameras, monitors, coaxial cable, digital video
recorders (DVRs)
• The term access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons. Physical access
control can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through
technological means such as access control systems like the mantrap. Within these environments, physical key management may also be
employed as a means of further managing and monitoring access to mechanically keyed areas or access to certain small assets.[citation needed]
• Physical access control is a matter of who, where, and when. An access control system determines who is allowed to enter or exit, where they
are allowed to exit or enter, and when they are allowed to enter or exit. Historically, this was partially accomplished through keys and locks.
When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and
keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on
any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder
is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed]
• Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to
replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the
door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted
access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked.
• When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control
panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied
based on the access control list, the door remains locked. If there is a match between the credential and the access control list, the control panel operates a relay that in
turn unlocks the door. The control panel also ignores a door open signal to prevent an alarm. Often the reader provides feedback, such as a flashing red LED for an
access denied and a flashing green LED for an access granted.[citation needed]
• The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access
rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor
authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a
second credential, operator intervention, or a biometric input.[citation needed]
• There are three types (factors) of authenticating information:[2]
• something the user knows, e.g. a password, pass-phrase or PIN
• something the user has, such as smart card or a key fob
• something the user is, such as fingerprint, verified by biometric measurement
• Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now
recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up
to allow for such scenarios. For example, a user may have their password, but have forgotten their smart card. In such a scenario, if the user is known to designated
cohorts, the cohorts may provide their smart card and password, in combination with the extant factor of the user in question, and thus provide two factors for the user
with the missing credential, giving three factors overall to allow access.
• An access control point can be a door, turnstile, parking gate, elevator, or other physical barrier, where
granting access can be electronically controlled. Typically, the access point is a door. An electronic access
control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is
unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The
reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader.
Readers do not usually make an access decision, but send a card number to an access control panel that
verifies the number against an access list. To monitor the door position a magnetic door switch can be used.
In concept, the door switch is not unlike those on refrigerators or car doors. Generally only entry is
controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the
opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit
(REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is
pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the
door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress.
This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-
to-exit device also unlocks the door.[citation needed]
"CCTV" redirects here. For the Chinese channel, see China Central Television. For other uses, see CCTV (disambiguation).

Surveillance cameras (iFacility) on the corner of a building.

Dome CCTV cameras.

Dome camera in a rail station


Closed-circuit television (CCTV), also known as video surveillance,[1][2] is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in th
Surveillance of the public using CCTV is common in many areas around the world. In recent years, the use of body worn video cameras has been introduced as a new form of surveillance, often used in law enf
In industrial plants, CCTV equipment may be used to observe parts of a process from a central control room, for example when the environment is not suitable for humans. CCTV systems may operate continuo
There are about 350 million surveillance cameras worldwide as of 2016. About 65% of these cameras are installed in Asia. The growth of CCTV has been slowing in recent years.[8]

You might also like