Security System
Security System
Security System
1. General
Deter
Delay
Delay is provided by the presence of physical barriers protecting the assets. e.g.
Safes, vaults, walls, ceilings, doors, locks, fences, etc.
Detect
Alert/Alarm/Communicate
Respond/Action
Respond is executed by the response force that responds to the intrusion alarm.
For example, security guards or policemen come and have a check,
automatically lock all the possible exit of the property.
9-Sep-15 Page 1
Security System
Often Conflict
e.g. ease of escape in case of fire <--------> the need to keep out intruders
May Conflict
e.g. high window openings can prevent children climbing up and falling out,
they may impede or even prevent escape in fire.
The system designer has to decide what is best in the circumstances but first
he must attempt to see the many aspects of safety and security as an integrated
whole.
Risk management is to assess the value of the object under protection and the
possibility of threat, then matching the security system with the risk
assessment. The law of diminishing returns applies to this work as to any
other. No one should use an advanced and expensive system to protect
something which is not that valuable and with low chance of threat.
Suggested solution for risk management is as shown on Figure 1.
Before a security system can be designed to protect any assets, the designer
should conduct a threat analysis to identify and determine the sophistication of
the threat. The threat can be either internal or external to the organization, or
both, and the skill level can be expected to range from unskilled to skilled, to
highly skilled. Knowing the threat is the primary prerequisite for designing an
9-Sep-15 Page 2
Security System
The designer should continually coordinate his security system design and
maintenance concepts with those individuals who will be affected by
implementation. These are the individuals which must operate and maintain
the facility’s performance within any restrictions that might be imposed by the
security system. The designer should also concern about those individuals who
are responsible for safety of the employees and other occupants of the
premises.
These are the same individuals who are usually forgotten by the security
system designer until the system is already installed or in the process of being
installed. Then, much to the designer's dismay, the operation manager says, "
You can't install the device there because --." Or the safety officers say, "That
door can't be locked during the day because --." And then the designer's
problems really begin.
Security alarm systems are neither foolproof nor burglar-proof. They have the
following drawbacks:
9-Sep-15 Page 3
Security System
persons responsible for business or industrial premises may be got out of bed in
the middle of the night to turn off the triggered alarm. Householders may be
brought back from holiday for the same purpose
with the growth in the use of alarm systems, and the display of fake alarm boxes
to give the impression that the building is protected, burglars are not so easily
frightened off as they used to be. If there is a system installed they may ignore
the alarm long enough to get away with valuable items or they may stop the
alarm sounding by attacking the control box
the system may deliberately be rendered inoperative prior to entry of burglar.
This may be an ‘inside job’ by a dishonest or disgruntled employee, or it may be
carried out by a make-believe customer or a seemingly-casual visitor to the
building
This list of shortcomings suggests some of the requirements of a good system: - the
alarm signal must demand attention
The concept of a security system in the mind of the general public is a system that is
used in lock-up and-leave premises - in other words, for use outside working hours.
However, it may be that the very success of security systems for the silent hours has
shifted attention by the villain, and consequently by security people, to working hours
activities and systems.
An obvious step is to keep the doors closed and locked. But working people have
legitimately to move to and for with relative ease in order to do the work they are
employed to do. Thus again, we have to discriminate between friend and foe,
preferably without having to send someone to the door each time to check, to accept
or reject, to open and close and lock the door for each personnel movement. Out of
this problem the concepts of door control, access control personnel identification and
surveillance have risen, these issues will not be discussed.
9-Sep-15 Page 4
Security System
5. Kinds of Protection
There are three principle kinds of place in a building to guard with a detection &
alarm system: points (or spot), space (specific area) and perimeter.
typical of "points" are doors and windows in external walls, internal doors where
items of value are displayed or stored
for "point" systems, a higher number of sensors will be required, mostly for
doors and windows
sensors for these are cheap and reliable, with low current consumption; there are
type of sensors least likely to be triggered off accidentally when there is no one
on the premises to deal with the alarm
to cover area of rooms, corridors and courtyards required fewer but more
elaborate sensors
these are liable to be activated by birds, animals, paper blowing about, traffic
passing, direct or indirect sun light, air movement etc.
when used outdoor they may be rendered inoperative by weather - precautions
against these factors increase the complexity of the devices
they are needed however for use alone, where point sensors would be impractical,
and as back-up - burglars may keep away from entry points and break in through
the wall or roof
Perimeter
The extent and complexity of the system necessary for a particular building will
depend on the degree of protection required as well as the form of the building.
9-Sep-15 Page 5
Security System
Continuous Wiring
The units are embedded in a wall, ceiling, floor or any surface to be protected. The
continuous wiring carries an electric current, when a wire is broken, or when two
wires of opposite polarity touch, the closed circuit is broken and an alarm condition is
created.
9-Sep-15 Page 6
Security System
Knock-out Bar
Knock-out bars are installed 100 mm apart across doors and windows. When
in position each knock-out bar holds a micro switch in the closed position to
complete the circuit. Displacement of a bar creates an alarm condition. The
bars can be installed with micro switches at one end of the bar, or at both ends
for maximum security.
9-Sep-15 Page 7
Security System
This is a lead foil strip fixed to the glass surface and acts as part of a closed
circuit. When the supporting glass is broken, it will break and create an alarm
condition.
Ultrasonic Detector
The passive type ultrasonic detector mainly uses for detecting glass breakage.
It only detects ultrasound generated by breaking glass.
The active ultrasonic detectors rely on the pressure of air to transmit sound
signal at a fixed frequency of between 25 to 35 kHz. They monitor the signal
reflected from the solid objects and compare the frequency of the transmitted
signal with that of its reflection. Stationary objects return the signal at the
frequency transmitted. Objects moving towards the transmitter return the
signal at a higher frequency, whereas objects moving away return it at a lower
frequency. It is this frequency change (known as the “Doppler effect”) that is
used to create an alarm condition.
9-Sep-15 Page 8
Security System
Infra-red Detectors
Infra-red detectors can be passive type or active type. For the active type
infra-red detector, it comprises a transmitter and a receiver. The transmitter
sends a modulated infra-red light beam to the receiver, thus maintaining a
closed circuit. The unit creates an alarm when the light beam is interrupted.
For the passive infra-red detector, the unit measures infra-red radiation
received in set narrow beams. The level of radiation changes with temperature
and any unacceptable change activates the alarm.
Microwave Detectors
9-Sep-15 Page 9
Security System
Acoustic Detectors
Capacitive Detectors
Pressure Mats
These are hidden under carpets in areas where an intruder is likely to tread.
These consist of two hydraulic fluid tubes lying parallel just beneath the soil
surface, about one metre apart. The pressure is at equilibrium in the two tubes
9-Sep-15 Page 10
Security System
Infra-red lights signals are passed through a continuous fibre optic cable. A
fibre optic cable is non-ferrous and small in diameter. If the cable is currved
or damaged, the control elements sense a change in the signal and activate the
alarm.
7. Card/Reader Technologies
9-Sep-15 Page 11
Security System
The card access control market has developed along two main and
fundamentally different paths, these being Distributive Intelligent System and
Centrally Controlled System.
9-Sep-15 Page 12
Security System
With these systems the individual reader decides whether to allow entry and is
effectively a “stand alone” system. Readers of this type, however, may be
connected together and to a central monitoring and control centre for
management purposes.
Access cards can be broadly divided into “Passive” type and “Active” type.
A card uses a thin wire matrix sandwiched between two plastic outer surfaces.
It offers better security with less chance of card duplication than other types of
access cards. In addition, readers are not so susceptible to electromagnetic
interference.
All cards can incorporate the company logo, photograph of the holder and
personal identification.
8. Surveillance System
Surveillance system takes the form of Closed Circuit Television System (CCTV). A
basic system comprises a remote camera to observe and transmit, together with a
central monitor to receive and display. With multiple cameras a form of switch
selection will limit the number of monitors. Similarly, to move a camera, a form of
control can be added.
9-Sep-15 Page 13
Security System
The level of lighting provided: daytime or night time, shaded, natural or artificial;
The viewing field required: fixed or adjustable, close or distant, wide or narrow
angle;
The picture quality required: high or low resolution;
The environment in which the camera will be placed: clean or dirty, wet or dry,
subject to vibration;
The type of control required: manual or automatic;
The type of display required: constant, sequenced, movement activated, split
screen; and
The type of recording equipment required: real time or time lapse, alarm
activated.
Various camera technologies are available which become more expensive with the
requirements for operating in lower light levels. Figure 11 shows the operational light
levels applicable to each type of camera.
9. Biometrics
Biometrics is a branch of science which deals with the measurement and analysis of
biological data. Biometric technology is used to analyze human characteristics which
include fingerprints, voice patterns, retinal and facing scanning and hand
measurements. A biometric device is used as part of a biometric system. It is a device
by which a machine can read people’s personal information to tell who they are.
They are often used in security situations such as the military and other secure
locations. Biometric devices are used to capture fingerprints, DNA, eyes, and voice
recognition. These devices are very important and make excellent security barriers
because they are very hard to forge. These devices have in-built sensors that capture
biometric data from the individual and process it by matching it to an internal
database. In the future it is likely that many passwords and security systems will use
biometric devices.
The technology used by these biometric devices is associated with the authentication
and identification of an individual. These devices are used in many different ways
ranging from security management or as a security system to control the entry and
exit of certain areas. In the past, they were associated with high end security facilities
but the reduced cost of production and economies of scale enable these devices extend
into the security industry.
The most common biometric devices and methods that have been accepted in today’s
computer era are:
9-Sep-15 Page 14
Security System
Signature Dynamics
This device is popular because one’s signature cannot be forged. What counts here is
not what is recorded or signed but the manner in which it is signed - the speed of
writing and the pressure differences at numerous points of the signature.
Typing Patterns
This device is like the signature dynamics but pertains to the keyboard, as it is the
manner in which the password is typed, the space/intervals between the characters and
the pattern and speed which are considered and recognized.
Eye Scans
The retina (視網膜) and iris (虹膜)of the eye are generally scanned. The specialized
hardware is expensive and use of this device is generally considered inconvenient and
slow.
Fingerprint recognition
All fingerprints are different and unique. What makes this device so popular is the
fact that it is easy and convenient to use. Being easily accessible and needing little
space this device can be built-in.
Voice Recognition
The whole hand of the individual is the “identifier”. Devices are used to measure the
angles and length of the fingers.
Facial Recognition
Facial features like the cheekbones, eye sockets, and location of eyes, nose and mouth
are used.
Office buildings normally utilize some types of manual watchman’s tour system so
that surveillance of occupied areas is conducted on regular basis.
The simplest type is non-electrical and comprises a number of small cabinets, each
containing a key, placed at intervals around the interior and exterior of the building.
The watchman uses these keys to operate a special lock that he carried about, thus
recording the exact time at which he “clocked in” at any specific location.
Alternatively, the clock is wall mounted and the guard carries only a key.
9-Sep-15 Page 15
Security System
Electrical systems are available that permit constant supervision and are particularly
effective where more than one person is on duty.
Such systems show on a panel the location and progress of the watchman, by means
of lights that glow when the device at each location is operated. Since part of the
effectiveness of these systems lies in the timing of the tour, a system can be arranged
to sound an alarm if a particular station is not operated within a specific time period.
Design criteria
9-Sep-15 Page 16
Security System
they must arrive at the alarm location before the intruder penetrates the physical
barriers; otherwise the response force will be totally ineffective
the designer should evaluate the penetration resistance of the physical barriers
and the zones of detection selected for the intrusion detection sensors to
determine the maximum allowable response time
the response force should arrive at the asset location within this time; or physical
barriers must be added to delay penetration or another zone of detection must be
added to provide earlier detection
another possibility is for the response force to be relocated to improve their
response time
the maintenance concept should be established during the system planning phase
once the intrusion detection system is installed, it will then be properly
maintained maintenance can be contracted to an equipment installing company,
or it can be performed by an in-house maintenance force
if the intrusion detection system is leased, maintenance should be part of the
leasing agreement
care should be taken to ensure that their maintenance obligation is compatible
with the user's operating schedule
9-Sep-15 Page 17