Building Security:Technology and Materials.pdf
《Building Security:Technology and Materials.pdf》由会员分享,可在线阅读,更多相关《Building Security:Technology and Materials.pdf(51页珍藏版)》请在三一文库上搜索。
1、TECHNOLOGY AND MATERIALS P A R T 5 CHAPTER 27 SECURITY TECHNOLOGY William G. Sewell, RCDD Senior Vice President, DMJM Technology Arlington, Virginia Urban anonymity, the idea that people wont know what youre doing or who you are, will, one hundred years from now, look like a small window in historyt
2、he 19th and 20th centuries. ARNOPENZIAS(B. 1933) American physicist, 1978 Nobel Prize Winner in Physics The best-performing security sensor is a highly trained, dedicated human being. Human senses cover the necessary operations: sight, hearing, smell, touch, taste, feeling, and a voice to sound an a
3、larm and remain vigilant. The human brain can process input from all senses simultaneously and make decisions based on inferences and subtle environmental changes. Putting people in place to monitor and secure facilities is an expensive proposition. Security guards and cruising patrols can be a cost
4、ly component of facility operations. Every security post, staffed 24 hours a day, 7 days a week (24/7), represents several full-time employee positions, whether in-house personnel or outsourced to private companies. When salaries, fringe benefits, and related costs are calculated over a year or long
5、er, costs rapidly add up for each position. Minimizing the number of full-time security officer posts or employees allows building owners to reduce operational costs. As a result, by reducing staff costs as well as taking advantage of the many enhanced capabil- ities of twenty-first-century technolo
6、gy, security technology programs have become an essential and cost-effective strategy for many building owners. Since the events of September 11, 2001, manufacturers have refined and upgraded many types of technology to address terrorism threats, including video processing, detection sensor technolo
7、gy, com- puter programs that manage and monitor systems, and the ability to send alerts to security personnel. Understanding the various types of technology systems, their capabilities, and applications is important when planning a technology program that is part of a comprehensive security plan (Ta
8、ble 27.1). SECURITY SYSTEMS TECHNOLOGY Technology is most effectively applied to deter, detect, delay, and assess an enemys attack. An inte- grated security system has several elements (Fig. 27.1). Deterrence and Delay Deterrence is the ability to cause an intruder to abandon an attack or go elsewhe
9、re and leave a facility unharmed. Technology can deter intruders by being visible, or by creating the perception of a security 27.3 27.4TECHNOLOGY AND MATERIALS TABLE 27.1Overview of Security Technology Applications TypeCharacteristics Fence technology:Provides perimeter and site security Passive: C
10、hain link, wood, steel, concrete Active: Electric fences, pulsed, fiber-optic Access control:Deters an intruder from entering a facility. When several Combination locksmethods are combined, can deny or delay access, except Keypad through a central control point. Magnetic strip access card Proximity
11、card reader Card reader and keypad combination Biometric technology:Verifies information on an access card against unique Hand geometry individual features. Fingerprints Iris scan Retinal scan Facial recognition Revolving door portalPrevents tailgating, ensures that only one person enters an area at
12、 one time. Weapons detection:Detect weapons, metal objects, and hazardous materials, Magnetometers frequently used in airports and public lobbies. Metal detectors Hand wands Industrial and transportation applications:Screens air passengers, baggage, and cargo for explosive Explosive detection system
13、s (EDS)materials. Screens trucks and cargo freight for hazardous Explosive trace detector (ETD)materials. Truck and cargo freight scanners CCTV video technology capabilities:Photographs and records images with cameras. Images are Visible and infrared spectrumdisplayed on a console and may be stored
14、for future use. Digital and analog formats Indoor and outdoor use Pan-tilt-zoom (PTZ) cameras Monitors integrated with other systems FIGURE 27.1The elements of an integrated security system. presence within a facility. If an avenue of attack has a highly visible detector, such as a closed- circuit t
15、elevision (CCTV) camera, an attacker who doesnt want to get caught is less likely to try to penetrate a facility at that point. Highly visible detection devices suggest that other devices are also present, thus prompting intruders to move on. A determined terrorist who is willing to sacrifice his or
16、 her life is impossible to deter without great expense. Any situation or location will always carry some risk. Building owners and facility managers must determine the risk levels they are willing to assume. Deterrence falls into two categories: Physical deterrence, such as fences, walls, and barrie
17、rs. Deterrence systems, such as devices that prevent intruders from gaining easy access. They will cause most intruders to think twice before attacking a facility. Both fences and deterrence systems can delay entry by an intruder. When fitted with detection devices, fences will detect an attack in p
18、rogress and alert security personnel to respond. FENCE TECHNOLOGY The first line of facility defense is at the site perimeter. Expensive technologies available to the mil known as “beyond the fence line technology,” can detect intrusion before arrival at the perimeter. This application assumes a lar
19、ge budget, a highly secure facility with a sterile area around the perimeter, and the capability to apply deadly force. However, this technology is seldom found around a typical commercial, institutional, or industrial facility. Fences are categorized as active and passive. Passive fences are tradit
20、ionally made of chain link, wood, steel, concrete, or other materials. Active fences, such as electric fences, utilize technology to detect and deter intruders. Electric Fences The earliest electric fences consisted of three or four strands of wire set on insulators, used primarily to control cattle
21、 and other large animals. They kept trespassers out of fields and private areas. Eventually, electric fences were used in military and government installations. Characteristics of electric fences include the following: Can be dangerous or lethal Cant distinguish between a threat and a person who uni
22、ntentionally wanders into them Are expensive to operate because they depend on a constant flow of electricity Pulsed electric fences can be placed in conjunction with a standard chain link or other kind of fence. In such cases, horizontal wires in the fence carry very short pulses of high voltage. W
23、hen touched, the pulses are strong enough to cause a person to retreat, but are not strong enough to cause permanent injury. The fence sends an alarm to a monitoring point and can be integrated with a camera system to provide visual verification of the intruder. In most applications, this fence conf
24、iguration is installed behind a passive fence to prevent anyone from making accidental contact (Fig. 27.2). Fiber-Optic Technology Fiber-optic fence technology is designed to detect an intruder and send an alarm to a monitoring point. Fiber-optic cables are woven through the fence or buried under th
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- Building Security:Technology and Materials Security Technology
链接地址:https://www.31doc.com/p-3749069.html