Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Integrated Security Systems Design -  Thomas L. Norman

Integrated Security Systems Design (eBook)

A Complete Reference for Building Enterprise-Wide Digital Security Systems
eBook Download: PDF | EPUB
2014 | 2. Auflage
400 Seiten
Elsevier Science (Verlag)
978-0-12-800193-6 (ISBN)
Systemvoraussetzungen
Systemvoraussetzungen
49,95 inkl. MwSt
(CHF 48,80)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program's overall effectiveness while avoiding pitfalls and potential lawsuits. - Guides the reader through the strategic, technical, and tactical aspects of the design process for a complete understanding of integrated digital security system design. - Covers the fundamentals as well as special design considerations such as radio frequency systems and interfacing with legacy systems or emerging technologies. - Demonstrates how to maximize safety while reducing liability and operating costs.

Thomas L. Norman, CPP, PSP, CSC, is an internationally acclaimed security risk management and enterprise-class security system design consultant with experience in the United States, the Middle East, Europe, Africa, and Asia. Mr. Norman has experience in security designs for critical infrastructure including oil and gas terminals, lines, and distribution centers; mass transit and vehicle transportation systems including air security, rail, and marine facilities and systems; long-span suspension and truss bridges; and central banking, utility and financial facilities. Mr. Norman's extended experience includes a large number of chemical, petrochemical, banking, government, corporate facilities, hospitality, healthcare, venues, and museums. Mr. Norman's unique processes focus on identifying and securing the underlying causes of building system vulnerabilities, that is, business processes, technologies, and cultures that encourage the development of vulnerabilities to the detriment of the organization. As the author of the industry reference manual on integrated security system design, and with more than 35 years of experience in design, construction management and commissioning, Mr. Norman is considered one of the industry's leading design consultants, worldwide, having contributed many industry design firsts including Video Pursuit and REAPs design concepts, among others. Mr. Norman has developed formulas and detailed processes that are used by the entire security industry to calculate the effectiveness of security programs and security program elements and also overall security program cost-effectiveness. Mr. Norman has authored four books: for the American Institute of Architects, 'Security Planning and Design - A Guide for Architects and Building Owners'; 'Integrated Security Systems Design' (Elsevier); 'Risk Analysis and Security Countermeasures Selection' (CRC Press); and 'Electronic Access Control' (Elsevier). His works have been quoted and referenced by organizations such as the Cato Institute, NBC, and Security Management.
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program's overall effectiveness while avoiding pitfalls and potential lawsuits. - Guides the reader through the strategic, technical, and tactical aspects of the design process for a complete understanding of integrated digital security system design. - Covers the fundamentals as well as special design considerations such as radio frequency systems and interfacing with legacy systems or emerging technologies. - Demonstrates how to maximize safety while reducing liability and operating costs.

Front Cover 1
Integrated Security Systems Design: A Complete Reference for Building Enterprise-Wide Digital Security Systems 4
Copyright 5
About the Author 6
Table of Contents 8
Dedication 16
Preface 18
Section I: Introduction to Integrated Security Systems 20
Chapter 1: Introduction and Organization of the Book 22
Who Should Read This Book 23
A Brief Background 23
A Framework for Understanding the Design Process 24
Goals of the Book 24
Arrangement of the Book 26
Questions and Answers 27
Chapter 2: Integrated Security System Design Benefits and Philosophy 30
Introduction 30
Why Integrate Systems? 30
Why a Strategic Approach to Security Design is Necessary 30
Uniform Application of Security Policies 31
Force Multipliers 31
Multiple Systems 31
Multiple Buildings 32
Multiple Sites 32
Multiple Business Units 32
Improved System Performance 32
Improved Monitoring 32
Reduced Training 33
Better Communications 33
Cost Benefits 33
Improved Labor Efficiency 33
Reduced Maintenance Costs 33
Improved System Longevity 34
How Integration Is Achieved 34
Summary 34
Questions and Answers 35
Chapter 3: History of Electronic Security 38
Introduction 38
The History of Integrated Security Systems 38
The First Generation 38
The Second Generation 40
The Third Generation 41
The Fourth Generation 42
Stalled Progress 44
Fifth-Generation Technology 45
Avoiding Obsolescence 47
Planned Obsolescence 47
Unplanned Obsolescence 47
Summary 48
Questions and Answers 48
Section II: Security System Design 50
Chapter 4: Security System Design Elements 52
Introduction 52
The Tools 52
Drawings 52
Specifications 53
Product Selection 54
Interdiscipline Coordination 54
Project Management 55
Tips on Schedule Management 56
Client Management 57
Tips on Relationship Management 57
The Place of Electronics in the Overall Security Process 58
The Security Program 58
Establish Electronic Security Program Objectives 58
Security Policy: The Foundation of All Countermeasures 58
Types of Design Efforts 61
New Construction 61
Renovation or Retrofit 61
Government-Driven Projects 61
Commercial Projects 62
Facilities-Driven Projects 62
User-Driven Projects 62
Project Drivers 63
Construction Effort 63
Regulation Compliance 63
Event Driven 63
Insurance Driven 63
Hidden Agendas 63
Summary 64
Questions and Answers 64
Chapter 5: Electronics Elements (High-Level Discussion) 68
Introduction 68
Security Functions 68
Access Control Elements 68
Detection Elements 69
Alarm Sensors 69
Alarm Processors 70
Alarm Transmission 70
Alarm Reporting 70
Follow-on Action Response 70
Assessment and Verification Elements 71
Reaction Elements 71
Evidence Gathering 72
Added Bonus 72
Summary 72
Questions and Answers 73
Chapter 6: Electronics Elements (Detailed Discussion) 76
Introduction 76
Alarm/Access Control Systems 76
Identification Devices 76
Magnetic Stripe Cards 79
Wiegand Cards/Keys 80
Barcode Cards 80
Barium Ferrite Cards 80
Hollerith 81
Rare-Earth Magnets 81
Photo Identification Elements 81
Multi-technology Cards 82
Card Readers 82
TWIC Cards 85
Other Field Devices 87
Electrified Strikes 87
Electrified Mortise Locks 87
Magnetic Locks 87
Electrified Panic Hardware 88
Specialty Locks 88
Switches 88
Duress Switches 90
Request-to-Exit (REX) Sensors 90
Door and Gate Operators 90
Revolving Doors and Electronic Turnstiles 91
Electronic Processing Components 92
Server (and Business Continuity Server) 94
Workstations 94
Data Infrastructure Basics 95
Interfaces to Other Building Systems 95
Advanced Elements 96
Legacy Systems Integration 96
Data versus Hardware Interfaces 97
CCTV and Digital Video Systems 98
Evolution of Analog Video Systems 98
The Bookends of Time 98
How Analog Video Works 98
The Branch 98
Videotape 99
How Digital Video Differs from Analog 100
Capturing and Displaying Analog Video 100
Capturing and Displaying Digital Video 100
Archiving Analog and Digital Video 101
Digital Transmission Systems 102
Digital Basics 102
Wireless Digital Video 106
Wireless Approaches and Frequencies 106
Analog 107
Digital 108
TCP/UDP 109
Frequencies 109
Latency Problems 109
Satellite 109
Satellite Dish 110
Satellite Phone 110
Latency Problems 110
Wireless Architectures 110
Point-to-Point 110
Point-to-Multipoint 111
Wireless Mesh 111
Full-Duplex Wireless Mesh 111
Video Analytics 112
Lenses and Lighting 113
Lighting Level 114
Lighting Contrast 114
Lighting Color Temperature 115
Other Lighting Issues 115
Security Communications 115
Two-Way Radios 115
Cell Phones 116
Intercoms 116
Emergency Phones 117
Paging Systems 117
Analog Versus Digital 117
Analog 117
Digital 117
Wireless Digital 118
Communication System Integration 118
Command/Control and Communications Consoles 119
Monitoring Consoles 119
Small Systems 119
Medium-Sized Systems 119
Enterprise-Class Systems 120
Workstation and Console Specifics 120
Command, Control, and Communications Consoles 120
C3 Console Use in Public Agency Settings 122
Lobby Desk Consoles 123
Dispatch Consoles 123
Administrative Workstations 123
Identification Badging Consoles 123
Identity Verification Workstations 124
Guard Console Functions 124
Vetting Alarms 125
Granting Access Remotely 125
Finished Visitor Lobby 125
Delivery Lobby 126
Video Surveillance 126
Video Guard Tours 127
Video Pursuit 127
Communications Systems 127
Security System Intercoms 127
Elevator and Parking System Intercoms 128
Emergency Call Stations 128
Direct Ring-Down Intercoms 128
Two-Way Radio 129
Pagers 129
Wireless Headsets 129
Summary 129
Questions and Answers 131
Chapter 7: Physical Security Elements 134
Introduction 134
Basic Physical Security 134
Basic Physical Security Skills: Knowledge of the Tools 135
Door Types 135
Hollow Metal Doors 136
Solid Core 136
Glass Storefront Doors 137
Herculite™ Doors 137
Specialty Doors 138
Revolving Doors 138
Total Doors™ 140
Balanced Doors 141
Historical Doors 141
Security Doors 141
Blast Doors 142
Soundproof Doors 142
Door Hardware 142
Hinges and Pivots 142
Handles, Levers, Push Bars, and Paddles 143
Door Closers 143
Door Coordinators 143
Automatic Door Operators 143
Door Ventilators 144
Door Frames 144
Hollow Metal 144
Formed Aluminum Frame 144
Extruded Aluminum Frame 145
Wood Frame 145
Frameless Glass Opening 145
High-Security Frames 145
Blast Frames 145
Soundproof Frames 145
Pedestrian Gates 145
Chain-Link Gate 146
Estate-Type Gate 146
Reinforced Frame Gate 146
Occupancy Ratings 146
Electrified Locks 147
Common Electrified Locks 147
Electrified Mortise Locks 147
Magnetic Locks 147
Electrified Cylinder Locks 149
Rex Infrared Sensor 149
Push-to-Exit Button 149
Panic bar 150
Delayed Egress Hardware 150
Fire Authority Approval 151
Fire Alarm Interface 152
Man-Trap Door Assemblies 152
Electrified Strikes 154
Electrified Panic Hardware 154
Electrified Rim Lock 154
Electrified Mortise Lock 154
Solenoid-Released Vertical Rods 155
Magnetic Lock 155
Specialty Door Hardware 156
Monitor Strikes 156
Blumcraft Hardware 158
Hi-Tower Locks 159
High-Security Locks 159
High-Abuse Tolerant Locks 159
Electrified Dead Bolts 159
Multi-Point Locks 160
Locks to Avoid 161
Electrified Cylinder Locks 161
Lightweight Strikes 161
Concerns About Special Knowledge 162
Summary 162
Questions and Answers 163
Chapter 8: The Security Design Process 166
Introduction 166
Establishing Electronic Security Program Objectives 166
Defining Countermeasures 166
Establishing Security Policies Related to Electronic Systems 167
Establishing the Budget 167
Countermeasures Determination 167
Prioritization 168
Countermeasure Effectiveness 168
Phasing 169
Phases of the Design and Construction Project 169
The Predesign Phase 170
Schematic Phase 170
Design Development Phase 170
Contract Documents Phase 170
Bidding/Negotiation Phase 171
Reply to Request for Information Form 172
Reference Checking Form 172
Bid Analysis Form 172
A Note on Bid Analysis 173
Construction Review Phase 173
Summary 174
Questions and Answers 174
Chapter 9: Preliminary Design Process Steps 176
Introduction 176
Basis for Design 176
Research 176
Drawing and Specification Resources 177
Surveys 177
Camera Placements and Fields of View 177
Access Control and Alarm Placements 177
Vehicular Access Control 177
Public Access to the Buildings 178
Access Beyond the Public Lobby 178
Access Within Semipublic Spaces 178
Access to High-Security Areas 179
Emergency Egress 179
Positive Access Control 179
Lighting 180
Environment 180
Physical Environment 180
Operational Environment 180
Security Environment 180
Door Survey 180
Codes and Regulations 181
Safety 181
Power Locations 181
Gathering Resources 181
Coordinating Interfaces to Other Systems 181
Building Shell and Core and Interiors Architects 182
Specifications Consultant 182
Door Hardware Consultant/Contractor 182
Electrical Consultant/Contractor 182
HVAC/Building Automation Consultant/Contractor 183
Landscape Architect/Contractor 183
Parking Consultant/Contractor 183
Elevator/Escalator Consultant/Contractors 183
Elevator Video Cameras 185
Elevator Alarms 186
Remote Elevator Control 187
Telecommunications Consultant/Contractor 187
Information Technology Consultant/Contractor/Information Technology Department Director/Manager 187
Layout Devices in Response to Electronic Security System Objectives and Budget 188
Access Control System Placements 188
Camera Placements 189
Intercom Field Station Placements 190
Select Required Devices 191
Define Functional Needs 191
Define Environmental Needs 191
Define Communications Means 191
Analog Versus Digital Video and Audio Systems 192
The Decision Tree 192
Scalability 192
Longevity 192
Cost 193
Functions 193
Questions and Answers 194
Chapter 10: Getting Down to the Actual Design 196
Introduction 196
Macro-Level Design: The Pieces of the Big Picture 196
The Big Picture and the Fabric 196
Plans 196
Risers 198
Radio Frequency Communications Paths 199
Single-Line Diagrams 199
Title Sheet 200
Title Block 200
Specifications Overview 200
Specification Sections 201
Specifications Section 1: Description of the Work 203
Introduction 203
Scope of Work 203
Systems 203
Submittals 204
Bid Submittal 204
Services 204
Interdiscipline Coordination 204
Project Engineering and Provisioning 205
Project Planning and Management 206
Time Management 206
Training 207
Testing 207
Warranty 208
Precedence 208
System Descriptions 208
Purpose 208
Environment 208
Functions 209
Attributes 209
Systems may Include the Following 209
Integrated Security System Overview 209
Monitoring and Control System 209
Alarm/Access Control System 209
Digital or Analog Video System 210
Security Intercom System 210
Interfaces Between Subsystems 210
Interfaces to Systems by Other Contractors 210
System Infrastructure 211
Submittals 211
Bid Submittal 211
Shop and Field Submittal 211
Specifications Section 2 211
System Infrastructure 212
Monitoring and Control System 212
Digital Video System 212
Voice Communications System 212
Alarm/Access Control System 212
Specifications Section 3 213
Wire and Cable Installation Practices 213
Commissioning: System Setup and Configurations 214
System Testing: Testing Overview 214
Acceptance Testing 214
Project Completion 214
Microlevel Design: The Threads That Knit Together the Pieces of the Big Picture 214
Schedules 214
Construction Drawings: Device Schedules by System 215
System Infrastructure 215
Control and Monitoring System 215
Alarm/Access Control System 215
Digital or Analog Video System 215
Security Intercom System 215
System Interfaces 216
Power 216
Cable 216
Conduit and Fill 216
General Network Device Configuration Schedules 216
Shop and Field Drawings 216
Device Wiring Schedules 217
Configuration Schedules 217
Physical Details 217
System Interfacing Details 217
Revised Construction Budget 217
Complete Specification 217
Review Drawings, Specifications, and Prioritized Budgets 217
Revise after Review 218
Summary 218
Questions and Answers 218
Section III: Special Design Sections 220
Chapter 11: Information Technology Systems Infrastructure 222
Introduction 222
Basics of TCP/IP and Signal Communications 222
How TCP/IP Works 222
TCP/IP Operates on OSI Levels 3 (IP) and 4 (TCP) 223
TCP/UDP/RTP 225
UDP 226
TCP/IP Address Schemes 226
Networking Devices 227
Edge Devices 227
Communications Media 227
Network Infrastructure Devices 231
Hubs 231
Switches 231
Routers 231
Firewalls 232
Intrusion Detection Systems 232
Servers 232
Directory Service Server 232
Archive Service 232
Program Service 233
FTP or HTTP Service 233
Email Service 233
Broadcast Service 233
Workstations 233
Printers 233
Mass Storage 233
Network Architecture 234
Simple Networks 234
Advanced Network Architecture 234
Backhaul Networks 234
Ring Architecture 235
Subnets 238
Subnets to Limit Network Traffic 238
Subnets to Segregate Network Traffic 238
Blending Security and Business networks: VLANS 239
Network Configurations 240
Peer-to-Peer 240
Client/Server Configuration 241
Creating Network Efficiencies 242
Digital Video 244
Cameras and Codecs 244
Advantages and Disadvantages 245
Digital Resolution 246
Frame Rates 246
Display Issues 248
Display Parity 248
Storage Issues 249
Managing Data Systems Throughput 249
System Architecture 250
Servers 250
Directory Service 250
Archiving Data 250
Remote Access Services 250
Web Access 250
Email and Pager Notification Service 250
Hardware Configurations 251
CPUs 251
Memory 251
Disk Storage 251
Operating Systems and Programs 251
Tape or Disk 251
Network Attached Storage 251
Storage Area Network 251
Workstations 252
Security Monitoring (Command) Workstations 252
Guard or Lobby Desk Workstations 252
Administrative Workstations 252
Photo ID Workstations 252
Access Verification Workstations 252
Edge Devices 253
Infrastructure Devices 253
Switches 253
Routers 254
Firewalls 254
Wireless Nodes 254
Network Communications Speeds 254
Cabling 254
Wired Cabling 254
Fiber Optic 254
Multi-Mode 255
Single Mode 255
Scaling Designs 255
Interfacing to Other Enterprise Information Technology Systems 255
Enterprise LAN or Wide Area Network 255
Process Control Networks 255
Building Automation Systems 256
Elevators/Lifts 256
Access Control Interfaces 256
Private Automatic Branch Exchange Interfaces 256
Voice over IP Systems 257
Fire Alarm Systems 258
Public Address Systems 258
Parking Control Systems 258
Vending Access Management Systems 259
More Protocol Factors 259
Multicast Anomalies 260
Mass Storage Calculations 261
Storage Frame Rate 262
Image Size 262
Resolution (Image Density) 262
Compression Ratio 263
Image Compression Tricks ``I-Frames and ``P-Frames´´ 263
Configuring Multiple Image Streams 264
The Camera Calculation 264
The Whole System Calculation 265
Summary 265
Questions and Answers 266
Chapter 12: Radio Frequency Systems 270
Introduction 270
Basic Radio Frequency Theory 270
Frequencies and Transmission Schemes 270
Frequencies 270
Analog AM and FM Frequencies 270
Digital Frequencies 270
Range 270
Other Frequencies 270
Transmission Schemes 270
Analog 270
Digital 271
Spread Spectrum Systems 271
Wireless Security 271
Components 271
Antennas 273
Patterns 273
Omni Antennas 273
Antenna Gain 273
Bandwidth 276
Impedance and Coupling 276
Interference 276
Multipath 276
How RF Systems Differ from Cabled Systems 277
Circuiting 277
Weather Factors 277
Transmission Physics 277
Transmitter Power 277
Antenna Loss/Gain 278
Antenna Patterns 278
Transmission Losses 279
Line of Sight 279
Fresnel Zone 279
Multipath 279
Delay Losses 280
Cancellation Losses 281
Cascade Losses 281
Power Stability and Reliability 281
Grounding and Powering 282
System Resets and Restores 283
Special Power Problems 283
Summary 284
Questions and Answers 284
Chapter 13: Interfacing to Legacy Systems and Emerging Technologies 286
Introduction 286
The Challenge of Legacy Systems 286
Legacy Access Control Systems 287
Access Card Legacies 287
Interfacing Multiple Access Control Systems from Differing Manufacturers into a Single Comprehensive System 287
The Old-Fashioned (but Still Very Reliable) Way 287
Newer (Still Reliable) Way 288
Interfacing Old Wiring Schemes 288
Legacy Video Systems 288
Digital Video Recorder-Based Systems 289
Proprietary Hardware-Based Server-Type Configurations 290
Software-Based Server-Type Configurations 290
Analog Switcher Interfacing 291
Multiplexer Interfacing 292
Legacy Intercom Systems 292
Two-Wire Intercom Systems 292
Four-Wire Intercom Systems 292
Direct Ring-Down Intercom Systems 292
Switched Intercom Bus Systems 293
Intercom Matrix Switches 294
Emerging Technologies 294
New Alarm/Access Control System Technologies 294
New Digital Video Technologies 294
Mega-Pixel Cameras 294
Light Field Camera 295
Digital Signal Processing Cameras 296
Extreme Low Light Color Video Cameras 296
Summary 296
Questions and Answers 297
Chapter 14: Interfacing to Related Systems 300
Introduction 300
Building System Interfaces and System Control 300
Information Inputs 300
Control Outputs 300
Imagination 301
More on Building System Interfaces 301
Fire Alarm Systems 301
Fire/Life Safety Interfaces 301
Elevators and Escalators 302
Access Control 302
Hall Call Control 302
Floor-by-Floor Control 302
Scheduled Operation 302
Remote Operation from the Console 302
Emergency Operation 303
Elevators 303
Escalators 303
Building Automation Systems 303
HVAC 303
Lighting 303
Signage 304
Irrigation 304
Deluge Fire Sprinkler Control (Another Reaps Technology) 304
PABX Interfaces 305
Voice Over IP Systems 305
Public Address Systems 306
Parking Control Systems 306
Fuel Management Systems 306
PSIM systems 306
Summary 309
Questions and Answers 309
Chapter 15: Delaying Technologies and Response Technologies 312
Introduction 312
Reactive Automated Protection Systems 312
Deterrence Technologies 312
Intercoms 312
Lighting Control and the Control of System Features 313
Deployable Barriers 313
Vehicle Barriers 313
Rising Bollards 314
Rising Wedges 314
Semaphore Parking Gates 314
Cable Beams 315
Box Beam Barriers 316
Net Systems (Grab barriers) 316
Swing Gates 317
Rolling Doors and Gates 317
Sliding Gates 317
Air Bags 318
Inventive Systems 318
Marine Vessel Barriers 318
Anti-Boat Barriers 318
Water Monitors 318
Pedestrian Barriers 319
Intercoms 319
Lighting 319
Rolling Grilles and Operable Walls 319
Deployable Doors 319
Revolving Doors 320
Irrigation Systems 320
Fog Barriers 321
Prejudiced Barriers and Aggressive Systems 321
Quick Setup Foam Barriers 321
Drop Chains 322
Aggressive Systems 322
Acoustic Weaponry 322
Usable Acoustic Security Devices 323
High-Voltage Weaponry 324
Remotely Operated Weaponry 324
Deluge Systems 325
Integrating the Elements 325
Appropriateness 325
Operationally 325
Safety Systems 326
Electronic Safety Systems 326
Mechanical Safety Systems 326
Procedural Safety Systems 327
Summary 327
Questions and Answers 327
Chapter 16: Alarm Detection and Emerging Video Technologies 330
Introduction 330
Alarm Detection Technologies 330
Point Detectors 330
Magnetic Switches 330
Simple Magnetic Switches 330
Balanced Bias Magnetic Switches 331
Duress Switches 331
Two-Finger Switches 331
Pull and Plunger Switches 331
Footswitches 332
Bill Traps 332
Resets 332
Elegant Duress Switch Implementations 332
Volumetric Detectors 333
Passive Infrared Field Detectors 333
Active Infrared Detectors 333
Reflection Detector 333
Beam Detectors 334
Microwave Detectors 334
Monostatic Detectors 334
Bistatic 335
Ultrasonic 335
Acoustic (Glass-Break) Detectors 335
Dual Technologies 336
Emerging Video Technologies 336
Volumetric Detectors 336
Video Motion Detectors 336
Intelligent Video Detectors 337
Triangulation Detectors 338
Perimeter Detection Systems 338
Line Detectors 338
Leaky Coax Detectors 338
Capacitance Detectors 339
Seismic Detectors 339
Fiber-Optic Detectors 340
Common-Mode Wire Detectors 340
Pneumatic Weight Detectors 341
Monostatic and Bistatic Perimeter Microwave Detectors 341
Perimeter Video Detectors 341
Thermal Video Cameras 341
Lidar 342
Ground and Short-Range Radar 342
Sonar 342
Miscellaneous Detectors 342
Summary 343
Questions and Answers 343
Chapter 17: Design Standards Development 346
Introduction 346
Environmental Issues 346
Temperature 346
National Electrical Manufacturers Association and Ingress Protection Environments 346
Explosive and Flammable Environments 347
Classes 347
Divisions 347
Zones 347
Equipment Classifications 347
Power Issues 348
Grounding and Powering 348
Power Phasing 348
Hospital Ground 348
Ground Isolation 349
Panels and Breakers 349
Uninterruptible Power Supplies 349
Wiring Practices 349
Classes of Wiring 349
Wire Dressing 350
Mounting Devices 350
Mechanical Strength 350
Aesthetics 351
Earthquake Considerations 351
Physical Details 351
Drawing Standards 351
Summary 352
Questions and Answers 352
Chapter 18: Finalizing the Installation 354
Introduction 354
Finalization and Commissioning Checklist 354
Set up the Security System Master Clock 355
Connect Each Field Device to Power and Its Digital Switch as Its Installation Is Completed in the Field 355
Load and Commission the Server and Workstation Operating Systems 355
Set Up the Security System Network Infrastructure 355
Load Alarm/Access Control System Primary Server and Workstation Software 356
Configure Alarm/Access System Field Connections 356
Load Digital Video System Primary Server and Workstation Software 356
Configure Connections to All of the Digital Video System Cameras and Intercoms 356
Commission the Alarm/Access Control System Field Devices 357
Set up Access Control Groups 357
Schedules and Time Zones 357
Set Up Higher System Functions (e.g., Video Guard Tours, Video Pursuit) 357
Video Guard Tour Implementations 357
PSIM Software Implementation 358
Set up Alarm/Access Control System and Digital Video System Integration 358
Implement Homeland Security Threat Level System Policies and Rules 359
Implement the Organizations System Policies and Rules 359
Implement Backup Servers 360
Configure the System for Remote Monitoring 360
Secure the Security System 361
Integrate the System to the Information Technology System 361
Integrate the System to Other Building Systems 362
Special Implementations 363
System Maps 363
Boolean Algebra Logic Cell Implementation 363
``And´´ Gate Alarms 364
Local Alarms 364
Lighted Paths 365
Lights/HVAC After-Hours System Billing 365
Custom System Reports Implementation 365
Exclusion Reports 366
Nesting Reports 366
Securing the Security System 366
Device and Transmission Security 367
Architectural Security 367
Data Encryption 368
Encryption Basics5 368
Internet Protocol Security 369
Radio Frequency Security 369
Countermeasures 369
Archived Data Security 370
Archiving Principles 370
Backups and Recoveries 370
Business Continuity Management Servers 371
User Classes and Authorities 371
Login/Logout Security (Card Controls Operating System) 371
Cutting-Edge System Security 372
System Cutover Day 372
Summary 372
Questions and Answers 373
Chapter 19: System Implementation 376
Introduction 376
System Maintenance and Management 376
Maintenance 376
Management 377
Management Approaches: Types of System Implementations 378
Monitored Systems 378
Full-Time System Monitoring 378
Part-Time System Monitoring 378
Unmonitored Systems 379
Hybrid Systems 379
Security Command Center Operational Implementations and Issues 379
Staffing Requirements 379
Skills 379
Hours 379
Supervision 380
Security/Safety Policy Compliance 380
Interfacing the Technology to the Overall Security Program 380
Skills of the Security Management Team 380
C-Level Executive 380
Security Command Center Manager 380
Shift Supervisors 381
Closing Out the Project 381
Measuring Success 381
Lessons Learned 381
Dealing with Offenders Who Try to Circumvent the System 382
Using the System for Surveillance 382
Using the Archive Video System to Detect Improper Behavior 382
Summary 383
Questions and Answers 383
Index 386

1

Introduction and Organization of the Book


Abstract


Chapter 1 introduces the concepts discussed in the book including the definition of IP-based integrated electronic security systems and what is meant by system integration, convergence-based systems, and enterprise integrated security systems.

Although you may not need to design enterprise-class integrated security systems, understanding their design concepts will make you a better designer of any convergence-based integrated security system, so it is worthwhile to be attentive to the enterprise-class concepts when they are discussed herein.

This book is designed for new and experienced system design consultants, designers, and project managers who build these complex systems and for the building owners, security directors, and facilities directors who operate them.

This chapter includes background into the motivation for writing this book, including the vacuum of information on securing security systems and the fact that few designers knew how to make these systems perform the extraordinary functions they are capable of in the hands of a talented designer.

This chapter includes a framework for understanding the design process including:

 What assets are we trying to protect?

 From whom are we protecting them?

 And against what kinds of attack or misuse?

 How can I use integration to improve the operations of my client and disrupt the operations of criminals and terrorists?

After finishing this book, you will have a new command of the strategic issues, technical issues and tactical issues facing designers and security managers.

This book is arranged to go from the strategic to the technical to the tactical. Strategic subjects are covered primarily in Chapters 2 and 3 and this chapter, technical subjects are covered primarily in Chapters 410, and tactical subjects are covered primarily in Chapters 1119. The strategic section covers the “why” of design, including some important history that provides insight into how to stay in the path of industry development and not be sidetracked as it goes by, the technical section explains how it is done, and the tactical section provides the cultural knowledge that leads to project success.

Keywords

Access control

Closed-circuit video

Elevation

Riser

Site plan

Specification

Tactical issues

TCP/IP

Title sheet

Two-Way voice communication

Most integrated security systems installed today are designed to protect unknown vulnerabilities against unknown threats. They often use techniques and products that work well to the advantage of the vendor but not always so well to the advantage of the client, and they are often more expensive than is necessary. We can change that.

This book is about designing IP-based integrated security systems and enterprise-integrated security systems (which are also IP-based). These are security systems that have three major defining attributes:

 Integrated security systems comprise numerous subsystems together into one complete, highly coordinated, high-functioning system. Typical subsystems include alarm, access control, closed-circuit video, two-way voice communication, parking control, and other related systems. System integration is the basic concept for all that follows.

 System integration involves both the integration of components and the integration of functions. High-level functions can be obtained by integrating components into a comprehensive working system, instead of individual disconnected subsystems.

 Convergence-based integrated security systems are integrated security systems that utilize TCP/IP Ethernet infrastructure as the basic communications media. This is the result of a convergence of industries (the security technology industry and the information technology (IT) industry). Most new integrated security systems are convergence-based systems.

 We will also discuss enterprise-integrated security systems concepts in depth. Enterprise-integrated security systems are those security systems that have been integrated with other systems, including elevators, private automatic branch exchanges, human relations programs, and security video and intercommunications systems, at the corporate-wide (the enterprise) level to perform a wide variety of automated security-related tasks in a manner consistent with corporate or agency policies and procedures and that do so uniformly across the entire enterprise. For example, when an employee is terminated, the act of pressing OK on the human resources software screen can cause the employee to also be terminated from the access control system and IT system and even shut down access to his or her business telephone and voice mail. Such integration can prevent a hostile terminated employee from gaining outside access to valuable data or leaving a forwarding or even antagonistic message on his or her voice mail. Virtually all but the very earliest enterprise integrated security systems are convergence based, and almost all of the earliest systems utilize some convergence concepts.

Although you may not need to design enterprise-class integrated security systems, understanding their design concepts will make you a better designer of any convergence-based integrated security system, so it is worthwhile to be attentive to the enterprise-class concepts when they are discussed herein.

Who Should Read This Book


This book is designed for new and experienced system design consultants, designers, and project managers who build these complex systems and for the building owners, security directors, and facilities directors who operate them. Each will benefit from the expansive array of issues covered. Many of these subjects have only rarely or perhaps have never been discussed before in any book to my knowledge. These include such aspects as how to make your security system virtually disappear on the IT system infrastructure, as though it were not there at all to anyone but the system administrator (Chapter 17); a complete discussion on how to use security technology to delay, confound, and take down aggressors in very high-security environments (Chapter 4); and secrets on system implementation that help ensure a stable, reliable, and high-functioning system (Chapters 9 and 18). There is some discussion about pitfalls out of which the potential for lawsuits has arisen for well-meaning but unsuspecting project participants. My goal is to help you gain command of every aspect of the process necessary to ensure your success, the success of the project team, and especially the success of your client.

Designing enterprise integrated security systems seems daunting to most who have only designed systems for single buildings or for small campus environments. The challenge has become ever more important with the advent of terrorism and the move toward using electronic security systems to augment homeland security. The challenge of helping to protect our nation’s transportation, economic, and cultural infrastructure raises the importance of designing what used to be esoteric systems. Today, these systems are becoming more commonplace. However, many of them are being designed using old skillsets and outdated techniques, resulting in outmoded and therefore unsuitable results.

A Brief Background


When I wrote the first edition of this book, the security technology industry had only just recently crested a hill. Behind us, in the rearview mirror, is yesterday’s technology. Ahead of us toward the horizon is the technology of tomorrow. It is different from the past. It is IT based. Many in the security industry are afraid of it. They will resist the change. They will lose. Those who resist IP-based security systems will condemn themselves to security industry irrelevance.

In the 1990s, large corporate and government clients began to understand that they are better served by enterprise-class security systems. Enterprise systems differ from older approaches in that they permit the uniform application of security policies and procedures across the entire organization. They permit centralized monitoring of security, business processes, and adherence to policy. They reduce liability and operating costs. They permit a user from one facility to freely access any other if his or her access level permits.

At the time the first edition of this book was written, nearly every manufacturer had embraced the enterprise security concept, but many were still trying to make it work in the context of older system architectures. Increasingly, at the time of the second edition, these are gradually being replaced by systems with pure IT infrastructures. By reading this book, you will be ahead of the game and be able to make design decisions that will save you and your clients tens of thousands of dollars and many headaches.

These large-scale enterprise-level integration projects raise the bar, and we must all train well enough to jump over it. This book presents everything you will need to know to achieve success on these complex projects.

A Framework for Understanding the Design...


Erscheint lt. Verlag 10.9.2014
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik
Wirtschaft Betriebswirtschaft / Management Wirtschaftsinformatik
ISBN-10 0-12-800193-3 / 0128001933
ISBN-13 978-0-12-800193-6 / 9780128001936
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 10,5 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

EPUBEPUB (Adobe DRM)
Größe: 7,8 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95