1. Introduction
- Risk Management
- Who Are You, and Why Are You Here?
- Finding a Solution
2. Problem Definition
- What Needs Protecting?
- Who is Allowed Where?
3. Methods of Identification
- Reliability vs. Cost
- Combining Methods to Increase Reliability
- Security System Management
4. Access Control
- What You Have
- What You Know
- Who You Are
5. Other Security Systems Elements
- Building Design
- Piggybacking and Tailgating: Mantraps
- Camera Surveillance
- Security Guards
- Sensors and Alarms
- Visitors
6. The Human Element
- People: The Weakest Link
- People: The Strongest Backup
7. Site Design
- Layers
- Components
- Tactics
8. Controlling Site Access
- Entry Control Facility
- Zones of an Entry Control Facility
- Utilities and Automatition
9. Chosing the Right Solution
- Risk Tolerance vs. Cost
- Security System Design Considerations
- Building Security Design Considerations
|
 |
Sensors and Alarms
Everyone is familiar with traditional house and building alarm systems and their sensors β motion sensors, heat sensors, contact (door-closed) sensors, and the like. Data center alarm systems might use additional kinds of sensors as well β laser beam barriers, footstep sensors, touch sensors, vibration sensors. Data centers might also have some areas where a silent alarm is preferred over an audible one in order to catch perpetrators βin the
act.β
If the sensors are network-enabled, they can be monitored and controlled remotely by a management system, which could also include personnel movement data from access-control devices (see earlier section, Security System Management.)
To receive your Physical Vulnerability Assessment, please submit your payment of $999.00
B E T T E R: Please submit your payment of $1999.00 for a complete Physical Vulnerability Assessment or Design covering a single location.
|