Logo


1. Introduction
  1. Risk Management

  2. Who Are You, and Why Are You Here?

  3. Finding a Solution

2. Problem Definition
  1. What Needs Protecting?

  2. Who is Allowed Where?

3. Methods of Identification
  1. Reliability vs. Cost

  2. Combining Methods to Increase Reliability

  3. Security System Management

4. Access Control
  1. What You Have

  2. What You Know

  3. Who You Are

5. Other Security Systems Elements

  1. Building Design

  2. Piggybacking and Tailgating: Mantraps

  3. Camera Surveillance

  4. Security Guards

  5. Sensors and Alarms

  6. Visitors

6. The Human Element
  1. People: The Weakest Link

  2. People: The Strongest Backup

7. Site Design
  1. Layers

  2. Components

  3. Tactics

8. Controlling Site Access
  1. Entry Control Facility

  2. Zones of an Entry Control Facility

  3. Utilities and Automatition

9. Chosing the Right Solution
  1. Risk Tolerance vs. Cost

  2. Security System Design Considerations

  3. Building Security Design Considerations

Utilities for Entry Control Facilities

Alarm

Central duress alarm to signal emergency dispatch or control center. Activates automatically with active barrier system.

Water/Wastewater

Water/wastewater to minimize security personnel time away from post.

Communication

Telephone, including emergency ring down connection to emergency dispatch or control center
Radio capability coordinated with security

Information Technology

To support potential computerized identification systems, ECF should be connected to installation wide IT system.

Power

ECF should be provided with an alternate power source
Generator should support lighting and equipment
Uninterruptible power supply (UPS) may be necessary during generator starting and load transfer
UPS would support any computerized equipment to avoid power disruption

Exterior Lighting:

Lighting levels based on IESNA security lighting guidelines:
Roadway lighting in the approach and response zones;

Area lighting in the access control zone; transitions between:

Consider restart/restrike time in design:
Limit glare and adaptation effects:
Color rendition important for Ops/CCTV:

Automation of Entry Control Facilities

Note that gatehouse is the control center:
Illustrates key locations for spare conduit and handholes to support access control technology

Automation for ECF includes identification of personnel and vehicles.

Deployment of automation is just beginning with many clients.

Main drivers:

Support security personnel in task of identification and inspection
Attempt to increase throughput to balance security with traffic demands during peak times

Approach Zone Automation:

Validation of Vehicle utilizing Radio Frequency Identification System(RFIDS) which utilizes radio waves to identify vehicles and eliminates the need for line of site required for the conventional vehicle access credentials. Typically RFID sensor will associated with a barrier in the Approach zone to validate vehicle prior to arriving at Access Zone.

Wrong way detection and speed detection for outbound lanes, Speed detection for inbound lanes.

To receive your Physical Vulnerability Assessment, please submit your payment of $99.00
B E T T E R: Please submit your payment of $999.00 for a complete Physical Vulnerability Assessment or Design covering a single location.
Business Name:
Contact Information:
Email Address:
URL or IP address:
  

Other members of our business group:
Cloud-Security.us | US-scada.com

COPYRIGHT (C) 2000 - 2013 InfoSecPro.com ALL RIGHTS RESERVED