Download presentation
Presentation is loading. Please wait.
1
Security Systems In Buildings
Paul Christian Sanamizi ICT and Electronics Director National Eye Security Hons B (EE)UK
2
What Is Security בִּטָחוֹן בִּ ט ח וֹ ן
Security is the state of being free from danger or threat In Hebrew Security is written as meaning confidence, safety, defence assurance, trust ,faith בִּטָחוֹן בִּ ט ח וֹ ן BET- House TET-good and evil HET-Life VAV-Hook: binds together NUN-Faithfulnes
3
Factors to Consider when Choosing Security
Are u Constructing or Designing Type of building Building Location Primary Use of building Logistics- Position of the security System Controls Remote Monitoring Environmental Issues Is it an existing buiding e.g change locks Are they other existing items to consider before buying new equipment
4
Factors To consider when preparing a security Budget
What are you crown jewels People ,data, intellectual property ,systems and other business item valuable to you Business Risks Financial Losses Brand Reputation Fines or legal repercussions Take is as an Investment not an expense
5
Purpose Of Security Systems
Protect against Theft Damage Loss
6
Choosing a Secure Site Low Or High Visibility Type of Neighbours
Near Hazard waste dump area Local crime rate Weather related problems Riots and Strikes Transport Hospitals , police and fire brigade
7
Security Implementation
Physical Security Patrols Fencing Security Lighting Door and Window Locks Intruder detection Surveillance Monitoring Crown Jewel Contingency plan Security Management Staff Security Awareness Accounting System Inventory System Personnel Selection Managerial Security
8
Types of Building Security Systems
Physical guards Static and non static or with k9 Armed undercover Physical Barriers Windows Burglar bars Gates and screens Doors Trellis door Fence : electric, diamond mesh , bumped wire Fire Systems Fire Detection Fire Suppression Fire Hose and Extinguishers CCTV Static cameras PTZ Cameras Infrared Cameras Analog and IP Video Door Phones Alarms Fixed alarms Silent alarms Fire Alarm Reaction ACCESS Control Turnstiles Biometric , card , face, iris, pin readers Locks Electric motors, boom gates
9
Designing A Secure Site
10
Building Composition Gas lines Air Conditioning Ventilation Parking
Walls Ceilings Doors Windows Locks Power Plumbing Electricity Backup Systems Gas lines Air Conditioning Ventilation Parking Stairs Roofs
11
Building Security Management
SOP manual Audit Logs Entries, security breaches( date ,time and reports) Patrols Handover takeovers Emergency Procedures Evacuation Emergency shutdown drills
12
Administrative Controls
Pre-employement screening Background checks Employment history references On-going employees Checks Security clearance Employee review and ratings Post employment procedures Exit interview, disconnections from networks etc
13
Environmental Control
Electrical Power Fire detections and Suppression Heating ,Ventilations and air-conditioning
14
Electrical Power Disruption in electrical power can have a negative impact on your business Goals Clean and Steady Power Excellent Power Quality Designs Considerations Dedicated feeders Alternative Power Sources Smart wiring Access Controls to critical Areas e.g transformers and breakers
15
Electrical Power Threats
Electrical anomalies Shorting Circuiting Power Surges Fire Electrostatic Discharge Power surge generated by a person or device contacting another device and transferring a high voltage shock
16
Fire Protection How to tackle fire Elements that keep the fire Burning
Prevention , Detections and Suppression Elements that keep the fire Burning Heat , oxygen and fuel
17
Perimeter Protection Protective Barriers natural or man made as first line of control Natural Barriers Terrains Difficult to Cross Landscaping Structural Barriers Fence , gates, facility Walls, bollards ,barriers
18
Intruder detections and Surveillance
Sensors Photoelectric Ultrasonic Microwave Passive infrared (PIR) Pressure sensitive (Dry contact switch) Surveillance CCTV Face and plate recognition, thermal imaging ,item counting
19
Alarms They Respond to data from the sensors Usually sound a siren
They can be connected to Reaction services Fire Brigade Police They must be protected Cant be integrated with CCTV and Access Controls
20
CCTV Deployment Cameras high enough avoid physical attack
Cameras distributed to include blind areas and cover the whole area Appropriate Lenses Pan, Tilt, Zoom (PTZ) as required Ability to be recorded Regular Service
21
Lighting Provides a deterrent to intruders
Makes detection likely if entry attempted Should be used with other controls such as fences, patrols, alarm systems, CCTV Critical protected buildings should be illuminated up to 3 meters high
22
Types of lighting Continuous Lighting Trip Lighting Standby Lighting
Flood Lighting Trip Lighting Standby Lighting Movable (Portable) Emergency Lighting
23
Locks Locks are considered delay devices only
Defeated by force and/or the proper tools Never be considered stand-alone method of security Proper key Control Measurements should be in place
24
Common Locks Key In Knob Locks Dead Bolt Locks Mortise Locks Padlocks
Combination Locks Keyless Locks Electronic Locks
25
Potable Device Security
Laptops, cell phones, potable gaming ,portable Protect the device Protect the data in the Examples: Locking the cables Tracing software Encryption software PIN Protection for PDAs Inventory system
26
House Precious Items Main Threats Security Needs Family Property
Vehicles Main Threats Intruders Domestic Workers Electrical Faults LPG Security Needs Door and window lock Burglar Bars or trellis doors Intruder alarm CCTV
27
School Precious Items Main Threats Security Needs Students Books
Furniture Exam Papers Computers Main Threats Intruders Students Teachers Other Employees Fire Security Needs CCTV Intruder alarm Fire Alarm Physical Guards
28
Retail Precious Items Main Threats Security Need Groceries Cash
Plastic Money Transactions Computers Main Threats Petty Thieves Employees Intruders Fire Security Need CCTV Fire alarm and suppression Intruder alarm Locks etc
29
Library and Museums Precious Items Main Threats Books Computers
Furniture Main Threats Library Users Fire Intruders Security Needs CCTV Fire detection , suppression during closed hours Alarms Locks
30
Office Precious Items Main Threats Security Needs Computers Furniture
Intellectual property Other Valuables Main Threats Employees Intruders Fire Security Needs Guards Access Control CCTV Intruder Alarm Fire detection and suppression
31
Bank Main Threats Precious Items Security Needs CCTV Robbers Firewall
Cash People Documents Intellectual property Valuable items Computers, serves etc. Furniture Main Threats Robbers Employees Fire Hackers Power Cut Security Needs CCTV Firewall Fire detection and suppression Alarms Locks
32
The End
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.