advanced services security

32
Security Systems Submitted by , Aditya . D 1001052 VII TH SEM B . Arch Sec “B” SPA JNAFAU

Upload: lalit-aditya

Post on 19-Nov-2015

223 views

Category:

Documents


0 download

DESCRIPTION

architecture

TRANSCRIPT

Slide 1

Security Systems

Submitted by , Aditya . D1001052 VIITH SEM B . Arch Sec BSPA JNAFAU

DefinitionAn electrical device that sets off an alarm when someone tries to break in.Securityis the degree of resistance to, or protection from, harm.It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization.

Security conceptsCertain concepts recur throughout different fields of security:Assurance- assurance is the level of guarantee that a security system will behave as expectedCountermeasure - a countermeasure is a way to stop a threat from triggering a risk eventDefense in depth- never rely on one single security measure aloneExploit- a vulnerability that has been triggered by a threat - a risk of 1.0 (100%)Risk- a risk is a possible event which could cause a lossThreat- a threat is a method of triggering a risk event that is dangerousVulnerability- a weakness in a target that can potentially be exploited by a security threat.

Security DevicesSecurity Camera (CCTV): the use ofvideo camerasto transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast televisionin that the signal is not openly transmitted, though it may employ point to point (P2P), point to multipoint, or mesh wireless links. Though almost all video cameras fit this definition, the term is most often applied to those used forsurveillancein areas that may need monitoring such as banks, casinos, airports, military installations, and convenience stores.Video telephonyis seldom called "CCTV" but the use of video indistance education, where it is an important tool, is often so called.

Metal Detector: Ametal detectoris a portableelectronic instrumentwhich detects the presence of metal nearby. Metal detectors are useful for finding metal inclusions hidden within objects, or metal objects buried underground. They often consist of a handheld unit with a sensor probe which can be swept over the ground or other objects. If the sensor comes near a piece of metal this is indicated by a changing tone in earphones, or a needle moving on an indicator. Usually the device gives some indication of distance; the closer the metal is, the higher the tone in the earphone or the higher the needle goes. Another common type are stationary "walk through" metal detectors used for security screening at access points in prisons, courthouses, and airports to detect concealed metal weapons on a person's body.

Electronic Article Surveillance (EAS):

Electronic article surveillance (EAS)is a technological method for preventingshopliftingfromretail stores,pilferage of books from librariesor removal of properties fromoffice buildings. Special tags are fixed tomerchandiseor books. These tags are removed or deactivated by the clerks when the item is properly bought or checked out. At the exits of thestore, a detection system sounds analarmor otherwise alerts the staff when it senses active tags. Some stores also have detection systems at the entrance to the bathrooms that sound an alarm if someone tries to take unpaid merchandise with them into the bathroom.When the alarm sounds to ensure that employees respond to the alarm. The keypad keeps beeping until an employee responds to it. For high-value goods that are to be manipulated by the patrons, wired alarm clips may be used instead of tags.

Tiger teeth - Traffic control:

Tiger Tooth Traffic controllers enforce One Way traffic flow for parking facilities or other single direction vehicle lanes. The torsion spring actuated Tiger Teeth positively control traffic in one direction while permitting free flow in the other direction. The Tiger Teeth will puncture all pneumatic tires including steel belted radial and large truck tires.

Barriers and Barricades: Barricade, from the Frenchbarrique(barrel), is any object or structure that creates abarrieror obstacle to control, block passage or force the flow of trafficin the desired direction. Adopted as a military term, a barricade denotes any improvised fieldfortification, most notably on the city streets during urban warfare. Barricades also include temporarytraffic barricadesdesigned with the goal of dissuading passage into a protected orhazardousarea or large slabs of cementwhose goal is to actively prevent forcible passage by a vehicle. Stripes on barricades and panel devices slope downward in the direction traffic must travel.

Guard Tour System : The system uses a reader that the guard carries along and uses every time he walks by a checkpoint. Upon each contact made, a date and time stamped along with the checkpoint information is recorded into the device.If event reporting is desired (for example, broken window, lights left on, etc) then they can be easily reported with the use of an event table (included with the system) by just touching the appropriate event within the table, after a checkpoint it relates to.The information stored in the reader (holds 28,675 transactions) can the easily downloaded to the computer with the use of the communication cable included with the system.The information then becomes available for printing or screen viewing through multiple types of available reports.

Perimeter Protection: Outdoors mechanical and/or electronic systems conceived to protect the external perimeter of a facility.

Intercom Audio and Video: Anintercom(intercommunication device),talkbackordoor phoneis a stand-alone voice communications system for use within a building or small collection of buildings, functioning independently of thepublic telephone network. Intercoms are generally mounted permanently in buildings and vehicles. Intercoms can incorporate connections topublic address loudspeaker systems,walkie talkies,telephones, and to other intercom systems. Some intercom systems incorporate control of devices such as signal lights and door latches.

Counterfeit Detection Pen: Counterfeit banknote detection pens are used to detectcounterfeitSwiss franc,euroandUnited States banknotesamongst others. Typically, genuine banknotes are printed on paper based on cotton fibers, and do not contain the starches that are reactive with iodine. When the pen is used to mark genuine bills, the mark is yellowish or colourless. Counterfeit pens are most effective against notes printed on standard printer orphotocopierpaper.

Assets and Personnel Control:

Automatic Identification system offer tools designed to identify locate and track your people and assets right from the desktop. From protecting office computers to monitoring personnel and inventory movements, these system now bring total visibility to your operations.

Based on its patented RFID (Radio Frequency Identification) line, the product provides a single-system approach to a variety of automatic monitoring and tracking applications, including:Asset ManagementPersonnel & Vehicle Access ControlPersonnel MonitoringProduction and Process ControlInventory Tracking

Security Alarms: Asecurity alarm is a system designed to detect intrusion unauthorized entry into a building or area. Security alarms are used in residential, commercial, industrial, and military properties for protection againstburglary(theft) orproperty damage, as well as personal protection against intruders. Car alarms likewise protect vehicles and their contents.Prisonsalso use security systems for control ofinmates.Some alarm systems serve a single purpose of burglary protection; combination systems provide bothfire and intrusion protection. Intrusion alarm systems may also be combined withclosed-circuit televisionsurveillancesystems to automatically record the activities of intruders, and may interface toaccess control systems for electrically locked doors. Systems range from small, self-contained noisemakers, to complicated, multi-area systems with computer monitoring and control.

Audio Recorders: Sound recordingis an electrical or mechanical inscription and re-creation ofsoundwaves, such as spoken voice, singing,instrumental music, or sound effects.This device can be used for security purpose.

Vehicle Inspection: Vehicle inspectionis a procedure mandated by national or subnational governments in many countries, in which a vehicle is inspected to ensure that it conforms to regulations governingsafety,emissions, or both. Inspection can be required at various times, e.g., periodically or on transfer of title to a vehicle. Utilizing dual periscopic mirrors, two powerful fluorescent lights and rugged castored wheels, this system works together to provide an extraordinary field of view unmatched by any other method. While standing erect at the side of the vehicle, the operator can conduct a detailed inspection of half the undercarriage at a single glance. Moving along the center line, the entire chassis, engine compartment, power units and any newly welded attachments are immediately visible.

X-ray Scanner - X ray Machine - X Ray Scanners: AnX-ray generatoris a device used to generate X-rays. It is commonly used byradiographersto acquire anx-rayimage of the inside of an object (as in medicine ornon-destructive testing) but they are also used insterilizationorfluorescence.

Smoke detector: Asmoke detectoris a device that detectssmoke, typically as an indicator of fire. Commercial, industrial, and mass residential devices issue a signal to afire alarm system, while household detectors, known assmoke alarms, generally issue a local audible or visualalarmfrom the detector itself. Smoke detectors are typically housed in a disk-shaped plastic enclosure about 150 millimetres (6in) in diameter and 25 millimetres (1in) thick. Most smoke detectors work either by optical detection (photoelectric) or by physical process (ionization), while others use both detection methods to increase sensitivity to smoke. Sensitive alarms can be used to detect, and thus deter, smoking in areas where it is banned such as toilets and schools. Smoke detectors in large commercial, industrial, and residential buildings are usually powered by a central fire alarm system, which is powered by the building power with a battery backup.

Fire fighting systems,fire fighting equipment,fire fighting equipment and accessories like wet riser system, Co2 flooding system, water spray system, fire hydrant systems, fire sprinkler systems, fire alarm systems, fire detection systems are important to be applied in buildings for the safety of citizens.

THE END

THANK YOU