Introduction. Industry Changes



Similar documents
Chapter 1 Introduction

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Conducting Security System Site Surveys

Security Issues with Integrated Smart Buildings

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Recommended IP Telephony Architecture

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.

CDW Advanced Image Deployment Service Customer Guide

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

Middleborough Police Electronic Security Narrative

Network & Information Security Policy

Frankfurt Data Centre Overview

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

How Cisco IT Controls Building Security over the Enterprise WAN

Identifying the Future. Physical Security Information Management (PSIM) The Transformation of Gaming Security and Surveillance

Secure Ports Solutions

How To Create An Intelligent Infrastructure Solution

honeywell building solutions INNOVATIVE TECHNOLOGY ACHIEVING MEASURABLE RESULTS Intelligent healthcare Management

ABOUT ANIXTER UNIVERSITY

Vindicator Security Solutions. Security for Mission-Critical Applications

Products. Technology. Services. Delivered Globally. ANIXTER IPASSURED SM FOR SECURITY APPLICATIONS

Cisco Incident Response and Workforce Enablement for the Utility

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you

CCTV on IP Network. How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network. A Cisco on Cisco Case Study: Inside Cisco IT

Managed Security Services for Data

Cisco Advanced Services for Network Security

Insert Client Name Request for Proposal for Security Risk Assessment Services Consulting

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Security Center Unified Security Platform

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

Server Room, Data Centre Management and Monitoring Solutions

Physical Security Reliability Standard Implementation

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Integrated Physical Security and Incident Management

IP Surveillance. Presentation for BICSI Regional Conference Troy, Michigan March 15, Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link

Information Security Network Connectivity Process

White Paper: Nurse Call Systems and IT Networks

Major Risks and Recommended Solutions

Tk20 Network Infrastructure

I N T E LLIGENCE WATC H. Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

BANKING AND FINANCE. Advanced technology solutions to maximize the security of financial institutions and branch banks.

Healthcare Security Solutions. Building Technologies

Site Security Standards and Strategy

What Is a Smart Building? p. 1 Brief History p. 1 What Is a Smart Building? p. 3 The Foundations of a Smart Building p. 7 Overview p.

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Communications Management within Your Security Platform

Information Technology Cluster

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

presentation Our customers & Partners AE

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings

Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation

BUILDING SECURITY & ACCESS CONTROL

How To Create A Security Solution For Retail Banking

Security for Railways and Metros

Guarded community solutions Easy Series for villa and apartment projects

Motorola Wireless Broadband. Video Surveillance Solutions

A Study on Integrated Security Service Control Solution Development about CRETA Security

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Music Recording Studio Security Program Security Assessment Version 1.1

Update On Smart Grid Cyber Security

Your Canadian Security Specialists. Eddie D Orazio

Make your business EXCEL with technology solutions provided by Excel Communications Worldwide, Inc.

Autodesk PLM 360 Security Whitepaper

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Database Security, Virtualization and Cloud Computing

SYRACUSE CITY SCHOOL DISTRICT

A Model-based Methodology for Developing Secure VoIP Systems

A HELPING HAND TO PROTECT YOUR REPUTATION

Building Integration System Your platform for customized security and safety management

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Building Integration System Your platform for customized security and safety management

Axis IP surveillance. Endless possibilities for video surveillance.

ICANWK406A Install, configure and test network security

IT - General Controls Questionnaire

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

The evolution of data connectivity

Transcription:

Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise in security areas that apply to information transport systems (ITS) and the integration of safety and security systems. IMPORTANT: Industry Changes The ESSDRM is not intended to be a stand-alone manual; therefore, the construction of a comprehensive safety and security design requires reference to additional bodies of knowledge. The security industry has standards, practices, and organizations dedicated to defining and refining those practices. Prior to the ESSDRM, there has been no common publication providing information on design and implementation for electronic safety and security (ESS) systems. This manual provides information from both the security and ITS industries so that professionals in both industries will have a common understanding of each other s roles in designing and implementing ESS systems. Security systems were viewed as an option to most architectural projects, and with the specialized cabling and equipment required for installation, not many changes were made to the products offered within the industry. That changed in 1996 when the first Internet protocol (IP) camera was introduced to the industry. The excitement of being able to use standard network cabling and infrastructure was tempered with other complex issues. Not only did cameras tend to have extremely high bandwidths, but a user had to consider what to do with the analog systems they had already implemented. As late as 2002, speculation was that hybrid systems would remain very popular over the use of straight IP systems. Against all speculation, the IP camera market exploded. Vendors and users alike began to consider the integration and implementation of entire security and safety systems on a network platform. This discipline has grown from the early human guarding of objects to sophisticated surveillance cameras and building automation systems (BASs). Each began as a stand-alone system, but the rise of networks and ITS has lead to an increased need to converge multiple systems. As technology is developing at a rapid pace, its influence in the relatively stable world of security is on-going and ever changing. Advancements in common infrastructure have enabled manufacturers to create systems based on similar network protocols, allowing different systems to communicate with one another. The simple beginnings, exemplified by the employment of guards and patrols, have progressed to complex advancements in surveillance that have enabled the addition of intelligence to electronic security systems and BASs. The cost benefits can be seen with lower cabling costs; easy modifications for moves, adds, or changes (MACs); unified integration with other IT environments; elimination of specialized equipment; and space saving by using standard servers and storage devices instead of videocassette recorder (VCR) tapes and recorders. Although the concept of converged systems is gaining momentum, many systems still function using proprietary hardware and software components. 2009 BICSI 1-1 ESS Design Reference Manual, 2nd edition

Electronic Safety and Security (ESS) Bodies of Knowledge The ESS designer should have knowledge of: ITS fundamentals. Principles of security. Design process. Preliminary security design. Architecture and engineering (A&E) design. IP design. Security systems. Access control systems (ACSs). Surveillance systems. Intrusion detection. Fire alarm. Special systems. Network security. Systems integration. Project management. Systems operation and commissioning. Other chapters in this manual are devoted to areas and practices that influence the design of a security system. These chapters address: Security consulting. Design practices. Codes, standards, regulations, and organizations. Legal issues. The design process of the Construction Specifications Institute (CSI) and the American Institute of Architects (AIA). With the expansion of security and special systems, nontraditional bodies of knowledge that can now be included in the responsibilities of the ESS designer include: Voice and notification. Nurse call. Mustering. Radio frequency identification (RFID) inventory management. ESS Design Reference Manual, 2nd edition 1-2 2009 BICSI

Physical Security Physical security describes measures that deter, detect, delay, mitigate, or notify any attempt to injure, damage, modify, or remove an asset or person. This includes damage by accident, fire, environmental elements, crime, vandalism, and industrial espionage. Physical security can be a simple device or as elaborate as multiple layers of electronic measures. Depending on the situation, consulting with architects, engineers, and hardware designers may be necessary for physical security consideration. This manual will describe in detail situations and hardware types for general building applications falling under conventional codes. In some special situations (e.g., military, correctional facilities, hospitals), codes commonly used for commercial buildings may not apply. 2009 BICSI 1-3 ESS Design Reference Manual, 2nd edition

Electronic Safety and Security (ESS) Design Fundamentals The ability to use and integrate the various practices, methodologies, and devices constitutes the practice of safety and security design. Many elements of design are unique to the protection of life and property, and others are multidisciplinary. The ESS designer must have a firm grasp of the fundamentals and be able to incorporate aspects of the trades brought into the ESS design by other professionals. Depending on the expertise or knowledge of the ESS designer, additional support may not be necessary. These fundamentals will be discussed in detail throughout this manual. The physical and electronic security and safety must work as a comprehensive package. The ESS designer must understand how they influence each other to have a successful project. Access Control Access control is important for overall personal safety and the protection of physical and intellectual property. Access control devices can include entry point locks, integrated electronic devices controlling a single door or room, or a complex system of interconnected electronic devices controlling a zone, building, or campus. ESS designs can be affected by each individual s location and the level of security desired. Intrusion Detection Intrusion detection is often viewed as part of the ACS because most door controls for access control can alarm when the door is left open or opened without a valid card read. However, it is a stand-alone system that must be evaluated to its own standards and levels of due diligence. These systems use everything from simple switches to complex devices that detect motion, heat, glass breaking, or other nonstandard occurrences in the area to detect the presence of persons in secure zones. Intrusion detection systems (IDSs) can generate simple local or paging alarms or can be integrated with other systems to provide more active responses (e.g., turning on cameras or lighting). Surveillance Video surveillance is a widely used technology within ESS systems. Video surveillance involves the use of cameras for watching or controlling assets. It is the process of image: Capturing. Transmitting. Processing. Viewing. Recording. This technology requires knowledge of cameras and their placement, as well as knowledge of image transmission and recording principles. ESS Design Reference Manual, 2nd edition 1-4 2009 BICSI

Fire Detection and Alarm Fire detection and alarm involves the early detection and notification of life safety threats. Fire detection and alarm requires that the ESS designer have a thorough knowledge of specific codes, statutes, and the requirements of the applicable authority having jurisdiction (AHJ). Integrated Systems Integrated systems cover concepts, systems, and processes related to the convergence of ESS systems or their integration with other building systems. Through integration, ESS systems begin to interact with other building systems. Integrated ESS systems are deployed in a wide variety of environments, including facilities, campuses, vehicles, and persons. Special Systems With the convergence of systems to the network, the addition of specialty systems such as nurse call, RFID tracking, intercom, and mustering will sometimes fall under the responsibilities of the ESS designer. Network Security As more systems migrate to the network, the issues of protecting those systems must be addressed. Isolation can provide protection but at the cost of remote access. Remote access to a network allows the possibility of outside interference and harm. Firewalls, encryption, virtual private networks (VPNs), and other methods of protection are available. Types of Projects An ESS project may be a new construction or a retrofit for an existing facility. Types of designs facing the ESS designer may include: Original design. Retrofit of an existing plan. Upgrade or replacement of an existing system. To successfully complete a project, the ESS designer must be able to interact with building owners, tenants, architects, engineers, and security professionals. The ESS designer also may need to consult end users and other stakeholders. 2009 BICSI 1-5 ESS Design Reference Manual, 2nd edition

Current and Future Trends in Safety and Security Several areas in safety and security design are affected by rapid growth in technology, including: Information technology (IT). Physical security. Integration of access control and BAS. Surveillance. Information Technology (IT) Most of the systems today have migrated to the use of the network for communication protocol between the servers and control panels. Some are hybrid systems where there are limited gateways to the network and the devices communicate through older protocols for the subsystem communication. The ESS designer must understand the system communication methods, the required infrastructure particular to the specific system installed, and how network outages will impact system functionality. The ESS designer must understand the impact of the project on the client s IT networks. The impact may be financial, operational, and physical (e.g., switch ports, bandwidth, cabling). The ESS designer also must have a reasonable understanding of network terminology, architecture, and function. Coordination with the client s IT department is important for ensuring the success of any safety or security project that has an impact on the IT network. Integration of Access Control and Building Automation Systems (BASs) The client often will require multiple levels of access within a space, and personnel may require access to a number of different areas, rooms, or spaces. The access levels may change over time and may impact or be impacted by other building systems. When an ACS is integrated with one or more BASs, the design goals require a more holistic approach. Observing the client s space and surrounding areas has always been a major aspect of access control as part of the security system. Understanding how the electronic access control (EAC) system integrates with BASs and subsystems in the surrounding areas is becoming a major factor in the design of EACs. Surveillance Surveillance systems record activities in the client s targeted areas for local or remote review. Modern camera systems may be: Digital. Analog. Digital/analog hybrids. IP cameras. Many factors will affect the selection, including court admissibility, network impact, and available space within buildings to house equipment. ESS Design Reference Manual, 2nd edition 1-6 2009 BICSI

Today s Technology and Convergence Technology s growing impact on security has led to the convergence of many systems. Convergence can encompass a range of capabilities, from limited monitoring to full command and control functions across a common IP-based network. Some of the most common types of convergence are the interconnection of: Multiple systems within a single site. Single systems across multiple sites. Multiple systems across multiple sites. This shift in implementation is driving a change in both the security industry and the communications industry. Professionals in both industries have to learn more concerning each industry. Security professionals can no longer be successful without understanding the cabling infrastructure required for an installation, and cabling infrastructure professionals are asked to perform more security and safety related tasks. 2009 BICSI 1-7 ESS Design Reference Manual, 2nd edition

Manual Overview This second edition of the ESSDRM comprises 13 chapters and two appendixes that contain information intended to assist both security specialists and IT professionals in understanding the systems and the convergence that is occurring between the industries. Following is a brief description of what the reader can expect to find in each chapter of this manual. Chapter 2: Principles of Security Chapter 2 discusses security planning and applications as they pertain to the integration of a system of deterrence and detection by electronic means, including: Basics of security theory. Fundamentals of security design. Roles of practitioners involved in electronic security systems. Skills and experience required for each role. Chapter 3: Electronic Safety and Security Design Process There are many considerations for the ESS design process so Chapter 3 is divided into three sections: Preliminary design guidelines Architecture and engineering design process IP design principles. Section 1: Preliminary Design Guidelines This section provides guidance to the ESS designer to adequately address the information from the client as prepared by a consultant, including: Threat vulnerability analysis. Client interview. Facility location analysis. Section 2: Architecture and Engineering Design Process The second section introduces the architecture and design process by discussing the various types of contractual relationships and the following design processes: Schematic design Design development Construction documentation Construction administration Additionally, the roles of team members and interaction between those individuals during the various design processes are explored. ESS Design Reference Manual, 2nd edition 1-8 2009 BICSI

Chapter 3: Electronic Safety and Security Design Process, continued Section 3: Internet Protocol Design Principles The third section provides an introduction to the design principles for IP-based ESS systems. It includes a brief overview of the IP network-based security world, followed by a general introduction to network architecture and the considerations necessary for the planning, design, and implementation of state-of-the-art systems. Chapter 4: Access Control Chapter 4 explores the purpose and application of ACSs. The various types of systems are discussed, with an in-depth review of the hardware and software requirements. RFID and IP integration are included in this chapter. Chapter 5: Surveillance Systems Chapter 5 provides an overview of video surveillance fundamentals and explains formal risk assessment and security master programs. Designing with a perspective-oriented approach is discussed. The progression from analog to hybrid analog/digital to digital also is explained. Chapter 6: Intrusion Detection Systems Electronic intrusion detection is designed to allow a timely response or deterrent to security breaches that may adversely affect people and property. Chapter 6 explores the basics of design and provides examples of the application of various types of sensors to provide intrusion detection. Chapter 7: Fire Detection and Alarm Systems Chapter 7 provides an overview of the complex subject of fire detection and alarm systems, including: Classes of fire alarm and detection systems. Components that initiate a fire alarm condition. Detectors and systems currently available. Fire suppression systems and their related initiation devices. Notification appliances. Chapter 8: Notification, Communication, and Display Devices Notification and display devices provide a means of communicating a message through the use of voice and video devices or with the combination of both. Chapter 8 discusses: Audio communications. Emergency telephones. Public address and paging. Display devices. 2009 BICSI 1-9 ESS Design Reference Manual, 2nd edition

Chapter 9: Special Systems Chapter 9 explains the design and application of various specialty systems. It provides a designer with the fundamental tools necessary to properly design some of the more basic systems as well as a level of knowledge necessary to work in cooperation with the specific system providers. Some of the systems discussed include: Nurse call. RFID. At-risk human perimeter systems. Asset management systems. Chapter 10: Network Security Chapter 10 focuses on a broad overview of threats and countermeasures for network security as it relates to IP-based ESS system design. Risks and control measures are explained and discussed. Chapter 11: Systems Integration Chapter 11 discusses the concepts, systems, and processes related to the integration of ESS, including: ESS systems. Command and control. Data networks. Building automation. Fire-life-safety (FLS). Energy/lighting management. Chapter 12: Project Management Chapter 12 contains an overview of the key elements, roles, and processes associated with the project management of an ESS project. The ESS project manager must understand the fundamentals of project management as well as the unique process and technology involved in ESS. Chapter 13: Systems Operation and Commissioning Chapter 13 provides designers, security contractors, and end users with a framework to develop standardized policies and procedures. ESS Design Reference Manual, 2nd edition 1-10 2009 BICSI

Appendix A: Codes, Standards, and Regulations Appendix A provides an overview of the regulations, codes, and standards that the ESS designer must work with, including: Telecommunications. Building and construction. Electrical. Fire protection. Life safety. Security. Appendix B: Legal Aspects of Electronic Safety and Security Design Appendix B examines some of the legal issues relevant to the finding or avoidance of liability. 2009 BICSI 1-11 ESS Design Reference Manual, 2nd edition