Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise in security areas that apply to information transport systems (ITS) and the integration of safety and security systems. IMPORTANT: Industry Changes The ESSDRM is not intended to be a stand-alone manual; therefore, the construction of a comprehensive safety and security design requires reference to additional bodies of knowledge. The security industry has standards, practices, and organizations dedicated to defining and refining those practices. Prior to the ESSDRM, there has been no common publication providing information on design and implementation for electronic safety and security (ESS) systems. This manual provides information from both the security and ITS industries so that professionals in both industries will have a common understanding of each other s roles in designing and implementing ESS systems. Security systems were viewed as an option to most architectural projects, and with the specialized cabling and equipment required for installation, not many changes were made to the products offered within the industry. That changed in 1996 when the first Internet protocol (IP) camera was introduced to the industry. The excitement of being able to use standard network cabling and infrastructure was tempered with other complex issues. Not only did cameras tend to have extremely high bandwidths, but a user had to consider what to do with the analog systems they had already implemented. As late as 2002, speculation was that hybrid systems would remain very popular over the use of straight IP systems. Against all speculation, the IP camera market exploded. Vendors and users alike began to consider the integration and implementation of entire security and safety systems on a network platform. This discipline has grown from the early human guarding of objects to sophisticated surveillance cameras and building automation systems (BASs). Each began as a stand-alone system, but the rise of networks and ITS has lead to an increased need to converge multiple systems. As technology is developing at a rapid pace, its influence in the relatively stable world of security is on-going and ever changing. Advancements in common infrastructure have enabled manufacturers to create systems based on similar network protocols, allowing different systems to communicate with one another. The simple beginnings, exemplified by the employment of guards and patrols, have progressed to complex advancements in surveillance that have enabled the addition of intelligence to electronic security systems and BASs. The cost benefits can be seen with lower cabling costs; easy modifications for moves, adds, or changes (MACs); unified integration with other IT environments; elimination of specialized equipment; and space saving by using standard servers and storage devices instead of videocassette recorder (VCR) tapes and recorders. Although the concept of converged systems is gaining momentum, many systems still function using proprietary hardware and software components. 2009 BICSI 1-1 ESS Design Reference Manual, 2nd edition
Electronic Safety and Security (ESS) Bodies of Knowledge The ESS designer should have knowledge of: ITS fundamentals. Principles of security. Design process. Preliminary security design. Architecture and engineering (A&E) design. IP design. Security systems. Access control systems (ACSs). Surveillance systems. Intrusion detection. Fire alarm. Special systems. Network security. Systems integration. Project management. Systems operation and commissioning. Other chapters in this manual are devoted to areas and practices that influence the design of a security system. These chapters address: Security consulting. Design practices. Codes, standards, regulations, and organizations. Legal issues. The design process of the Construction Specifications Institute (CSI) and the American Institute of Architects (AIA). With the expansion of security and special systems, nontraditional bodies of knowledge that can now be included in the responsibilities of the ESS designer include: Voice and notification. Nurse call. Mustering. Radio frequency identification (RFID) inventory management. ESS Design Reference Manual, 2nd edition 1-2 2009 BICSI
Physical Security Physical security describes measures that deter, detect, delay, mitigate, or notify any attempt to injure, damage, modify, or remove an asset or person. This includes damage by accident, fire, environmental elements, crime, vandalism, and industrial espionage. Physical security can be a simple device or as elaborate as multiple layers of electronic measures. Depending on the situation, consulting with architects, engineers, and hardware designers may be necessary for physical security consideration. This manual will describe in detail situations and hardware types for general building applications falling under conventional codes. In some special situations (e.g., military, correctional facilities, hospitals), codes commonly used for commercial buildings may not apply. 2009 BICSI 1-3 ESS Design Reference Manual, 2nd edition
Electronic Safety and Security (ESS) Design Fundamentals The ability to use and integrate the various practices, methodologies, and devices constitutes the practice of safety and security design. Many elements of design are unique to the protection of life and property, and others are multidisciplinary. The ESS designer must have a firm grasp of the fundamentals and be able to incorporate aspects of the trades brought into the ESS design by other professionals. Depending on the expertise or knowledge of the ESS designer, additional support may not be necessary. These fundamentals will be discussed in detail throughout this manual. The physical and electronic security and safety must work as a comprehensive package. The ESS designer must understand how they influence each other to have a successful project. Access Control Access control is important for overall personal safety and the protection of physical and intellectual property. Access control devices can include entry point locks, integrated electronic devices controlling a single door or room, or a complex system of interconnected electronic devices controlling a zone, building, or campus. ESS designs can be affected by each individual s location and the level of security desired. Intrusion Detection Intrusion detection is often viewed as part of the ACS because most door controls for access control can alarm when the door is left open or opened without a valid card read. However, it is a stand-alone system that must be evaluated to its own standards and levels of due diligence. These systems use everything from simple switches to complex devices that detect motion, heat, glass breaking, or other nonstandard occurrences in the area to detect the presence of persons in secure zones. Intrusion detection systems (IDSs) can generate simple local or paging alarms or can be integrated with other systems to provide more active responses (e.g., turning on cameras or lighting). Surveillance Video surveillance is a widely used technology within ESS systems. Video surveillance involves the use of cameras for watching or controlling assets. It is the process of image: Capturing. Transmitting. Processing. Viewing. Recording. This technology requires knowledge of cameras and their placement, as well as knowledge of image transmission and recording principles. ESS Design Reference Manual, 2nd edition 1-4 2009 BICSI
Fire Detection and Alarm Fire detection and alarm involves the early detection and notification of life safety threats. Fire detection and alarm requires that the ESS designer have a thorough knowledge of specific codes, statutes, and the requirements of the applicable authority having jurisdiction (AHJ). Integrated Systems Integrated systems cover concepts, systems, and processes related to the convergence of ESS systems or their integration with other building systems. Through integration, ESS systems begin to interact with other building systems. Integrated ESS systems are deployed in a wide variety of environments, including facilities, campuses, vehicles, and persons. Special Systems With the convergence of systems to the network, the addition of specialty systems such as nurse call, RFID tracking, intercom, and mustering will sometimes fall under the responsibilities of the ESS designer. Network Security As more systems migrate to the network, the issues of protecting those systems must be addressed. Isolation can provide protection but at the cost of remote access. Remote access to a network allows the possibility of outside interference and harm. Firewalls, encryption, virtual private networks (VPNs), and other methods of protection are available. Types of Projects An ESS project may be a new construction or a retrofit for an existing facility. Types of designs facing the ESS designer may include: Original design. Retrofit of an existing plan. Upgrade or replacement of an existing system. To successfully complete a project, the ESS designer must be able to interact with building owners, tenants, architects, engineers, and security professionals. The ESS designer also may need to consult end users and other stakeholders. 2009 BICSI 1-5 ESS Design Reference Manual, 2nd edition
Current and Future Trends in Safety and Security Several areas in safety and security design are affected by rapid growth in technology, including: Information technology (IT). Physical security. Integration of access control and BAS. Surveillance. Information Technology (IT) Most of the systems today have migrated to the use of the network for communication protocol between the servers and control panels. Some are hybrid systems where there are limited gateways to the network and the devices communicate through older protocols for the subsystem communication. The ESS designer must understand the system communication methods, the required infrastructure particular to the specific system installed, and how network outages will impact system functionality. The ESS designer must understand the impact of the project on the client s IT networks. The impact may be financial, operational, and physical (e.g., switch ports, bandwidth, cabling). The ESS designer also must have a reasonable understanding of network terminology, architecture, and function. Coordination with the client s IT department is important for ensuring the success of any safety or security project that has an impact on the IT network. Integration of Access Control and Building Automation Systems (BASs) The client often will require multiple levels of access within a space, and personnel may require access to a number of different areas, rooms, or spaces. The access levels may change over time and may impact or be impacted by other building systems. When an ACS is integrated with one or more BASs, the design goals require a more holistic approach. Observing the client s space and surrounding areas has always been a major aspect of access control as part of the security system. Understanding how the electronic access control (EAC) system integrates with BASs and subsystems in the surrounding areas is becoming a major factor in the design of EACs. Surveillance Surveillance systems record activities in the client s targeted areas for local or remote review. Modern camera systems may be: Digital. Analog. Digital/analog hybrids. IP cameras. Many factors will affect the selection, including court admissibility, network impact, and available space within buildings to house equipment. ESS Design Reference Manual, 2nd edition 1-6 2009 BICSI
Today s Technology and Convergence Technology s growing impact on security has led to the convergence of many systems. Convergence can encompass a range of capabilities, from limited monitoring to full command and control functions across a common IP-based network. Some of the most common types of convergence are the interconnection of: Multiple systems within a single site. Single systems across multiple sites. Multiple systems across multiple sites. This shift in implementation is driving a change in both the security industry and the communications industry. Professionals in both industries have to learn more concerning each industry. Security professionals can no longer be successful without understanding the cabling infrastructure required for an installation, and cabling infrastructure professionals are asked to perform more security and safety related tasks. 2009 BICSI 1-7 ESS Design Reference Manual, 2nd edition
Manual Overview This second edition of the ESSDRM comprises 13 chapters and two appendixes that contain information intended to assist both security specialists and IT professionals in understanding the systems and the convergence that is occurring between the industries. Following is a brief description of what the reader can expect to find in each chapter of this manual. Chapter 2: Principles of Security Chapter 2 discusses security planning and applications as they pertain to the integration of a system of deterrence and detection by electronic means, including: Basics of security theory. Fundamentals of security design. Roles of practitioners involved in electronic security systems. Skills and experience required for each role. Chapter 3: Electronic Safety and Security Design Process There are many considerations for the ESS design process so Chapter 3 is divided into three sections: Preliminary design guidelines Architecture and engineering design process IP design principles. Section 1: Preliminary Design Guidelines This section provides guidance to the ESS designer to adequately address the information from the client as prepared by a consultant, including: Threat vulnerability analysis. Client interview. Facility location analysis. Section 2: Architecture and Engineering Design Process The second section introduces the architecture and design process by discussing the various types of contractual relationships and the following design processes: Schematic design Design development Construction documentation Construction administration Additionally, the roles of team members and interaction between those individuals during the various design processes are explored. ESS Design Reference Manual, 2nd edition 1-8 2009 BICSI
Chapter 3: Electronic Safety and Security Design Process, continued Section 3: Internet Protocol Design Principles The third section provides an introduction to the design principles for IP-based ESS systems. It includes a brief overview of the IP network-based security world, followed by a general introduction to network architecture and the considerations necessary for the planning, design, and implementation of state-of-the-art systems. Chapter 4: Access Control Chapter 4 explores the purpose and application of ACSs. The various types of systems are discussed, with an in-depth review of the hardware and software requirements. RFID and IP integration are included in this chapter. Chapter 5: Surveillance Systems Chapter 5 provides an overview of video surveillance fundamentals and explains formal risk assessment and security master programs. Designing with a perspective-oriented approach is discussed. The progression from analog to hybrid analog/digital to digital also is explained. Chapter 6: Intrusion Detection Systems Electronic intrusion detection is designed to allow a timely response or deterrent to security breaches that may adversely affect people and property. Chapter 6 explores the basics of design and provides examples of the application of various types of sensors to provide intrusion detection. Chapter 7: Fire Detection and Alarm Systems Chapter 7 provides an overview of the complex subject of fire detection and alarm systems, including: Classes of fire alarm and detection systems. Components that initiate a fire alarm condition. Detectors and systems currently available. Fire suppression systems and their related initiation devices. Notification appliances. Chapter 8: Notification, Communication, and Display Devices Notification and display devices provide a means of communicating a message through the use of voice and video devices or with the combination of both. Chapter 8 discusses: Audio communications. Emergency telephones. Public address and paging. Display devices. 2009 BICSI 1-9 ESS Design Reference Manual, 2nd edition
Chapter 9: Special Systems Chapter 9 explains the design and application of various specialty systems. It provides a designer with the fundamental tools necessary to properly design some of the more basic systems as well as a level of knowledge necessary to work in cooperation with the specific system providers. Some of the systems discussed include: Nurse call. RFID. At-risk human perimeter systems. Asset management systems. Chapter 10: Network Security Chapter 10 focuses on a broad overview of threats and countermeasures for network security as it relates to IP-based ESS system design. Risks and control measures are explained and discussed. Chapter 11: Systems Integration Chapter 11 discusses the concepts, systems, and processes related to the integration of ESS, including: ESS systems. Command and control. Data networks. Building automation. Fire-life-safety (FLS). Energy/lighting management. Chapter 12: Project Management Chapter 12 contains an overview of the key elements, roles, and processes associated with the project management of an ESS project. The ESS project manager must understand the fundamentals of project management as well as the unique process and technology involved in ESS. Chapter 13: Systems Operation and Commissioning Chapter 13 provides designers, security contractors, and end users with a framework to develop standardized policies and procedures. ESS Design Reference Manual, 2nd edition 1-10 2009 BICSI
Appendix A: Codes, Standards, and Regulations Appendix A provides an overview of the regulations, codes, and standards that the ESS designer must work with, including: Telecommunications. Building and construction. Electrical. Fire protection. Life safety. Security. Appendix B: Legal Aspects of Electronic Safety and Security Design Appendix B examines some of the legal issues relevant to the finding or avoidance of liability. 2009 BICSI 1-11 ESS Design Reference Manual, 2nd edition