GLOSSARY of SECURITY TERMS



Similar documents
Understanding Access Control

UBC Technical Guidelines Section Edition Secure Access: General Standards Page 1 of 7

Middleborough Police Electronic Security Narrative

System components portfolio overview. Power supplies, electromagnetic locks, electric strikes and system accessories

BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS

Access Professional Edition Selection Guide

Doc 10. UTM Standards: Card Access Security System

The Access Engine. Building Integration System - The Access Engine. Security Systems

DARTMOUTH COLLEGE DESIGN January 3, 2012 & CONSTRUCTION GUIDELINES

AC-115 Compact Networked Single Door Controller. Installation and User Manual

SECTION DETECTION AND ALARM

Harris County Fire Code Electronic Lock Procedures

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Comprehensive Security with one Powerful System. G Series integrated security, fire and access control panels

solutions Biometrics integration

Chapter 5 Understanding Input. Discovering Computers Your Interactive Guide to the Digital World

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Your Canadian Security Specialists. Eddie D Orazio

Complete Security One Powerful Solution. GV4 Series integrated security, fire and access control panels D7212GV4, D7412GV4, D9412GV4

TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training)

SECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS

Security Alarm Monitoring Protocol

integrated fire and security solutions Maximum protection for buildings

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION

W.A.R.N. Passive Biometric ID Card Solution

INTRUSION ALARM SYSTEM

Table of Contents - 3 -

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

DIVISION 28 ELECTRONIC SAFETY AND SECURITY

Understanding Alarm Systems

Access Control Glossary

Biometrics in Physical Access Control Issues, Status and Trends White Paper

DORMA MODEL PS-406BB POWER SUPPLY INSTALLATION INSTRUCTIONS

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

DSX-Soft I/O Integration Software

AxTraxNG Access Control Management Software

Two-way communication, keep checking the commnunication between the panel and accessories, make sure the system safer.

MANAGEMENT SOLUTION (P.A.M.S.)

EQUIPMENT SPECIFICATIONS

CONSULTANT PROCEDURES & DESIGN GUIDELINES ACCESS CONTROL SYSTEM

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems

Security Systems Intrusion Alarm

A VOLUTION. S series. Avolution S Series Security System. ASSA ABLOY, the global leader in door opening solutions

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you

DIVISION 28 ELECTRONIC SAFETY AND SECURITY SECTION SECURITY AND ACCESS CONTROL SYSTEM

Solution Ultima ICP-CC488 Home security you can rely on

Overview. Components of an alarm system Technology behind the equipment Communication Platforms Industry Terminology False Alarm Tips DSC products

A specifier s guide to access control systems

ACX 780, ACX 781 Access Control Units and Expansion Module

Performance/Acceptance Testing of Access Control Systems 1

Destiny Destiny Owners Manual

SYMMETRY PRODUCT OVERVIEW

Securing your school. Door hardware solutions for primary education

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

THE RESOURCE FOR UNMATCHED SERVICE AND EXPERTISE.

Appendix A - Cost Estimate Spreadsheet

This directive establishes Department of Homeland Security (DHS) policy regarding the physical protection of facilities and real property.

Solution Ultima ICP-CC488 Home security you can rely on

Strengths and Weaknesses of Access Control Systems. Eric Schmiedl and Mike Spindel

Intelliguard 5800/5900/5924. Application Guide

INTEGRATED SOFTWARE SOLUTIONS

Honeywell s WIN-PAK Access Control SystemGuide Specifications in CSI Format. SECTION

If you ve been waiting for uncompromising. wireless intelligence to show up at your. door, Wi-Q Technology has just arrived.

We suppy surveillance equipment, wireless security systems, CCTV surveillance camera, access control security systems, service provider of system

Security Management System

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring

GT Series. Multi-Tenant Security Intercom. Architectural and Engineering Specifications

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.

VR8. User Guide Intruder Alarm System

Securing Remote and Outdoor Assets Using Video Verification

DIVISION 28 ELECTRONIC SAFETY AND SECURITY

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Electronic Security. For Financial Institutions

Security, Access Management and Key Control Policy and Procedures

2.0 Installation 1. Remove the cover using a small flat blade screwdriver. Figure 2: Cover Removal

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform

COMBINE BURGLARY AND FIRE PROTECTION WITH ACCESS CONTROL IN A SINGLE,

A guide to access control for manufacturing sites

Reliable Security Solutions

Access CONTROL. MANAGEMENT Software

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms

Electronic Access Control Solutions

Mechanical Pushbutton Locks Keyless Convenience

CCTV & Video Surveillance over 10G ip

Physical Access Control with BACnet White Paper

V Series. Intelligent Programmer Software (DOS Version) User Manual

HyperAccess Access Control System

INSTRUCTION MANUAL All-In-One GSM Home Alarm System SB-SP7200-GSM

INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP ENTRYCHECK

Integrated Physical Security and Incident Management

White Papers: Delayed Egress Hardware

S I E R R A PRODUCT INFORMATION GUIDE FOR HOME SECURITY. SIERRA Page 1

FLORIDA STATE UNIVERSITY PURCHASING DEPARTMENT A1400 UNIVERSITY CENTER TALLAHASSEE FL ADDENDUM ACKNOWLEDGMENT FORM. DATE: December 8, 2011

Transcription:

GLOSSARY of SECURITY TERMS ACAMS (Access Control and Alarm Monitoring System) An electronic system or network of integrated systems designed to control physical access and monitor events such as intrusion. Access Card A card, generally the size and shape of a credit card, containing encoded data. The data can be encoded in a variety of ways, sometimes including more than one encoding technology. (i.e. Magnetic Stripe, Proximity, Smart Card, Wiegand.) Access Control The physical process of controlling who can access an area and when determined by what they have (an access card), what they know (a PIN), and/or something they are (biometrics). ACU (Access Control Unit) An electronic control panel to which readers and alarm devices are wired. The ACU can be a standalone unit or wired to a CPU. Anti-Passback The process or software control that prevents a user from allowing someone else to utilize his or her access card to enter a specific access controlled point while the user is in the protected area. Typically this control is used in parking garages and high-security areas. AHC (Architectural Hardware Consultant) A certified consultant with expertise in the design of doors and door locking hardware. AHC s are typically employed by an architect to prepare hardware specifications Biometrics A family of products that electronically scans or reads unique traits of the human body for verification or identification purposes. Biometrics can utilize unique patterns of the iris, retina, hand geometry, or fingerprint. Biometric Reader A device that stores enrolled templates of a unique human trait such as a fingerprint, hand geometry, voice, or retina pattern and looks for a match against a live presentation, to grant access to a secure area. Used as an alternate to card readers. CDT (Construction Document Technology Certification) The Construction Documents Technology (CDT) Program provides a comprehensive overview for anyone who writes, interprets, enforces, or manages construction documents, and specifically CSI specifications. Project architects, engineers, contractors, contract administrators, material suppliers, and manufacturers representatives are all realizing the advantages of being Construction Documents Technologists. By being able to understand and interpret written construction documents, CDTs perform their jobs more

effectively. By understanding the roles and relationships of all participants, CDTs improve communication among all members of the construction team, and facilitate a more comprehensive, better coordinated design, with significantly fewer problems and changes during construction. CPP (Certified Protection Professional) The Certified Protection Professional (CPP) designation is acknowledged as the security profession's highest recognition of practitioners. It is awarded based on experience and passage of an examination that provides an objective measure of an individual's broad-based knowledge and competency in security management. Digital Signal Processing (DSP) Digital signal processing (DSP) refers to various techniques for improving the accuracy and reliability of digital communications. DSP works by clarifying, or standardizing, the levels or states of a digital signal. A DSP circuit is able to differentiate between human-made signals, which are orderly, and noise which is inherently chaotic. In security, DSP is deployed in signaling devices such as motion detectors to minimize false alarms, and surveillance cameras to improve image quality. Digital Video Recorder (DVR) Digital Video Recorder is the industry standard term applied to standalone and PC-based systems that record video images to a computer hard drive providing high quality recording. DVR s provide a quicker method of retrieving the recorded information unlike media such as VHS tapes and other equipment that stores information in a sequential manner. Disarm The act of disabling or shunting a security system or portions of the system to ignore input signals that normally result in alarms. Disarming can occur with user intervention, such as pass codes entered into a keypad, or on schedule through a PC based Access Control System. Door Control Relay The relay used to control the unlocking and locking functions of door hardware in an access control system. Door Forced A door forced alarm is the resulting logical alarm that occurs at a portal when the door is sensed to be in an open state without an associated valid access card transaction or an associated REX signal. Door Held A door held alarm is the resulting logical alarm that occurs at a portal when the door was opened after a valid access transaction or a valid. Door Held Time The length of time that a portal can remain open after a valid access transaction or valid REX signal before a door held alarm is generated. (Also Door Open Time.) Door Switch Monitor (DSM) or Door Contact

A device, typically a magnetic based contact, installed in a door to detect the position of the door. The signal from a DSM is connected to a security system to report conditions such as FORCED and HELD and in instances where electrified locking hardware is included, relocking of the door. Dual Technology Utilization of two different technologies in one device to increase reliability and functionality. Dual technology motion sensors, for example, use both passive infrared and microwave technology in order to reduce false alarms and increase detection. Duress Alarm A device, such as a push button or pull station, connected to a security system to signal an alarm when an individual is threatened or forced to do something. Bank Clerks typically have a duress alarm installed beneath their counter to signal robbery attempts. Exit Device Locking hardware designed to allow immediate exiting at all times, and does not require lever or knob rotation. Usually located on the perimeter doors of a building and always in the designated means of egress route. Sometimes referred to as panic hardware, the touchpad feature of the device allows doors to unlock and open by simply leaning on it Fail-Safe A lock that defaults to the unlocked position when power is removed. Requires power to go to a locked position. Fail-Secure A lock that defaults to the locked position when power is removed. Requires power to go to an unlocked position. Host Panel In a security system, an access control unit (ACU) that primarily provides services such as decision making, data base access, or special programs; the primary or controlling panel in a multiple ACU installation. Interlock A pair or group of separate doors equipped with a control system that prevent the simultaneous opening of more than one door at a time. Clean rooms typically include an entry vestibule with a two door interlock that prevents opening the clean room door until the entry to vestibule door is fully closed and vice versa. Isolation Relay A relay used to isolate two different systems that must integrate with one another through contact closures, or when the controlling systems relays are underrated for the load. Keypad A device that provides a localized user interface to control a security system or subsystem. Typically includes a numerical 10-key touchpad to allow entering of passcodes and commands.

Local Audible Alarm (LAL) A device used to annunciate locally an alarm condition or security violation. Locking Hardware Locking hardware is considered to be the electrified lock that controls a portal. Typical hardware includes electrified locksets, either mortise or cylindrical, electric strikes, electrified panic hardware, and magnetic locks, either face-on or shear. Mag Lock Fail safe devices that require constant power to remain locked. They are comprised of a lock body, typically mounted to the door head jamb, and an armature plate which is mounted on the door stile. The armature plate is a passive piece of steel that pivots on its mount, and when aligned with the lock body in its powered state, is magnetically drawn together. Some mag locks are capable of providing up to 2000 lbs of holding force. Magnetic Stripe The black or brown stripe that you see on your credit card, airline ticket or access card. The stripe is made up of tiny magnetic particles in a resin. The magnetic property of the stripe allows it to be encoded with a number of bits. In access control this data would include a facility code and card number. Man Trap A method used to provide strict access control by preventing access at one specified entrance while another entrance is being utilized. Typically two doors, separated by an enclosed spaced, are interlocked. When one door is opened the second door is incapable of being opened. Matrix Switch A video switcher that provides a scalable number of video inputs and monitor outputs, allowing routing of any available input signal to any output signal (crosspoint switching). Matrix switchers are usually located at a security operations center where all video concentrates and will display on multiple monitors. Users control the matrix via a joystick keyboard that allows switching and pan tilt zoom control of domes. Optical Turnstile An access control portal that utilizes optical beams (infrared sensors) to prevent tailgating and to grant or deny access into a facility. Units can control single or bidirectional pedestrian access. Passive Infrared (PIR) Typically, a sensor device that can sense movement within a specific area and change the state of a set of internal contacts as a result. These contacts can then be wired to a Request to Exit point of an Access Control System for automated egress shunting when a person approaches an Access Point from inside a protected area. PIRs are also common burglar alarm sensors. PE (Registered Professional Engineer)

Professional Engineer, refers to a person engaged in the professional practice of rendering service or creative work requiring education, training and experience in engineering sciences, as well as the application of special knowledge of the mathematical and physical sciences. A Professional Engineer is typically engaged for consultation, investigation, evaluation, planning and design of buildings or projects, and supervision of construction for the purpose of securing compliance with specifications and drawings for any such work. When your project requires the services of an engineer, be sure that he or she is properly licensed by the California Department of Consumer Affairs. Unlicensed persons are allowed to offer or perform professional engineering services only if they are working under the direction of a licensed engineer. Electrical engineers design the electrical systems in commercial buildings, educational facilities, and other projects. Electrical engineering generally includes the design of power distribution, lighting, communications, and other electrical based systems. For further information, go to: http://dca.ca.gov/pels/consumer_guide.pdf Portal A controlled break in a barrier between a more public and a more private space. The control could consist of a card reader on a locked access controlled door. Programmable Logic Controller (PLC) A Programmable Logic Controller is a rugged, special purpose computer that reads input signals, runs control logic, and then writes output signals according to its programming. Proximity In access control terms, proximity refers to presenting an access card within the reader s Radio Frequency (RF) field without having to make actual physical contact with the reader itself. Proximity Reader A reader that employs a radio frequency link between the reader and the card also known as prox reader and prox card). Encoded information is passed between the card and reader, usually supplying a unique pattern enabling identification of the cardholder. Reader A device a cardholder presents his access card to that will read the card's encoded data and transmit it to an access control unit (ACU). The ACU then make a decision as to what action to take as a result of that card read. Request to Exit (REX) A device used to disable a door alarm, thus allowing valid exit through an access controlled door. Usually a motion detector but can also be a pushbutton. Security Equipment Enclosure (SEC) A cabinet or enclosure containing security equipment or controls. Security Operations Center (SOC) The central commanded center location where security personnel monitor and respond to security and safety related incidents.

Shear Lock A type of magnetic lock installed flush in the head jamb of a door frame. The shear lock differs from a standard magnetic lock in that the holding force is based in the lateral -- or shear -- movement of the armature plate away from the lock body, rather than opposing tension direction. Smart Card A card containing a microchip that can store significantly larger amounts of data than a standard magstripe or proximity card. Bank account details, Social Security Numbers and employee identification numbers are examples of data that can be stored on a Smart Card. Storeroom Function The type of lock function most often specified on access control doors. The Storeroom Function lock is always locked from the unsecure side. If a key is used to open the door the lockset will always return to a locked state once the key is removed. This is referred to as a nightlatch by some manufacturers. Supervision The electronic process of continually metering the integrity of an electrical circuit that connects signaling devices to a processing host panel. Supervision can measure up to 5 conditions and typically checks for shorts, open loops, and power failures Tailgating Following an authorized and credentialed person through an access control point without having or using a separate valid credential. Turnstile A physical barrier device used to manage pedestrian traffic flow and access control at a security checkpoint. Wiegand A communication protocol widely accepted as an industry standard in the manufacturing of access control equipment. Wiegand data is typically the protocol used between the reader and the host panel.