Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response



Similar documents
How to Solve the Most Persistent Problem in Perimeter Security Systems

A Risk Assessment Methodology (RAM) for Physical Security

Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely.

I N T E LLIGENCE WATC H. Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities

Security Alarm Monitoring Protocol

SECURITY & MONITORING QUICK GUIDE

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Understanding Alarm Systems

ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings

Security Systems Surveillance Policy

INFORMATION ON STANDARDS FOR ELECTRONIC SECURITY SYSTEMS

Newton Public Schools Security Audits Executive Summary

Dynamic Vulnerability Assessment

Additional Instruction

How To Ensure Security At A Site Security Site

IN DEFENSE OF OUR SCHOOLS

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

IOS EYE4 APP User Manual

The IoT s application to protect your family

INTRUSION ALARM SYSTEM

Introducing TransitVUE Perimeter IDS, the most advanced perimeter intrusion detection system available today! Protecting Perimeters Around the World

Hills wireless security alarm DIY range

Intruder Alarm Advice for Domestic Properties

UBC Technical Guidelines Section Edition Secure Access: General Standards Page 1 of 7

Remote Monitoring offers a comprehensive range of services, which are continually

Think Remote Monitoring Think Concept Pro Think VXM4B

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems

Middleborough Police Electronic Security Narrative

about your house How to Lock Out Crime: Home Security Alarms

Who is Watching You? Video Conferencing Security


VR8. User Guide Intruder Alarm System

View. Select View Managed Video Services ADT

Secure Video Surveillance System (SVSS) for Unannounced Safeguards Inspections

GSM ALARM SYSTEM USER MANUAL

Thank you for the opportunity and privilege to introduce the services offered by Silver Space Electro Mechanical Works L.L.C.

Version 2.0. Camera Placement and Location

Security for Railways and Metros

Intelligent Surveillance & Security Systems

GUIDE GETTING STARTED IMPORTANT SUPPORT RESOURCES

HOME AUTOMATION SECURITY ENERGY MANAGEMENT

Contents TABLE OF. List of Illustrations... IX. Preface... XV. Chapter 1: How the Burglar Breaks into Your Home... 1

How To Protect Yourself With Securtek

Home Security and Control

ADVANCED SECURITY SOLUTIONS

- Monitoring Array: a seismic or infrasound array, including from 1(4) to 20 Remote Elements (RE) and one Central Recording Facility (CRF).

Low Cost Home Security Options. Jim Niehaus October 9, 2012

Crime Central Station Burglary Alarm Systems

Welcome to a whole new level of interactive home security

PSTN Home Alarm System

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Building Integration System Your platform for customized security and safety management

Palos Verdes Estates Police Department 340 Palos Verdes Drive West, Palos Verdes Estates, CA (310)

The SwannCloud Mobile App

Site Security Standards and Strategy

Security Device Installation Protocol

Tattletale Portable Alarm System

integrated fire and security solutions Maximum protection for buildings

Your Canadian Security Specialists. Eddie D Orazio

Remote Managed Services

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI

Select Agent Program Workshop November 16, Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC)

Overview. Components of an alarm system Technology behind the equipment Communication Platforms Industry Terminology False Alarm Tips DSC products

Using Your. Security System With Icon Keypad S5020, S5021, S5022

HomeSafe-Basic VT-PS99E. User s Manual. PSTN Home Alarm System. Page: 1 / 15

Keys to understanding your alarm system

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

tattletale User Guide Consumer unit version P a g e

P2000 SECURITY management SYSTEM. More control means more freedom

IP Camera Tutorial. What is a Network Camera?

Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution

Quick Installation Guide LCD GSM ALARM SYSTEM LH

Totally Wireless Video Security

DIVISION 28 ELECTRONIC SAFETY AND SECURITY

Intruder Alarm System

All tested. Easy Series Intrusion Control Panel Making security easy featuring RADION wireless peripherals

Melaleuca Home Security

Home Security User Guide

Using your LED Plus keypad

Administrative Procedure

Introduction. Industry Changes

Introduction of Intrusion Detection Systems

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

Physical Security Checklist and Inventory

Building Integration System Your platform for customized security and safety management

Transcription:

Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response International Biological Threat Reduction Department Sandia National Laboratories October 07, 2007 Physical Security for Bioscience Laboratories ABSA pre-conference course 1 SAND No. 2007-5497C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000.

Intrusion Detection Objective: Detect unauthorized access Many types of intrusion detection Personnel notice unauthorized access attempt Training Boundary sensors most applicable for bioscience facilities Magnetic switches on doors Glass break sensors on windows Volumetric sensors may be appropriate for low-use areas of high risk (e.g. culture collection storage rooms) Microwave Passive infrared 2

Magnetic Switches Balanced magnetic switch Complex balanced magnetic switch Outside Switch Inside Magnetic Unit 3 Covert magnetic switch

Balanced Magnetic Switches An internal magnet and reed switches are usually mounted on the door/window frame and a balancing (or external) magnet is mounted on the moveable door/window. An alarm condition occurs when a change in the magnetic field between the parts is detected. Major Causes for Nuisance Alarms: Poorly fit doors or windows Improper installation Extreme weather conditions which cause excessive movement of the door or window. 4

Volumetric Sensors Microwave Most sensitive to movement toward or away from sensor Nuisance alarms include: movement of metallic objects, fluorescent lighting, insects, movement outside of room Passive infrared Most sensitive across field of view Nuisance alarms include: heaters, thermal gradients, animals, sunlight, vibrations Limited applications in bioscience facilities: Most appropriate for low use, high risk areas E.g. Storage area for culture collection with very high risk pathogens Microwave sensor IR Sensor 5

Alarm Communication and Assessment Sensor Activated Alarm Signal Initiated Alarm Reported Alarm Assessed Designer must decide: What information should be presented to the operator? How should the information be presented? How does the operator interact with the system? How should the equipment be arranged at the operator's workstation? Alarms must be communicated and displayed 6 Alarms must be assessed before response is dispatched Can be direct (guards) or remote (video) Determine cause of each sensor alarm Valid or nuisance alarm Requires adequate lighting Deters opportunistic adversaries

7

Alarm Assessment Direct observation by guards Can be campus police or other on-site security Takes time and can put guard in danger Can provide immediate response Can only tolerate low rate of nuisance alarms Labor intensive Remote assessment by video Video is immediate and focused Video is displayed to an alarm station operator for assessment Assessment of an alarm can occur almost immediately Pre-event and post-event recording possible Later audit and review Efficient use of people Requires video infrastructure Can have high initial expense Maintenance can be expensive 8

Video Assessment vs. Video Surveillance Assessment Alarm information triggered by sensor activation and directed to a human to determine if unauthorized access has occurred in a sensored area Cameras located at sensor locations e.g. pointed at doors Surveillance Continuous use of a human as a intrusion detector to monitor several restricted areas that are NOT sensored by intrusion technologies Systems often have many cameras Someone must watch all video screens all the time Personnel can only watch a few screens for a limited amount of time before fatigue 9

Adversary Time vs. Response Time Begin Action sensor Adversary Task Time System Delay After Detection Task Complete System Response Time Alarm Detection Time Alarm Assessed Response Force Time Adversary Interrupted Time remaining after interruption T 0 T A Time T I T C 10

Response Force Options On-site guard force Can serve intrusion detection and alarm assessment roles in mechanically-based physical security systems Supports electronic systems: Monitors Alarm Communication & Display (AC&D) system Assesses electronic alarms at alarm console or at alarm location Patrols perimeter and buildings Summons and directs local law enforcement Local law enforcement (police) Reinforces on-site guard force Responds according to plan when summoned Equipped and authorized to confront adversary 11

Response Force Requirements Qualification and training Enforcement responsibilities and skills Equipment familiarity and training Familiarity with facility features and operations Knowledge of restricted area access and biosafety Guard Force Post Orders List specific duties and limits of authority Procedures for response to specific alarm conditions Emergency response procedures Notification list Memorandum of understanding with local law enforcement Specific instructions and agreements On-site training and orientation 12

Security Considerations Administrators have full control The ultimate insider Protect the system using procedures Two person control Configuration management Password control Restrict operator privileges Provide physical protection for equipment Backup equipment and procedures must be provided to maintain security Emergency power and uninterruptible power supply required for computers 13

Conclusions Physical security systems will vary based on: Resources Choice of technology Security system strategy Physical security is more substantive for deny or contain than deter Risk Assessment! Physical security systems should be performance based Low and higher technology options Must consider unique aspects and requirements of bioscience laboratories 14