Chapter 8 Security Systems 8.1 Robbery and Burglar Alarm Systems (RAS and BAS) 148 8.2 Video Surveillance Systems (CCTV) 150 8.3 Access Control 150 8.4 Danger Management System 151
8 Security Systems There are various risk potentials environmental catastrophes, fire, robbery, burglary and spying, theft and vandalism, terrorism and extremism. These risks have to be identified and analyzed and the appropriate security concepts have to be developed. Prevention, intervention and rescue measures are to be implemented for many of these risks within the scope of the legal standards and guidelines. Mechanical protection equipment which is reasonably matched ranks first in security systems. It can oppose a certain resistance to the intruder and possibly prevent a burglary. It is therefore an essential prerequisite for an effective protection against burglary. In contrast, burglar alarm systems (BAS) are only able to signal. They do not prevent burglary but can act as a deterrent. Due to the signaling effect, the burglar's risk of being discovered is considerably increased. The best thing is to reasonably combine the mechanical protection equipment with electronic monitoring. As a rule, the BAS should be expanded in such a way that also a hold-up alarm can be triggered. 8.1 Robbery and Burglar Alarm Systems (RAS and BAS) Fields of application for burglar alarm systems Hold-up protection Hold-up / emergency call solutions for persons and areas with a high risk potential Exterior shell and opening surveillance Comprehensive surveillance of the building's exterior shell for closure, openings or break-through Room surveillance Reliable detection of movements in protected areas Object protection Selective monitoring of individual objects or valuables containers Alarm and transmission On-site alarm and fast alarm transmission to the service center or directly to the police Perimeter surveillance / protection Complete surveillance of the outdoor area of the premises and spacious areas The appropriate degree of protection Burglar alarm systems (BAS) are subdivided into different security levels according to the risk. The standards provide for a total of four levels. Level 1 is below the police requirements and is therefore not recommended. 8 For the protection of persons and smaller residential properties, a class A or level 2 RAS / BAS with a medium protection against overcoming and a medium response sensitivity is sufficient. A class B or level 3 RAS / BAS with a high protection against overcoming and a medium response sensitivity is used when persons or residential property with an increased risk potential or smaller commercial properties or public properties are to be monitored. For the protection of persons, commercial or public properties and residential properties with a high risk potential, class C or level 4 RAS / BAS with a very high protection against overcoming and an increased response sensitivity should be selected. Important guidelines for robbery and burglar alarm systems Comprehensive information on the relevant guidelines standards, VdS guidelines (Verband der Schadensversicherer e. V. German association of indemnity insurers), rules for the prevention of accidents, guidelines for robbery and burglar alarm systems with connection to the police, etc. can be obtained from the Siemens brochure with the order no. E10003-A38-E19. 148 Totally Integrated Power Security Systems
Checklist Installation of a robbery and burglar alarm system Determine the type of surveillance most suitable for your object: Exterior shell surveillance in which all securityrelevant openings such as doors and windows in the exterior shell of the object to be protected are monitored. Trap surveillance in which predominantly those areas are monitored which an intruder will enter with the utmost probability. A combination of both types of monitoring. The planning and installation of an RAS / BAS should preferably be implemented in such a way that in case of a burglar attempt, the alarm release already takes place before the burglars have overcome the mechanical protection equipment. The BAS is to be planned and installed in such a way that it can only be armed if all parts of it are operational (part of coerciveness). To prevent false alarms, you should insist that the area monitored by the BAS can only be entered after having disarmed the system (e.g. by using activating devices with an additional locking of the doors). The expert speaks about complying with the so-called coerciveness. Select the type of alarm most suitable for your property. The planning, device selection, installation, and maintenance of RAS / BAS have to be implemented in compliance with the relevant standards, regulations, rules, guidelines, in particular the range of standards DIN EN 50130, 50131, 50136, and DIN VDE 0833, Parts 1 and 3, in the respective latest published version. Make sure that the RAS / BAS is maintained / serviced regularly by a qualified company. This is an essential prerequisite for its proper and reliable functioning. The type and scope of the RAS / BAS and its sabotage safety against attempts of overcoming it have to correspond with the underlying degree of danger. 8 (Source: http://einbruchschutz.polizei-beratung.de) Totally Integrated Power Security Systems 149
8 8.2 Video Surveillance Systems (CCTV) In sophisticated security concepts, video systems play an increasingly central role. Apart from the real-time monitoring of critical areas, the identification of persons with the aid of biometric processes or the detection of dangers, e.g. in traffic tunnels, it is most of all about the logging of processes and the recording of alarm situations for immediate intervention and later evaluation. Fields of application for video systems Property surveillance Factory premises, prisons, public properties, financial institutes, power utilities, data centers Logging of processes Access authorization Flow of goods tracking Logistics companies, forwarding companies Process monitoring and control Baggage conveyor belt monitoring, production control Traffic supervision Traffic jam detection, flow of traffic Mobility Evaluation of flows of persons in public spaces, local public transport, airports, and big events The planning of a video system is first of all orientated to the operating requirements by the investors and operators of the area to be protected. These can basically be classified in three categories: security-relevant processes, applications in industrial processes and operational processes in traffic. In all solutions, the success is based on the customer-specific concept as well as the selection of suitable products and systems. The essential components of a video surveillance system are the following: A camera for picture recording A suitable transmission path The picture recording system The video control center When selecting the components, a well-matched system with an integrated solution is to be heeded. 8.3 Access Control Access control is supposed to protect persons, property and information from unauthorized access. It controls the access via "WHO WHEN WHERE" rules specified by the operator so that only authorized persons are granted access to the areas in the building released for them or protected areas on the premises. Access authorizations can be limited in time (term of expiration, time of day). When selecting the required access control, a large number of systems is available. They range from the one-door solution to the freely programmable access control with efficient time recording, the processing of the recorded time data and a visitor management with complete administration. Standards and guidelines for access control German and European standards EN 50133-1 / DIN VDE 0830 Part 8-1:2003-09 Access control systems for use in security applications, Part 1 System requirements EN 50133-2-1 / DIN VDE 0830 Teil 8-2-1:2001-08 Access control systems for use in security applications, Part 2-1: General requirements for components EN 50133-7 / DIN VDE 0830 Teil 8-7:2000-04 Access control systems for use in security applications, Part 7: Application guidelines VdS guidelines (German association of indemnity insurers) VdS 2353:2004-06 Richtlinien für die Anerkennung von Errichterfirmen für Zutrittskontrollanlagen (Guidelines for the approval of installation companies for access control systems) VdS 2358:2002-07 Richtlinien für Zutrittskontrollanlagen, Teil 1: Anforderungen (Guidelines for access control systems, Part 1: Requirements) VdS 2359: Prüfmethoden für Anlageteile von Zutrittskontrollanlagen (Test methods for system components of access control systems; in preparation) VdS 2367:2004-06 Richtlinien für Zutrittskontrollanlagen, Teil 3: Planung und Einbau (Gudielines for access control systems, Part 3: Planning and installation) VdS 3436:2005-08 Betriebsbuch für Zutrittskontrollanlagen (Report book for access control systems) BSI guidelines (German Federal Office for Information Security) BSI 7550:2005-10 Anforderungen an Zutrittskontrollanlagen (Requirements for access control systems) 150 Totally Integrated Power Security Systems
BSI 7551:2004-06 Zutrittskontrollanlagen Richtlinien für die Projektierung und Ausführung (Access control systems Guidelines for configuration and design) Important guidelines for robbery and burglar alarm systems A summary of the applicable guidelines (standards, VdS guidelines, BSI guidelines, ordinances, etc.) can be obtained from the Siemens brochure with the order no. E10003-A38-E19. 8.4 Danger Management System The more complex the requirements for the building installations become, the more different individual systems are required. These include not only fire detection systems, burglar alarm systems or access control systems, but also biometric systems, video solutions, alarm systems, and communication systems. As the case may be, they may be complemented by automation technology systems for buildings and production. A management system integrates all these requirements into one overall solution in order to be able to jointly monitor and control relevant functions (Photo 84/1). However, the security concept only works if the person in the control center is really enabled to control, clearly qualify and evaluate the information flood. Only then is appropriate action in a dangerous situation possible, since security must not end in the control center! The operational concept of the GMA-Manager is based on the fact that the user is only provided with such data and information which do not require any abilities to abstract. This includes the logic preprocessing and prefiltering of all incoming information as well as an automation of all mandatory responses. 8 Photo 84/1: Example of a danger management system Totally Integrated Power Security Systems 151
8 152 Totally Integrated Power Security Systems