Preview

Business

Better Essays
Open Document
Open Document
2429 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Business
Perimeter Security Applications
Robinson Paulino
DeVry College of New York
Sec- 330
Professor: Gerard Beatty

Perimeter Security Applications
Outline
Introduction 2 Intruder Detection Accuracy 3 Security Cameras 4 1. Using Size Filters for Video Analytics Accuracy 4 2. Geo-Registration and Perimeter Security Detection Accuracy 5 3. Clarity against a moving background 5 Perimeter Security Best Practices 6 Auto Tracking PTZ Camera 6 Long Range Thermal Camera 6 Covering Perimeter Camera Blind Spots 7 Determine a Perimeter Camera’s Range 7 Perimeter Fence . 8 Chain-Link Fences Protection 8 Electric and Infrared Fences 8 Fiber Optic Intrusion Detection Systems 9 In-Ground Intrusion Detection Systems 10 References 11

Perimeter Security Applications
Introduction
Physical security is the protection offered for property, these may be buildings or any other form of asset, against intruders (Arata, 2006). . The idea therefore, is to keep off unwanted persons or objects from ones premises. One’s premise is defined by a boundary which separates private property from the rest of the land. This boundary is referred to as the perimeter.
The perimeter could be physical or logical. Physical security is intended to keep intruders from land and grounds around such property. Logical perimeters on the other hand, are for protection against computer sabotage or any other remote malicious activities (Fennelly, 2012). In a nutshell, perimeter security is being precautious against any form of harm that may be intended against property or even people on that property. If the adversary could be noticed before any harm is done, it would be certainly better. Therefore, in addition to the physical security it is wise to have an intrusion detection system.
Intruder Detection Accuracy Intrusion detection is a process that involves monitoring of the events taking place around and within the boundaries of the property. These events are monitored



References: Giallorenzi T. G. (1985) Optical Fiber Sensor Technology. in Proc. IEEE 1985 International Electron Devices Meeting 31, p. 116. Philpott, D., & Einstein, S. (2006). The Integrated Physical Security Handbook. Arlington, Va.: Homeland Defense Journal. Bucaro J. A., Dardy H. D., Carome E. F. (1977). Optical Fibre Acoustic Sensor. Applied Optics 16 (7), 1761-1762. Philpott, D., & Einstein, S. (2006). The Integrated Physical Security Handbook. Arlington, Va.: Homeland Defense Journal. Tyska, L. A., & Fennelly, L. J. (2000).Physical Security: 150 Things You Should Know. Boston: Butterworth-Heinemann.

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    a) Physical Security - Is intended to detect and deter unauthorized personnel from gaining access.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Cjs/250 Appendix D

    • 574 Words
    • 3 Pages

    A six foot fence secures the outer perimeter. Video surveillance is active on the north fence and inactive on the south. A manned guard station permits entrance into the outer perimeter from the west; an unmanned and unlocked gate permits entrance from the east. No Trespassing signs are posted at intervals upon the perimeter fence; Employees Only is posted on the gate. Visitors must obtain a pass at the guard station.…

    • 574 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    References: Clifford, M. (2004). Identifying and Exploring Security Essentials. Upper Saddle River, NJ: Pearson Prentice-Hall…

    • 705 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Companies can elect to use physical security as part of their contingency planning measures. Physical security measures will include perimeter boundaries, surveillance devices, secure entry points and identifications checks, and secure access for internal sensitive areas. The organization might decide to bring in a specialist response team to help with a variety of threats, whether industrial, medical or any security related incident. Regular security checks on locations and materials should be conducted to deter or identify breaches of security, and strong links with external agencies are useful to augment a company’s resources, as well as share risk. Some considerations related to physical security risk management measures follow (Deutsch).…

    • 1927 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Kim, D. , & Solomon, M. (2012). Fundamentals of Information Systems Security. Sudbury, MA: Jones & Bartlett Learning.…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Johnstone, R. William. "Not Safe Enough: Fixing Transportation Security." Issues in Science and Technology Vol. XXIII No. 2. Winter 2007: 51-60. SIRS Issues Researcher. Web. 20 Oct 2012.…

    • 1285 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    References: Bullock, J., Haddow, G., Coppola, D., Yeketaysi, S. (2010). United States Customs and Border Protection. Introduction to Homeland Security, 102.…

    • 1394 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Airport Security Post 9/11

    • 2158 Words
    • 9 Pages

    Clark, J., & Bean Yancey, K. (2008, May 22). TSA Gives New Advice for Airport Security. USA Today.…

    • 2158 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    The SANS Institute (2012). Logging and Monitoring to Detect Network Intrusions and Compliance Violations in the Environment: http://www.sans.org/reading-room/whitepapers/detection/logging-monitoring-detect-network-intrusions-compliance-violations-environment-33985…

    • 577 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    security followed by an explanation of human security. The chapter ends with a comparison of…

    • 1358 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Firewall

    • 384 Words
    • 2 Pages

    4. Assess the effectiveness of these devices in protecting the perimeter of the network. Include an explanation of what they do protect and what they do not protect…

    • 384 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    burglar alarm

    • 6695 Words
    • 25 Pages

    Burglar alarm systems/Intruder alarm systems monitor the designated area or areas to detect the presence or suspicious elements and plays a crucial role in theft protection. It is one of the most reliable means to secure a house or a work place. The intruder alarm system consists of an array of sensors, a control panel, alerting system and interconnections. Sensors detect the intruders by many methods such as monitoring door and window contacts, by passive infrared motion detectors, ultrasound vibration, electric or magnetic fields or may communicate wirelessly. Intrusion alarm systems may also be combined with closed-circuit television surveillance systems to automatically record the activities of intruders and may interface to access control systems for electrically locked doors. An alarm is designed to alert the user to an intrusion. The work of the home security system begins with the sensors and motion detectors.…

    • 6695 Words
    • 25 Pages
    Powerful Essays
  • Powerful Essays

    [7] T.Nagatsuma and M.Shinagawa, “Photonic measurement technologies for high frequency electronics,” NTT REVIEW, Vol.14, No.6.pp. 12-24, 2002.…

    • 918 Words
    • 4 Pages
    Powerful Essays