Home
Download PDF
Order CD-ROM
Order in Print
Home
>
United Facilities Criteria CD 2
>
> Electronic Security Systems: Security Engineering - index
Electronic Security Systems: Security Engineering - index
Electronic Security Systems: Security Engineering - ufc_4_020_04fa0001
Unified Facilities Criteria (UFC) - ufc_4_020_04fa0002
Foreword - ufc_4_020_04fa0003
List Figures - ufc_4_020_04fa0008
List Tables - ufc_4_020_04fa0009
List Tables - ufc_4_020_04fa0010
Chapter 1 Introduction - ufc_4_020_04fa0012
Use of Electronic Security Systems
Designers Responsibility
Chapter 2 Threats and Assets
Asset Description
Chapter 3 Systems Descriptions
Figure 3-1 Typical IDS Configuration
Figure 3-2. Typical CCTV System
Figure 3-3. typical EECS System
Section II. Standard Military Systems
Section III. Security Center Equipment
Console Consideration
Figure 3-5 Typical Security Console Layout
Section IV. Grounding, Shelding, and Transient Protection
Shielding
Chapter 4 Interior Intrusion Detection Sensors
Figure 4-1 Wall-Mounted Structural Vibration Sensors
Table 4-1 Detection Range for Passive Ultrasonic Sentors
Figure 4-3 BMS Mounting Configurations
Figure 4-4. Photoelectric Beam Sensor Configurations
Figure 4-5. Typical Ultrasonic Motion Sensor Beam Patterns
Figure 4-6 typical Detection Patterns for Microwave
Figure 4-7. Typical Detection Patterns for a Passive Infrared Motion Detector
Point Sensors
Section II. Design Guidelines
Table 4-2. Guidance for Application of IDS
Figure 4-10. Installation Using a lattice for Vibration Sensors
Figure 4-11. Typical Balanced Magnetic Switch Installation
Detection Pattern
Table 4-3. Common Couse of Nutsance Alarms in Volumetric Sensors
Figure 4-13 Placement of Ultrasonic Transmitters and Receivers
Figure 4-14. Placement of Passive Infrared Sensors
Layout of Point Sensors
Detector to Signal Processor
Chapter 5 Exterior Instrusion Detection Sensors
Figure 5-1. Example of Mechanical Fence Sensors Installation
Figure 5-2. Typical Strain Sensor Cable Installation
Figure 5-4. Typical Electric Field Sensor Detection Patterns
Figure 5-5. Typical Capacitance Sensor Configuration
Figure 5-6. typical Ported Cable Detection Pattern
Figure 5-9. Typical Monostatic Microwave Sensor Detection Pattern
Section 11. Design Guidelines
Table 5-1. Estimate of Probability of Detection by Exterior Sensors
Table 5-3 Exterior IDS Sensor Cost Comparison
Figure 5-10 Overlap of Fence-Mounted Sensor
Figure 5-11 Use of Strain Sensitive Cable Around Corners
Figure 5-12 Overlap of Ported Cable Sensors
Figure 5-14 Overlap of microwave Zones
Figure 5-15. Microwave Layout Configurations
Figure b5-17 Applications of Exterior Sensors at Perimeter Entry points
Figure 5-18 Applications of Exterior Sensors Used for Intrusion Detection Around Perimeter Buildings
Equipment Protection
Figure 5-19. Completmentary Exterior Sensors
Chapter 6 IDS Alarm Annunciation System
Figure 6-2 Typical Multiplexed IDS
Operator Interfaces
IDS Field Data Collection
DTM
Figure 6-4 Multiplexed DTM Configurations
Section II. Software
Section III. Reliability
Figure 6-5. Typical Redundant Computer Configuration
Chapter 7 Electronic Entry Control
Figure 7-1. Maanetic Sripe and Wiegand-Effect Cards
Biometric Devices
Section II. Application Guidelines - ufc_4_020_04fa0081
Time Zones
Table 7-1 Typical Verification Times of Entry Control Devices
Table 7-2. Comparison of Coded Credential Cards
Figure 7-2 Insertion and Swipe Card Readers
Figure 7-4. Local Equipment Configurations
Figure 7-5 Centrally Controlled Entry Control System
Figure 7-6 Entry Control System Configured With Distributed Control
Section III. Design Guidelines - ufc_4_020_04fa0089
Other Considerations - ufc_4_020_04fa0090
Expansion Capability
Chapter 8 CCTV for Alarm Assessment and Surveillance
Figure 8-1. Typical CCTV Configuration
Table 8-1 Faceplate Dimensions 1-inch, 2/3-inch Image Formats
Table 8-2 Typical Illumination Ranges of Common Sources
Video Signal and Control Links
CCTV Systems Sychronization
Figure 8-3. CCTV Switcher Arragements
Section II. Application Guidelines - ufc_4_020_04fa0099
Table 8-5 Maximum Distance at Which a 7-5-inch Object May Be Recognized
Lighting and Imaging Considerations
Figure 8-4 Spectral Response
Table 8-6 Lens Selecction Table 1-inch Formal
Table 8-7. Lens Selection Table 2/3-inch Format
Table 8-8. Lens Sections Table 1/2-inch Format
Section III. Design Guidelines - ufc_4_020_04fa0106
Layout Considerations
Design Procedure
Table 8-9. Camera Placement Calculations 2/3-inch Format
Rack Space
Chapter 9 Data Transmission
Data Transmission Techniques
Tampering Protection
Additional Considerations
Chapter 10 Interfaces
Figure 10-1 Electronic Security System Electrical Power Block Diagram
Other Interfaces
Chapter 11 Project Implementation
Figure 11-1. Comparative Areas of Assessment by CCTV or Guard
Interior IDS Considerations
Section II. Design Methodology
Figure 11-3. Sequence of Design Development Events
Concept Design
Procurement and Contract Award
Appendix A References - ufc_4_020_04fa0128
Appendix A References - cont'd - ufc_4_020_04fa0129
Appendix B Facility Security Level and IDS Requirements
Appendix C Survey Procedures for Electronic Security Systems
Pre-Survey Requirements
Figure C-1. Site Survey Support Request
Figure C-2. Preliminary Site Survey Information
Other Team Menbers
Site Survey
Site Survey Report
Survey Guidelines - ufc_4_020_04fa0139
Pre-survey Information
Facility Description and Interior Instrusion Detaction
Access Control Procedures
Facility Power
Table C-1 Recurrent Hours Matrix
Table C-2 Non-Recurrent Hours Matrix
Bibliography - ufc_4_020_04fa0146
Glossary - ufc_4_020_04fa0148