UFC 4-021-02NF
27 September 2006
change 1, 23 October 2006
Table of Figures and Tables
Figure 2-1. ESS as a Part of a Physical Security System ............................................. 13
Figure 2-2. Example Detect and Delay Options ............................................................ 14
Table 2-1. Example Breach Events and Delay Time ..................................................... 14
Table 2-2. Sample Detect, Delay, and Respond Measures........................................... 14
Figure 2-3. Timeline Showing Two Cases of Breach and Detection ............................. 15
Figure 2-4. Project Process ........................................................................................... 17
Figure 2-5. A Simple ESS System ................................................................................ 18
Figure 2-6. Intermediate System with Separate ACS and IDS ...................................... 18
Figure 2-7. Complex System With Separate ACS, IDS, and CCTV Subsystems ......... 19
Figure 2-8. Networked System ...................................................................................... 20
Figure 2-9. Local Alarm Monitoring ............................................................................... 21
Figure 2-10. Central Station Monitoring......................................................................... 21
Figure 2-11. Police Connection Monitoring .................................................................. 22
Figure 2-12. Proprietary Station Monitoring.................................................................. 22
Table 2-3 Pros and Cons of Monitoring Methods .......................................................... 22
Figure 3-1. Example Access Control System (ACS) ..................................................... 25
Figure 3-2. Advantages and Disadvantages of Using Credential Devices .................... 26
Figure 3-3. Advantages and Disadvantages of Using Coded Devices .......................... 27
Figure 3-4. Advantages and Disadvantages of Using Biometric Devices ...................... 28
Table 3-1 Exit Technologies (Pros and Cons) ............................................................... 30
Figure 3-5. Basic Access Control Sequence ................................................................. 33
Figure 3-6. PCU In A SCIF ............................................................................................ 34
Figure 3-7. Sample Card Reader Door Configuration ................................................... 36
Figure 3-8. ACS Design Process .................................................................................. 43
4