Getting the basics right from the start

Issue 4 2021 Security Services & Risk Management

Secure by Design is a term that has become so popular these days it is almost a cliché. But there is a real need for integrating security into all design processes, whether you are developing an application, a surveillance camera, access control reader, or even a simple sensor that sends bits of information from far away.

It is important to keep in in mind that to design a successful electronic security solution for any client, one has to understand the risks the client faces. These risks are the most important factors to keep in mind when designing any type of solution. The risks can vary from the location of the client’s premises to the type of goods being manufactured or services delivered and so forth. Additionally, one has to identify the type of threat the client has to deal with.

• Identify the risk.

• Accept the risk.

• Transfer the risk.

• Eliminate the risk.

• Mitigate the risk.

Once the client’s exact requirement has been established and proper site surveys have been done, the integrator can recommend the types of equipment and measures to implement. Proper network and equipment positioning, planning and drawings need to be done and cable routes must be identified. Thereafter, the installation can occur, and standard operating procedures implemented. Once the risk has been defined one can start with the solution:

• Identify assets to be protected.

• Layers of protection.

• Utilise mitigations and controls.

Planning the solution

At a basic level, the client’s risks can be identified as:

• Perimeter breaches.

• Building safeguarding.

• Internal breaches and/or IT security.

Perimeter

Perimeter access is defined as controlled or authorised access and unauthorised access. For controlled access, the client should already have a physical barrier, such as a wall or a type of fence in place. To enhance the controlled access, the client might require access control at the entrances, which then includes turnstiles and boom gates. These can be operated by a proper access control system, such as card and/or biometric readers and by implementing a visitor management system. Usually, these access points are manned.

Unauthorised access will not usually happen through the normal access points; however, it is possible to tailgate through booms and also force guards to provide access. To prevent unauthorised access, or at least be notified when it occurs, can be done by combining an electric fence system and a CCTV system with intelligent analytics as an early warning system. These systems need to be monitored by a control room, onsite or offsite, which are alerted by intelligent triggers generated by the various systems or a fully integrated system.

Building protection

As before, the client has to share the risks for the integrator to fully understand and develop a workable solution. Should illegal access to the building be detected, it means the perpetrator has already breached the perimeter, which means the risk is now internal. The implementation of electronic security must, in this case, focus inwards. A proper internal access control with CCTV must be installed to record staff access and movement.

Should the threat be external, the same basic rules used to safeguard the perimeter apply. The physical security, such as burglar proofing and security doors, need to be in place and complemented with access control measures and CCTV, which must make use of intelligent analytics and be properly monitored.

IT protection

Software and data are extremely valuable, consisting of intellectual property rights, pricing, client lists, etc. An IT specialist should be consulted for firewalls and other cybersecurity solutions to be implemented.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...
SA’s private security industry receives multi-million USD investment
News & Events Security Services & Risk Management
South Africa's private security sector has attracted significant international attention, with the world’s largest tactical flashlight manufacturer, Nextorch, announcing a major investment in its local operations, Nextorch Africa.

Read more...
Vetting people in security estates
iFacts Security Services & Risk Management Residential Estate (Industry)
In today’s security-conscious South Africa, estate management’s responsibility extends beyond gates and patrols; it involves ensuring that every resident, staff member, and service provider upholds the community’s safety standards.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...
ProtecLink 2025 spotlights industry tensions and transformation
Magtouch Electronics t/a Ithegi Electronics Security Services & Risk Management News & Events
ProtecLink 2025, created and hosted by Ithegi Electronics, brought together key stakeholders from the security, finance, and innovation sectors under the theme "Connecting Security, Finance, and Innovation: Inspiring Transformation in the Industry."

Read more...
SSG Holdings acquired by Fidelity Services Group
News & Events Security Services & Risk Management
Fidelity Services Group has successfully acquired a majority shareholding in SSG Holdings. The acquisition builds on Fidelity’s track record of strategic expansion, including previous high-profile acquisitions.

Read more...
The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.